Results 1 to 10 of about 70 (49)

MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC [PDF]

open access: yesIEEE Access, 2019
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj   +9 more sources

Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC [PDF]

open access: yesIET Information Security, 2021
Joltik‐BC is an internal tweakable block cipher of the authenticated encryption algorithm Joltik, which was a second‐round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
doaj   +6 more sources

Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC [PDF]

open access: yesThe Computer Journal, 2019
AbstractKiasu-BC and Joltik-BC are internal tweakable block ciphers of authenticated encryption algorithms Kiasu and Joltik submitted to the CAESAR competition. Kiasu-BC is a 128-bit block cipher, of which tweak and key sizes are 64 and 128 bits, respectively. Joltik-BC-128 is a 64-bit lightweight block cipher supporting 128 bits tweakey. Its designers
Ya Liu   +7 more
exaly   +7 more sources

Impossible Boomerang Attacks Revisited

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In
Jianing Zhang, Haoyang Wang, Deng Tang
doaj   +3 more sources

Improved meet-in-the-middle attack on Joltik-BC-128

open access: yes网络与信息安全学报
The Joltik-BC, adopting the substitution-permutation network structure and Tweakey framework, was a lightweight tweakable block cipher published at ASIACRPYPT 2014. By researching the internal characteristic of the Joltik-BC, a 6-round meet-in-the-middle
LI Zheng   +3 more
doaj   +1 more source

Key recovery attacks on reduced-round Joltik-BC in the single-key setting

open access: yesInformation Processing Letters, 2019
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Li, Rongjia, Jin, Chenhui, Pan, Hongchen
exaly   +6 more sources

Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis [PDF]

open access: yesLecture Notes in Computer Science, 2023
The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis. The assessment of security in the related-tweakey model is of utmost importance owing to the existence of a
Huiqin Chen, Yongqiang Li
exaly   +2 more sources
Some of the next articles are maybe not open access.

Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC

Lecture Notes in Computer Science
Kangkang Shi   +2 more
openaire   +3 more sources

Joltik

2020
Mingran Yang, Swarun Kumar
exaly  

Home - About - Disclaimer - Privacy