A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR. To evaluate the resistance of an ARX cipher against differential and impossible-differential cryptanalysis, the recent automated methods employ constraint ...
Azimi SA +5 more
europepmc +4 more sources
Impossible differential cryptanalysis of lightweight tweakable block cipher CRAFT [PDF]
The CRAFT cipher is a lightweight tweakable block cipher introduced at FSE 2019. Its design aims to incorporate countermeasures against Differential Fault Attacks at the algorithmic level.
Fen Liu +5 more
doaj +3 more sources
Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE [PDF]
Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto et al. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS). It is based on the TWINE block
Tolba M, ElSheikh M, Youssef A.
europepmc +4 more sources
Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj +3 more sources
Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model [PDF]
MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the ...
Xiaonian Wu +5 more
openalex +2 more sources
New Results in Reduced Round AES - 256 Impossible Differential Cryptanalysis [PDF]
: Security of Crypto systems is usually analyzed through different cryptanalytic methods. Since Advance Encryption Standard (AES) is one of the most widely used and popular block cipher, a number of attacks have already been proposed on it.
K.B. Jithendra, T. K. Shahana, Fred Lacy
openalex +2 more sources
Related-Key Multiple Impossible Differential Cryptanalysis on Full-Round LiCi-2 Designed for IoT [PDF]
LiCi-2 is an ultralightweight block cipher designed for constrained IoT devices. It is a successor of LiCi and has even better performance in both software and hardware implementation.
Kai Zhang +6 more
openalex +2 more sources
Impossible Differential Cryptanalysis of Surge
In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively.
Zhiqiang Qu, Xuan Shen, Jun He
openalex +2 more sources
Research on the Security Level of μ2 against Impossible Differential cryptanalysis [PDF]
Kai Zhang, Xuejia Lai, Jie Guan, Bin Hu
openalex +2 more sources
On the Complexity of Impossible Differential Cryptanalysis [PDF]
While impossible differential attack is one of the most well-known and familiar techniques for symmetric-key cryptanalysts, its subtlety and complicacy make the construction and verification of such attacks difficult and error-prone.
Qianqian Yang +4 more
openalex +2 more sources

