Results 11 to 20 of about 164 (126)

Yoyo Cryptanalysis Against Reduced-Round L-Feistel Structure for Recovering the Secret Components

open access: yesIET Information Security
L-Feistel structure is a new iterative block cipher structure and unifies the Feistel structure and the Lai–Massey structure while maintaining the similarity of encryption and decryption. In this study, we present the first yoyo cryptanalysis against the
Jiyan Zhang   +3 more
doaj   +2 more sources

NoLIEM: A Novel Lightweight Image Encryption Method for Resource-Constrained IoT Devices

open access: yesIET Information Security
The expanded use of Internet of Things (IoT) devices in smart homes, industrial automation, healthcare, and smart cities has increased the risk of unauthorized access, data breaches, and man-in-the-middle attacks.
Athraa J. H. Witwit   +2 more
doaj   +2 more sources

Practically secure Feistel ciphers [PDF]

open access: yesDAIMI Report Series, 1994
In this paper we give necessary design principles to be used, when constructing secure Feistel ciphers. We introducee a new concept, <strong> practical security</strong> against linear and differential attacks on Feistel ciphers. We give examples of such Feistel ciphers (practically) resistant to differential attacks, linear attacks and ...
openaire   +2 more sources

A new quantum cryptanalysis method on block cipher Camellia

open access: yesIET Information Security, 2021
Symmetric cryptography is expected to be quantum safe when long‐term security is needed. Kuwakado and Morii gave a 3‐round quantum distinguisher of the Feistel cipher based on Simon's algorithm.
Yanjun Li, Hao Lin, Meng Liang, Ying Sun
doaj   +1 more source

Weak Tweak-Keys for the CRAFT Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2022
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks.
Gregor Leander, Shahram Rasoolzadeh
doaj   +1 more source

Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand   +2 more
doaj   +1 more source

Tweaking Key-Alternating Feistel Block Ciphers [PDF]

open access: yes, 2020
Tweakable block cipher as a cryptographic primitive has found wide applications in disk encryption, authenticated encryption mode and message authentication code, etc. One popular approach of designing tweakable block ciphers is to tweak the generic constructions of classic block ciphers.
Hailun Yan   +3 more
openaire   +3 more sources

Full-round impossible differential attack on shadow block cipher

open access: yesCybersecurity, 2023
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu   +3 more
doaj   +1 more source

KFC – The Krazy Feistel Cipher [PDF]

open access: yes, 2006
We introduce KFC, a block cipher based on a three round Feistel scheme. Each of the three round functions has an SPN-like structure for which we can either compute or bound the advantage of the best d-limited adaptive distinguisher, for any value of d.
Thomas Baignères, Matthieu Finiasz
openaire   +1 more source

Differential fault analysis about feistel block cipher [PDF]

open access: yesProceedings of the 2016 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer, 2016
Light-weight block cipher is the protection of RDIF label and smart card in communication of Internet of things.It's safty is very important..The article analyzes the fault propagation of the traditional light-weight block cipher with feistel structure and proposing a deep differential fault analysis straregy. The method based on half byte fault attack
Dong Li, Boliang Zhang
openaire   +1 more source

Home - About - Disclaimer - Privacy