Results 1 to 10 of about 264,704 (267)
A new distinguishing attack on reduced round ChaCha permutation [PDF]
This work concentrates on differential-linear distinguishing attacks on the prominent ARX-based permutation ChaCha. Here, we significantly improve the 7-round differential-linear distinguisher for ChaCha permutation by introducing a new path of linear ...
Chandan Dey, Santanu Sarkar
doaj +4 more sources
Distinguishing Attack on NORX Permutation
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ongoing CAESAR competition. The security bound of NORX is derived from the sponge construction applied to an ideal underlying permutation.
Tao Huang, Hongjun Wu
doaj +3 more sources
Grøstl Distinguishing Attack: A New Rebound Attack of an AES-like Permutation
We consider highly structured truncated differential paths to mount a new rebound attack on Grøstl-512, a hash functions based on two AES-like permutations, P1024 and Q1024, with non-square input and output registers.
Victor Cauchois +2 more
doaj +3 more sources
Post-Quantum Security of COPA [PDF]
COPA is a notable authenticated online cipher and was one of the winning proposals for the CAESAR competition. Current works describe how to break the existentially unforgeable under quantum chosen message attack (EUF-qCMA) of COPA.
Ping Zhang, Yutao Wang
doaj +2 more sources
Improved guess-and-determine and distinguishing attacks on SNOW-V
In this paper, we investigate the security of SNOW-V, demonstrating two guess-and-determine (GnD) attacks against the full version with complexities 2384 and 2378, respectively, and one distinguishing attack against a reduced variant with complexity 2303.
Jing Yang +2 more
doaj +1 more source
Complexity Analysis of Distinguishing Attack on 51-step RIPEMD-160 [PDF]
SASAKI Y,et al used message modification technology to differentiate attack on 51-step RIPEMD-160(Lecture Notes in Computer Science,Vol.7341),but they did not consider the influence of modular subtraction difference on differential routes,and could not ...
CUI Binbin, WANG Gaoli
doaj +1 more source
Cryptanalysis of Rocca and Feasibility of Its Security Claim
Rocca is an authenticated encryption with associated data scheme for beyond 5G/6G systems. It was proposed at FSE 2022/ToSC 2021(2), and the designers make a security claim of achieving 256-bit security against key-recovery and distinguishing attacks ...
Akinori Hosoyamada +6 more
doaj +1 more source
Cube-Based Cryptanalysis of Subterranean-SAE
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 2 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have analyzed the state collisions in unkeyed ...
Fukang Liu, Takanori Isobe, Willi Meier
doaj +1 more source
Generic attacks on small-state stream cipher constructions in the multi-user setting
Small-state stream ciphers (SSCs), which violate the principle that the state size should exceed the key size by a factor of two, still demonstrate robust security properties while maintaining a lightweight design.
Jianfu Huang +5 more
doaj +1 more source
Practical distinguishing attack against the IoT‐friendly block cipher ALLPC
The issue of security and privacy plays an important role in the Internet of Things (IoT) and directly affects its wide applications. In order to meet the security requirements in the IoT environment, a series of lightweight encryption schemes have been ...
Ting Cui +4 more
doaj +1 more source

