Results 1 to 10 of about 10,795 (238)

Multiple Impossible Differentials Attack on AES-192 [PDF]

open access: yesIEEE Access, 2019
The security of AES-192 against multiple impossible differentials attack is studied in this paper. Based on two types of impossible differentials for 4-round AES, two 7-round attack trails of AES-192 with the same plaintext and ciphertext difference ...
Zilong Jiang, Chenhui Jin, Zebin Wang
doaj   +2 more sources

Full-round impossible differential attack on shadow block cipher

open access: yesCybersecurity, 2023
Lightweight block ciphers are the essential encryption algorithm for devices with limited resources. Its goal is to ensure the security of data transmission through resource-constrained devices.
Yuting Liu   +3 more
doaj   +2 more sources

Accurate Estimate of the Advantage of Impossible Differential Attacks

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Impossible differential attacks, which are taking advantage of differentials that cannot occur, are powerful attacks for block cipher primitives. The power of such attacks is often measured in terms of the advantage — number of key-bits found during the ...
Céline Blondeau
doaj   +5 more sources

Related-key Impossible Differential Attack of QARMA Algorithm [PDF]

open access: yesJisuanji gongcheng, 2019
QARMA algorithm is a lightweight and adjustable block cipher algorithm with Substitution Permutation Network(SPN) structure.The ability of QARMA algorithm to resist the related-key impossible differential attack is studied.According to the ...
ZHANG Pei,ZHANG Wenying
doaj   +1 more source

Multiple Impossible Differential Attacks for ForkAES

open access: yesSecurity and Communication Networks, 2022
To yield a highly efficient authentication encryption design for very short messages, the tweakable forkcipher is proposed, which is a tweakable block cipher that uses forking construction to produce two output blocks. The designers also presented ForkAES, a forkcipher that is based on the round function of AES and the tweakable variant of KIASU ...
Zilong Jiang, Chenhui Jin
openaire   +1 more source

Security evaluation on type‐1 and type‐1‐like 4‐branch generalized Feistel structures and application to reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Generalized Feistel structures (called GFSs for short) are one of the most popular block cipher structures. They are mainly divided into type‐1, type‐2 and type‐3 GFS.
Xuan Shen   +4 more
doaj   +1 more source

Impossible differential cryptanalysis of Saturnin algorithm

open access: yesTongxin xuebao, 2022
A lightweight block cipher, Saturnin, is an AES-like algorithm.In a resource-constrained environment, Saturnin can also provide high security.The impossible differential analysis on Saturnin was proposed.First, based on the structure of Saturnin, the ...
Zilong JIANG, Chenhui JIN
doaj   +2 more sources

Integral and impossible‐differential attacks on the reduced‐round Lesamnta‐LW‐BC

open access: yesIET Information Security, 2022
Lesamnta‐LW‐BC is the internal block cipher of the Lesamnta‐LW lightweight hash function, specified in ISO/IEC 29192‐5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function.
Rentaro Shiba   +4 more
doaj   +1 more source

Quantum impossible differential attacks: applications to AES and SKINNY

open access: yesDesigns, Codes and Cryptography, 2023
This article is devoted to quantum cryptoanalysis of block ciphers. The resistance of symmetric primitives against attack using quantum algorithms is considered. The proposed methods may provide no more than quadratic speedup without immediate threat to considered ciphers and discussed for a better understanding of post-quantum security margins.
David, Nicolas   +2 more
openaire   +3 more sources

Impossible Differential Cryptanalysis of SIMECK32/64 Algorithm [PDF]

open access: yesJisuanji gongcheng, 2017
This paper studies the capability of impossible differential cryptanalysis on block cipher SIMECK32/64.The 11-round impossible differential path of SIMECK32/64 is constructed using the meet-in-the-middle technology.The attack on 19-round SIMECK32/64 is ...
CHEN Yanqin,ZHANG Wenying
doaj   +1 more source

Home - About - Disclaimer - Privacy