Results 1 to 10 of about 264,704 (267)

A new distinguishing attack on reduced round ChaCha permutation [PDF]

open access: yesScientific Reports, 2023
This work concentrates on differential-linear distinguishing attacks on the prominent ARX-based permutation ChaCha. Here, we significantly improve the 7-round differential-linear distinguisher for ChaCha permutation by introducing a new path of linear ...
Chandan Dey, Santanu Sarkar
doaj   +4 more sources

Distinguishing Attack on NORX Permutation

open access: yesIACR Transactions on Symmetric Cryptology, 2018
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ongoing CAESAR competition. The security bound of NORX is derived from the sponge construction applied to an ideal underlying permutation.
Tao Huang, Hongjun Wu
doaj   +3 more sources

Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation

open access: yesIACR Transactions on Symmetric Cryptology, 2017
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on two AES-like permutations, P1024 and Q1024, with non-square input and output registers.
Victor Cauchois   +2 more
doaj   +3 more sources

Post-Quantum Security of COPA [PDF]

open access: yesEntropy
COPA is a notable authenticated online cipher and was one of the winning proposals for the CAESAR competition. Current works describe how to break the existentially unforgeable under quantum chosen message attack (EUF-qCMA) of COPA.
Ping Zhang, Yutao Wang
doaj   +2 more sources

Improved guess-and-determine and distinguishing attacks on SNOW-V

open access: yesIACR Transactions on Symmetric Cryptology, 2021
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine (GnD) attacks against the full version with complexities 2384 and 2378, respectively, and one distinguishing attack against a reduced variant with complexity 2303.
Jing Yang   +2 more
doaj   +1 more source

Complexity Analysis of Distinguishing Attack on 51-step RIPEMD-160 [PDF]

open access: yesJisuanji gongcheng, 2019
SASAKI Y,et al used message modification technology to differentiate attack on 51-step RIPEMD-160(Lecture Notes in Computer Science,Vol.7341),but they did not consider the influence of modular subtraction difference on differential routes,and could not ...
CUI Binbin, WANG Gaoli
doaj   +1 more source

Cryptanalysis of Rocca and Feasibility of Its Security Claim

open access: yesIACR Transactions on Symmetric Cryptology, 2022
Rocca is an authenticated encryption with associated data scheme for beyond 5G/6G systems. It was proposed at FSE 2022/ToSC 2021(2), and the designers make a security claim of achieving 256-bit security against key-recovery and distinguishing attacks ...
Akinori Hosoyamada   +6 more
doaj   +1 more source

Cube-Based Cryptanalysis of Subterranean-SAE

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 2 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have analyzed the state collisions in unkeyed ...
Fukang Liu, Takanori Isobe, Willi Meier
doaj   +1 more source

Generic attacks on small-state stream cipher constructions in the multi-user setting

open access: yesCybersecurity, 2023
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design.
Jianfu Huang   +5 more
doaj   +1 more source

Practical distinguishing attack against the IoT‐friendly block cipher ALLPC

open access: yesElectronics Letters, 2022
The issue of security and privacy plays an important role in the Internet of Things (IoT) and directly affects its wide applications. In order to meet the security requirements in the IoT environment, a series of lightweight encryption schemes have been ...
Ting Cui   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy