Results 1 to 10 of about 9,453 (199)

Impossible Differential Cryptanalysis of Reduced-Round Tweakable TWINE [PDF]

open access: bronzeProgress in Cryptology - AFRICACRYPT 202012th International Conference on Cryptology in Africa, 2020
Tweakable TWINE (T-TWINE) is a new lightweight tweakable block cipher family proposed by Sakamoto et al. at IWSEC 2019. T-TWINE is the first Tweakable Block Cipher (TBC) that is built on Generalized Feistel Structure (GFS). It is based on the TWINE block cipher in addition to a simple tweak scheduling based on SKINNY’s tweakey schedule.
Tolba M, ElSheikh M, Youssef A.
europepmc   +6 more sources

A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]

open access: bronzeDes Codes Cryptogr, 2022
ARX algorithms are a class of symmetric-key algorithms constructed by Addition, Rotation, and XOR. To evaluate the resistance of an ARX cipher against differential and impossible-differential cryptanalysis, the recent automated methods employ constraint ...
Azimi SA   +5 more
europepmc   +4 more sources

On the Complexity of Impossible Differential Cryptanalysis [PDF]

open access: goldSecurity and Communication Networks, 2018
While impossible differential attack is one of the most well-known and familiar techniques for symmetric-key cryptanalysts, its subtlety and complicacy make the construction and verification of such attacks difficult and error-prone. We introduce a new set of notations for impossible differential analysis.
Qianqian Yang   +4 more
semanticscholar   +4 more sources

Impossible Differential Cryptanalysis of Surge

open access: goldIOP Conference Series: Earth and Environmental Science, 2020
Abstract In 2018, Li Lang et al. proposed a new lightweight block cipher which is called Surge. Its block size is 64-bit, and the length of key size is 64/80/128-bit, respectively. They also proved that the cipher has good performance on security and effectively resists on differential attack, linear attack and algebraic attack.
Zhiqiang Qu, Xuan Shen, Jun He
semanticscholar   +4 more sources

Impossible Differential Cryptanalysis of 8-Round Deoxys-BC-256

open access: goldIEEE Access, 2018
Deoxys is a third-round candidate of the CAESAR authenticated encryption competition. In this paper, we present the first cryptanalysis of Deoxys in the single-key model.
Zilong Jiang, Chenhui Jin
doaj   +3 more sources

Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream

open access: hybridProceedings of the 14th International Joint Conference on e-Business and Telecommunications, 2017
In this work we focus on the tweakable block cipher Scream, We have analysed Scream with the techniques, which previously have not been applied to this algorithm, that is differential-linear and impossible differential cryptanalysis. This is work in progress towards a comprehensive evaluation of Scream.
Ashutosh Dhar Dwivedi   +2 more
semanticscholar   +6 more sources

Related-Key Multiple Impossible Differential Cryptanalysis on Full-Round LiCi-2 Designed for IoT [PDF]

open access: goldSecurity and Communication Networks, 2022
LiCi-2 is an ultralightweight block cipher designed for constrained IoT devices. It is a successor of LiCi and has even better performance in both software and hardware implementation.
Kai Zhang   +6 more
openalex   +2 more sources

Impossible Differential Cryptanalysis of Zodiac [PDF]

open access: bronze, 2002
We discuss the impossible differential cryptanalysis of the blockcipher Zodiac. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too simple to offer enough security. An impossible differential cryptanalysis is a proper method to attack the weakness of Zodiac.
Deukjo Hong   +4 more
openalex   +3 more sources

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model [PDF]

open access: goldKSII Transactions on Internet and Information Systems, 2021
MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the ...
Xiaonian Wu   +5 more
openalex   +2 more sources

Impossible Differential Cryptanalysis of CLEFIA [PDF]

open access: bronze, 2008
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007, including new 9-round impossible differentials for CLEFIA, and the result of an impossible differential attack using them. For the case of a 128-bit key, it is possible to apply the impossible differential attack to CLEFIA reduced to ...
Yukiyasu Tsunoo   +5 more
openalex   +3 more sources

Home - About - Disclaimer - Privacy