Results 11 to 20 of about 74 (48)
Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks [PDF]
At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks.
Jialiang Hua +5 more
core
Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin +3 more
core
SECURITY ANALYSIS OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS [PDF]
The paper examines three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus. The research focuses on evaluating their security against various cryptographic attacks. Methods used: theoretical analysis and summary.
Dimitrov, Ivaylo, Dimitrova, Dilyana
core +3 more sources
Tweakable ForkCipher from Ideal Block Cipher [PDF]
In ASIACRYPT 2019, Andreeva et al. introduced a new symmetric key primitive called the forkcipher, designed for lightweight applications handling short messages.
Sougata Mandal
core +4 more sources
Revisiting Related-Key Boomerang attacks on AES using computer-aided tool [PDF]
In recent years, several MILP models were introduced to search automatically for boomerang distinguishers and boomerang attacks on block ciphers. However, they can only be used when the key schedule is linear. Here, a new model is introduced to deal with
Marie Euler +3 more
core
Nonce-Misuse Security of the SAEF Authenticated Encryption mode [PDF]
ForkAE is a NIST lightweight cryptography candidate that uses the forkcipher primitive in two modes of operation -- SAEF and PAEF -- optimized for authenticated encryption of the shortest messages.
Amit Singh Bhati +2 more
core
Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core +1 more source
HOP-1 and HOP-2: New Re-keying Schemes for Symmetric Ciphers [PDF]
Re-keying is one of the most effective techniques to protect symmetric ciphers against side-channel attacks. Since its introduction, numerous re-keying schemes have been developed.
Donghoon Chang +3 more
core +1 more source
Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function [PDF]
Many modes of operations for block ciphers or tweakable block ciphers do not require invertibility from their underlying primitive. In this work, we study fixed-length Tweakable Pseudorandom Function (TPRF) with large domain extension, a novel primitive ...
Antoon Purnal +5 more
core
Cryptanalysis of QARMAv2 [PDF]
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMA with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
core

