Results 11 to 20 of about 10,795 (238)
New Security Proofs and Complexity Records for Advanced Encryption Standard
Common block ciphers like AES specified by the NIST or KASUMI (A5/3) of GSM are extensively utilized by billions of individuals globally to protect their privacy and maintain confidentiality in daily communications.
Orhun Kara
doaj +1 more source
Analysis of an Optimal Fault Attack on the LED-64 Lightweight Cryptosystem
This paper presents an optimal method for recovering the secret keys of the light encryption device (LED) by combining the impossible differential fault attack with the algebraic differential fault attack. The proposed optimal method effectively improves
Liang Dong +5 more
doaj +1 more source
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Sugio Nobuyuki
doaj +1 more source
New attacks against reduced Rijndael‐160
The first 9‐round meet‐in‐the‐middle (MITM) attack and improved 8‐round impossible differential (ID) attacks on Rijndael‐160 are studied here. For the first 9‐round MITM attack, a new effective attack path is explored by using the generalised δ‐set and ...
Xiaoli Dong, Yongzhuang Wei
doaj +1 more source
Cryptanalysis of Reduced round SKINNY Block Cipher
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi +2 more
doaj +1 more source
MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj +1 more source
An Improved Impossible Differential Attack on MISTY1 [PDF]
MISTY1 is a Feistel block cipher that received a great deal of cryptographic attention. Its recursive structure, as well as the added FL layers, have been successful in thwarting various cryptanalytic techniques. The best known attacks on reduced variants of the cipher are on either a 4-round variant with the FL functions, or a 6-round variant without ...
Orr Dunkelman, Nathan Keller
openaire +1 more source
Improved Cryptanalysis of Reduced-Version QARMA-64/128
QARMA is a new tweakable block cipher used for memory encryption, the generation of short tags and the construction of the keyed hash functions in future.
Ya Liu +5 more
doaj +1 more source
NBC is a family of block ciphers using Generalized Feistel structure, designed by Xu Hong et al. There are three block and key sizes,i.e.,128/128, 128/256 and 256/256. A 16-bit Sbox is involved in the cipher as the non-linear component.
Yang Jiangshuai +3 more
doaj +1 more source
Among the few works realising the search of truncated differentials (TD) and multidimensional linear approximations (MDLA) holding for sure, the optimality of the distinguisher should be confirmed via an exhaustive search over all possible input ...
Ling Sun +3 more
doaj +1 more source

