Results 31 to 40 of about 74 (48)

Improved Rectangle Attacks on SKINNY and CRAFT [PDF]

open access: yes
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher $E$ as a composition of two sub-ciphers, i.e., $E = E_{1}\circ E_{0}$, to construct a distinguisher for $E$ with probability $p^{2}q^{2}$ by ...
Hosein Hadipour   +2 more
core  

Impossible Differential Attack on SAND-64 [PDF]

open access: yes
SAND is an AND-RX-based lightweight block cipher proposed by Chen et al. There are two variants of SAND, namely SAND-64 and SAND-128, due to structural differences.
Nobuyuki Sugio
core  

Fast Parallelizable Misuse-Resistant Authenticated Encryption: Low Latency (Decryption-Fast) SIV [PDF]

open access: yes
MRAE security is an important goal for many AEAD applications where the nonce uniqueness cannot be maintained and security risks are significant. However, MRAE schemes can be quite expensive. Two of the SoTA MRAE-secure schemes; Deoxys-II and AES-GCM-SIV
Mustafa Khairallah
core  

Impossible Differential Attack on SAND-128 [PDF]

open access: yes
Impossible differential attack is one of the major cryptanalytical methods for symmetric-key block ciphers. In this paper, we evaluate the security of SAND-128 against impossible differential attack.
Nobuyuki Sugio
core  

Electromagnetic Side-Channel Resilience against Lightweight Cryptography [PDF]

open access: yes
Side-channel attacks are an unpredictable risk factor in cryptography. Therefore, observations of leakages through physical parameters, i.e., power and electromagnetic (EM) radiation, etc., of digital devices are essential to minimise vulnerabilities ...
Gunathilake, Nilupulee A.
core   +2 more sources

Optimizing Key Recovery in Impossible Cryptanalysis and Its Automated Tool [PDF]

open access: yes
Impossible differential (ID) cryptanalysis and impossible boomerang (IB) cryptanalysis are two methods of impossible cryptanalysis against block ciphers. Since the seminal work introduced by Boura et al.
Haoyang Wang, Jianing Zhang
core  

Impossible Differential Automation: Model Generation and New Techniques [PDF]

open access: yes
In this paper, we aim to enhance and automate advanced techniques for impossible differential attacks. To demonstrate these advancements, we present improved attacks on the LBlock and HIGHT block ciphers. More precisely, we (a) introduce a methodology to
Alessandro De Piccoli   +5 more
core  

Trail-Estimator: An Automated Verifier for Differential Trails in Block Ciphers [PDF]

open access: yes
Differential cryptanalysis is a powerful technique for attacking block ciphers, wherein the Markov cipher assumption and stochastic hypothesis are commonly employed to simplify the search and probability estimation of differential trails.
Chunning Zhou   +3 more
core  

A Holistic Framework for Impossible Boomerang Attacks [PDF]

open access: yes
In 2011, Lu introduced the impossible boomerang attack at DCC. This powerful cryptanalysis technique combines the strengths of the impossible differential and boomerang attacks, thereby inheriting the advantages of both cryptographic techniques.
Jiahao Zhao   +5 more
core  

A generic algorithm for efficient key recovery in differential attacks – and its associated tool [PDF]

open access: yes
Differential cryptanalysis is an old and powerful attack against block ciphers. While different techniques have been introduced throughout the years to improve the complexity of this attack, the key recovery phase remains a tedious and error-prone ...
Christina Boura   +4 more
core  

Home - About - Disclaimer - Privacy