Results 11 to 20 of about 74 (48)

Meet-in-the-Middle Attacks Revisited: Key-recovery, Collision, and Preimage Attacks [PDF]

open access: yes, 2021
At EUROCRYPT 2021, Bao et al. proposed an automatic method for systematically exploring the configuration space of meet-in-the-middle (MITM) preimage attacks.
Jialiang Hua   +5 more
core  

Key Guessing Strategies for Linear Key-Schedule Algorithms in Rectangle Attacks [PDF]

open access: yes, 2022
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we find the right quartets which may suggest key candidates have to satisfy some nonlinear relations. However, some quartets generated always violate these relations,
Lingyue Qin   +3 more
core  

SECURITY ANALYSIS OF LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS [PDF]

open access: yes
The paper examines three lightweight cryptographic algorithms - SKINNY, ForkAE, and Romulus. The research focuses on evaluating their security against various cryptographic attacks. Methods used: theoretical analysis and summary.
Dimitrov, Ivaylo, Dimitrova, Dilyana
core   +3 more sources

Tweakable ForkCipher from Ideal Block Cipher [PDF]

open access: yes
In ASIACRYPT 2019, Andreeva et al. introduced a new symmetric key primitive called the forkcipher, designed for lightweight applications handling short messages.
Sougata Mandal
core   +4 more sources

Revisiting Related-Key Boomerang attacks on AES using computer-aided tool [PDF]

open access: yes, 2023
In recent years, several MILP models were introduced to search automatically for boomerang distinguishers and boomerang attacks on block ciphers. However, they can only be used when the key schedule is linear. Here, a new model is introduced to deal with
Marie Euler   +3 more
core  

Nonce-Misuse Security of the SAEF Authenticated Encryption mode [PDF]

open access: yes, 2021
ForkAE is a NIST lightweight cryptography candidate that uses the forkcipher primitive in two modes of operation -- SAEF and PAEF -- optimized for authenticated encryption of the shortest messages.
Amit Singh Bhati   +2 more
core  

Quantum impossible differential attack. Applications to CLEFIA, AES and SKINNY [PDF]

open access: yes, 2019
International audienceThe general context Cryptography is a computer discipline that aims to protect messages through encryption systems. In symmetric cryptography, a secret parameter, called a key, is used both to encrypt and to decrypt messages.
David, Nicolas
core   +1 more source

HOP-1 and HOP-2: New Re-keying Schemes for Symmetric Ciphers [PDF]

open access: yes
Re-keying is one of the most effective techniques to protect symmetric ciphers against side-channel attacks. Since its introduction, numerous re-keying schemes have been developed.
Donghoon Chang   +3 more
core   +1 more source

Masked Iterate-Fork-Iterate: A new Design Paradigm for Tweakable Expanding Pseudorandom Function [PDF]

open access: yes, 2022
Many modes of operations for block ciphers or tweakable block ciphers do not require invertibility from their underlying primitive. In this work, we study fixed-length Tweakable Pseudorandom Function (TPRF) with large domain extension, a novel primitive ...
Antoon Purnal   +5 more
core  

Cryptanalysis of QARMAv2 [PDF]

open access: yes, 2023
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMA with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
core  

Home - About - Disclaimer - Privacy