Results 91 to 100 of about 8,822 (201)

Differential experiments using parallel alternative operations

open access: yesJournal of Mathematical Cryptology
The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, is lately receiving increasing attention. Recently, Civino et al.
Calderini Marco   +2 more
doaj   +1 more source

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: yesIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +1 more source

Impossible Differential Cryptanalysis of Zodiac [PDF]

open access: yes, 2002
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong   +4 more
openaire   +1 more source

Differential Cryptanalysis of KHF [PDF]

open access: yes, 1998
Bakhtiari et al recently proposed a fast message authentication primitive called KHF. This paper shows that KHF is highly vulnerable to differential cryptanalysis: it can be broken with about 37 chosen message queries. This suggests that the KHF design should be reconsidered.
openaire   +1 more source

Exact Formula for RX-Differential Probability Through Modular Addition for All Rotations

open access: yesIACR Transactions on Symmetric Cryptology
This work presents an exact and compact formula for the probability of rotation-xor differentials (RX-differentials) through modular addition, for arbitrary rotation amounts, which has been a long-standing open problem. The formula comes with a rigorous
Alex Biryukov   +2 more
doaj   +1 more source

Subspace Trail Cryptanalysis and its Applications to AES

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis. With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a ...
Lorenzo Grassi   +2 more
doaj   +1 more source

XSL Block Ciphers’ Key-schedules with Resistance to Differential Cryptanalysis

open access: yesБезопасность информационных технологий, 2014
The paper discusses the resistance of XSL block ciphers to differential cryptanalysis. AES-like block ciphers with alternative key-schedules (increased performance and density) are given as an example.
Marina Aleksandrovna Pudovkina   +1 more
doaj  

Algorithms for differential cryptanalysis

open access: yes, 2022
Security in symmetric cryptography seems to be a vague notion for nonspecialists. To simplify the reasoning done by cryptanalysts, a symmetric primitive is secured when no practical attack have been found against it. A large part of the security demonstration of a primitive consists in trying every classical attack against the studied primitives.
openaire   +1 more source

Security against differential and linear cryptanalysis for general SPT models

open access: yesTongxin xuebao, 2012
To use SP network in stream ciphers safely and efficiently,the ability against differential and linear cryptanalysis of SPT models was studied,where S and T denote different layers for substitution,in which compression could be achieved,and P denotes the
Feng-mei LIU   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy