Results 31 to 40 of about 2,411 (231)
Full-round impossible differential attack on shadow block cipher
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu +3 more
doaj +1 more source
Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON
SIMON and SPECK are two families of lightweight block ciphers that have excellent performance on hardware and software platforms. At CRYPTO 2019, Gohr first introduces the differential cryptanalysis based deep learning on round-reduced SPECK32/64, and ...
Wenqiang Tian, Bin Hu
semanticscholar +1 more source
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine +1 more
doaj +1 more source
Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj +1 more source
Differential-Linear Cryptanalysis [PDF]
This paper introduces a new chosen text attack on iterated cryptosystems, such as the Data Encryption Standard (DES). The attack is very efficient for 8-round DES,2 recovering 10 bits of key with 80% probability of success using only 512 chosen plaintexts. The probability of success increases to 95% using 768 chosen plaintexts.
Susan K. Langford, Martin E. Hellman
openaire +1 more source
Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
In ToSC 2021(2), Sun et al. implemented an automatic search with the Boolean satisfiability problem (SAT) method on GIFT-128 and identified a 19-round linear approximation with the expected linear potential being 2−117.43, which is utilised to launch a ...
Ling Sun, Wei Wang, Meiqin Wang
doaj +1 more source
Improbable differential cryptanalysis [PDF]
Statistical attacks on block ciphers make use of a property of the cipher so that an event occurs with different probabilities depending on whether or not the correct key is used. For instance, differential cryptanalysis [3] and truncated differential cryptanalysis [5] consider characteristics or differentials which show that a particular output ...
openaire +1 more source
Improved conditional differential cryptanalysis [PDF]
AbstractIn lightweight cryptographic primitives, non‐linear feedback shift registers (NFSR) are widely used nowadays. At ASIACRYPT 2010, conditional differential cryptanalysis was proposed to analyze NFSR‐based cryptosystems. To get better result, we propose an improved version of this attack.
Kai Zhang, Jie Guan, Xuliang Fei
openaire +1 more source
A Substitution Box for Lightweight Ciphers to Secure Internet of Things
The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security.
V. Panchami, Mahima Mary Mathews
doaj +1 more source
Influence of Non-Linearity on Selected Cryptographic Criteria of 8x8 S-Boxes
The article defines standard criteria used to characterize the cryptographic quality of the S box: regularity, non linearity, autocorrelation, avalanche and immunity against differential cryptanalysis.
Petr Tesař
doaj +1 more source

