Results 31 to 40 of about 2,411 (231)

Full-round impossible differential attack on shadow block cipher

open access: yesCybersecurity, 2023
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu   +3 more
doaj   +1 more source

Deep Learning Assisted Differential Cryptanalysis for the Lightweight Cipher SIMON

open access: yesKSII Transactions on Internet and Information Systems, 2021
SIMON and SPECK are two families of lightweight block ciphers that have excellent performance on hardware and software platforms. At CRYPTO 2019, Gohr first introduces the differential cryptanalysis based deep learning on round-reduced SPECK32/64, and ...
Wenqiang Tian, Bin Hu
semanticscholar   +1 more source

Blocking Linear Cryptanalysis Attacks Found on Cryptographic Algorithms Used on Internet of Thing Based on the Novel Approaches of Using Galois Field (GF (232)) and High Irreducible Polynomials

open access: yesApplied Sciences, 2023
Attacks on the Internet of Things (IoT) are not highly considered during the design and implementation. The prioritization is making profits and supplying services to clients. Most cryptographic algorithms that are commonly used on the IoT are vulnerable
Khumbelo Difference Muthavhine   +1 more
doaj   +1 more source

Distribusi Difference dari S-Box Berbasis Fungsi Balikan Pada GF(28)

open access: yesJurnal Matematika, 2016
Substitution-box (s-box) is a basic component of block cipher which performs a substitution. Two powerful cryptanalysis techniques applied to block ciphers are linear cryptanalysis and differential cryptanalysis.
Andriani Adi Lestari, Nunik Yulianingsih
doaj   +1 more source

Differential-Linear Cryptanalysis [PDF]

open access: yes, 2007
This paper introduces a new chosen text attack on iterated cryptosystems, such as the Data Encryption Standard (DES). The attack is very efficient for 8-round DES,2 recovering 10 bits of key with 80% probability of success using only 512 chosen plaintexts. The probability of success increases to 95% using 768 chosen plaintexts.
Susan K. Langford, Martin E. Hellman
openaire   +1 more source

Addendum to Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In ToSC 2021(2), Sun et al. implemented an automatic search with the Boolean satisfiability problem (SAT) method on GIFT-128 and identified a 19-round linear approximation with the expected linear potential being 2−117.43, which is utilised to launch a ...
Ling Sun, Wei Wang, Meiqin Wang
doaj   +1 more source

Improbable differential cryptanalysis [PDF]

open access: yesProceedings of the 6th International Conference on Security of Information and Networks, 2013
Statistical attacks on block ciphers make use of a property of the cipher so that an event occurs with different probabilities depending on whether or not the correct key is used. For instance, differential cryptanalysis [3] and truncated differential cryptanalysis [5] consider characteristics or differentials which show that a particular output ...
openaire   +1 more source

Improved conditional differential cryptanalysis [PDF]

open access: yesSecurity and Communication Networks, 2014
AbstractIn lightweight cryptographic primitives, non‐linear feedback shift registers (NFSR) are widely used nowadays. At ASIACRYPT 2010, conditional differential cryptanalysis was proposed to analyze NFSR‐based cryptosystems. To get better result, we propose an improved version of this attack.
Kai Zhang, Jie Guan, Xuliang Fei
openaire   +1 more source

A Substitution Box for Lightweight Ciphers to Secure Internet of Things

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
The Internet of Things is a resource-constrained device that demands lightweight cryptographic solutions to achieve high performance and optimal security.
V. Panchami, Mahima Mary Mathews
doaj   +1 more source

Influence of Non-Linearity on Selected Cryptographic Criteria of 8x8 S-Boxes

open access: yesActa Informatica Pragensia, 2017
The article defines standard criteria used to characterize the cryptographic quality of the S box: regularity, non linearity, autocorrelation, avalanche and immunity against differential cryptanalysis.
Petr Tesař
doaj   +1 more source

Home - About - Disclaimer - Privacy