Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE [PDF]
Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto et al. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS). It is based on the TWINE block cipher in addition to a simple tweak scheduling based on SKINNY’s tweakey schedule.
Tolba M, ElSheikh M, Youssef A.
europepmc +6 more sources
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR. To evaluate the resistance of an ARX cipher against differential and impossible-differential cryptanalysis, the recent automated methods employ constraint ...
Azimi SA +5 more
europepmc +4 more sources
On the Complexity of Impossible Differential Cryptanalysis [PDF]
While impossible differential attack is one of the most well-known and familiar techniques for symmetric-key cryptanalysts, its subtlety and complicacy make the construction and verification of such attacks difficult and error-prone. We introduce a new set of notations for impossible differential analysis.
Qianqian Yang +4 more
semanticscholar +4 more sources
Impossible Differential Cryptanalysis of Surge
Abstract In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively. They also proved that the cipher has good performance on security and effectively resists on differential attack, linear attack and algebraic attack.
Zhiqiang Qu, Xuan Shen, Jun He
semanticscholar +4 more sources
Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj +3 more sources
Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream
In this work we focus on the tweakable block cipher Scream, We have analysed Scream with the techniques, which previously have not been applied to this algorithm, that is differential-linear and impossible differential cryptanalysis. This is work in progress towards a comprehensive evaluation of Scream.
Ashutosh Dhar Dwivedi +2 more
semanticscholar +6 more sources
Related-Key Multiple Impossible Differential Cryptanalysis on Full-Round LiCi-2 Designed for IoT [PDF]
LiCi-2 is an ultralightweight block cipher designed for constrained IoT devices. It is a successor of LiCi and has even better performance in both software and hardware implementation.
Kai Zhang +6 more
openalex +2 more sources
Impossible Differential Cryptanalysis of Zodiac [PDF]
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong +4 more
openalex +3 more sources
Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model [PDF]
MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the ...
Xiaonian Wu +5 more
openalex +2 more sources
Impossible Differential Cryptanalysis of CLEFIA [PDF]
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including new 9-round impossible differentials for CLEFIA, and the result of an impossible differential attack using them. For the case of a 128-bit key, it is possible to apply the impossible differential attack to CLEFIA reduced to ...
Yukiyasu Tsunoo +5 more
openalex +3 more sources

