Results 1 to 10 of about 106,304 (243)

Impossible differential cryptanalysis of Saturnin algorithm

open access: yesTongxin xuebao, 2022
A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the ...
Zilong JIANG, Chenhui JIN
doaj   +3 more sources

Impossible Differential Cryptanalysis of GRANULE Algorithm [PDF]

open access: yesJisuanji gongcheng, 2019
The GRANULE algorithm is an ultra-lightweight block cipher algorithm with good hardware and software implementation performance,but now the algorithm lacks security estimation result under impossible differential analysis.Therefore,using middle error ...
SHI Shuying, HE Jun
doaj   +1 more source

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

Automatic method for searching impossible differentials and zero-correlation linear hulls of ARX block ciphers

open access: yes网络与信息安全学报, 2017
Firstly,the differences and linear masks propagation equations of ARX ciphers were established.Secondly,the propagation equations were solved by SAT solver and judged valid or not.Finally,differences and linear masks were traversed to search impossible ...
Ya HAN
doaj   +3 more sources

Related-key Impossible Differential Attack of QARMA Algorithm [PDF]

open access: yesJisuanji gongcheng, 2019
QARMA algorithm is a lightweight and adjustable block cipher algorithm with Substitution Permutation Network(SPN) structure.The ability of QARMA algorithm to resist the related-key impossible differential attack is studied.According to the ...
ZHANG Pei,ZHANG Wenying
doaj   +1 more source

Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers

open access: yesCybersecurity, 2021
In this paper, we greatly increase the number of impossible differentials for SIMON and SIMECK by eliminating the 1-bit constraint in input/output difference, which is the precondition to ameliorate the complexity of attacks.
Xuzi Wang   +3 more
doaj   +1 more source

Efficient MILP Modelings for Sboxes and Linear Layers of SPN ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2020
Mixed Integer Linear Programming (MILP) solvers are regularly used by designers for providing security arguments and by cryptanalysts for searching for new distinguishers.
Christina Boura, Daniel Coggia
doaj   +1 more source

Full-round impossible differential attack on shadow block cipher

open access: yesCybersecurity, 2023
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu   +3 more
doaj   +1 more source

A New Automatic Tool Searching for Impossible Differential of NIST Candidate ACE

open access: yesMathematics, 2020
The ACE algorithm is a candidate of the Lightweight Cryptography standardization process started by the National Institute of Standards and Technology (NIST) of the USA that passed the first round and successfully entered the second round. It is designed
Jingyi Liu, Guoqiang Liu, Longjiang Qu
doaj   +1 more source

Accurate Estimate of the Advantage of Impossible Differential Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Impossible differential attacks, which are taking advantage of differentials that cannot occur, are powerful attacks for block cipher primitives. The power of such attacks is often measured in terms of the advantage — number of key-bits found during the ...
Céline Blondeau
doaj   +1 more source

Home - About - Disclaimer - Privacy