Results 11 to 20 of about 2,411 (231)

On the resistance of new lightweight block ciphers against differential cryptanalysis [PDF]

open access: goldHeliyon, 2023
Many recently proposed lightweight block ciphers lack security evaluation against generic cryptanalytic attacks such as differential cryptanalysis. In this paper, we contribute towards security evaluation efforts by investigating four lightweight Feistel-
Yen Yee Chan   +5 more
doaj   +5 more sources

A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]

open access: bronzeDes Codes Cryptogr, 2022
ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR. To evaluate the resistance of an ARX cipher against differential and impossible-differential cryptanalysis, the recent automated methods employ constraint ...
Azimi SA   +5 more
europepmc   +4 more sources

Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis. [PDF]

open access: goldEntropy (Basel), 2021
This article presents the author’s own metaheuristic cryptanalytic attack based on the use of differential cryptanalysis (DC) methods and memetic algorithms (MA) that improve the local search process through simulated annealing (SA). The suggested attack
Dworak K, Boryczka U.
europepmc   +4 more sources

MILP-Based Differential Cryptanalysis on Round-Reduced Midori64 [PDF]

open access: goldIEEE Access, 2020
Mixed integer linear programming (MILP) model was presented by Sun et al. at Asiacrypt 2014 to search for differential characteristics of block ciphers. Based on this model, it is easy to assess block ciphers against differential attack.
Hongluan Zhao   +3 more
doaj   +3 more sources

Differential Cryptanalysis of Round-Reduced LEA

open access: yesIEEE Access, 2018
In this paper, we focus on the differential cryptanalysis dedicated to a particular class of cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the Nested Monte-Carlo Search algorithm to find a differential path in ARX ...
Ashutosh Dhar Dwivedi, Gautam Srivastava
doaj   +4 more sources

Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission.
Ting Fan   +3 more
doaj   +2 more sources

Differential Cryptanalysis of Round-Reduced SPECK Suitable for Internet of Things Devices [PDF]

open access: goldIEEE Access, 2019
In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation, and exclusive-OR, and therefore, are designed very well to perform over ...
Ashutosh Dhar Dwivedi   +2 more
openalex   +2 more sources

Slender-Set Differential Cryptanalysis [PDF]

open access: bronzeJournal of Cryptology, 2011
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Julia Borghoff   +3 more
openalex   +3 more sources

Differential Cryptanalysis Of Symmetric Primitives

open access: green, 2018
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the security of symmetric cryptographic algorithms is the resistance of their core building block, the primitive, against cryptanalytic attacks such as differential, linear, and algebraic cryptanalysis.
Maria Eichlseder
openalex   +2 more sources

Differential cryptanalysis of image cipher using block-based scrambling and image filtering [PDF]

open access: greenInformation Sciences, 2018
Recently, an image encryption algorithm using block-based scrambling and image filtering has been proposed by Hua et al. In this paper, we analyze the security problems of the encryption algorithm in detail and break the encryption by a codebook attack ...
Feng Yu   +3 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy