Results 91 to 100 of about 8,822 (201)
Differential experiments using parallel alternative operations
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco +2 more
doaj +1 more source
Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj +1 more source
Impossible Differential Cryptanalysis of Zodiac [PDF]
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong +4 more
openaire +1 more source
Differential Cryptanalysis of KHF [PDF]
Bakhtiari et al recently proposed a fast message authentication primitive called KHF. This paper shows that KHF is highly vulnerable to differential cryptanalysis: it can be broken with about 37 chosen message queries. This suggests that the KHF design should be reconsidered.
openaire +1 more source
Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations
This work presents an exact and compact formula for the probability of rotation-xor differentials (RX-differentials) through modular addition, for arbitrary rotation amounts, which has been a long-standing open problem. The formula comes with a rigorous
Alex Biryukov +2 more
doaj +1 more source
Subspace Trail Cryptanalysis and its Applications to AES
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi +2 more
doaj +1 more source
XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis
The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.
Marina Aleksandrovna Pudovkina +1 more
doaj
Algorithms for differential cryptanalysis
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the reasoning done by cryptanalysts, a symmetric primitive is secured when no practical attack have been found against it. A large part of the security demonstration of a primitive consists in trying every classical attack against the studied primitives.
openaire +1 more source
Security against differential and linear cryptanalysis for general SPT models
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU +4 more
doaj +2 more sources

