Results 11 to 20 of about 535 (102)

Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP [PDF]

open access: yesWireless Communications and Mobile Computing, 2020
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register- (NLFSR-) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing, Wenying Zhang, Guoyong Han
openaire   +2 more sources

Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher [PDF]

open access: yes, 2009
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M structure and Generalized Feistel structure. In [12], Choy et al. proposed a new structure called GF-NLFSR (Generalized Feistel-NonLinear Feedback Shift Register), and ...
Wenling Wu   +3 more
core   +6 more sources

New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures

open access: yesCryptography, 2019
A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs.
Ayoub Mars, Wael Adi
doaj   +3 more sources

Residual vulnerabilities to power side channel attacks of lightweight ciphers cryptography competition finalists

open access: yesIET Computers &Digital Techniques, Volume 17, Issue 3-4, Page 75-88, May-July 2023., 2023
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley   +1 more source

Conditional differential analysis on the KATAN ciphers based on deep learning

open access: yesIET Information Security, Volume 17, Issue 3, Page 347-359, May 2023., 2023
KATAN ciphers are block ciphers using non‐linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. We present a practical key recovery attack on the 97‐round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82‐round KATAN48 and 70‐
Dongdong Lin   +3 more
wiley   +1 more source

Hardware implementation of a true random number generator integrating a hexagonal boron nitride memristor with a commercial microcontroller [PDF]

open access: yes, 2022
The development of the internet-of-things requires cheap, light, small and reliable true random number generator (TRNG) circuits to encrypt the data—generated by objects or humans—before transmitting them.
Pazos, Sebastián   +1 more
core   +4 more sources

Improved Impossible Differentials and Zero‐Correlation Linear Hulls of New Structure III

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
Impossible differential cryptanalysis and zero‐correlation linear cryptanalysis are two kinds of most effective tools for evaluating the security of block ciphers. In those attacks, the core step is to construct a distinguisher as long as possible. In this paper, we focus on the security of New Structure III, which is a kind of block cipher structure ...
Jun He   +3 more
wiley   +1 more source

Development Of The Search Method For Non-linear Shift Registers Using Hardware, Implemented On Field Programmable Gate Arrays [PDF]

open access: yes, 2017
The nonlinear feedback shift registers of the second order inare considered, because based on them it can be developed a generator of stream ciphers with enhanced cryptographic strength.Feasibility of nonlinear feedback shift register search is analyzed.
Poluyanenko, N. (Nikolay)
core   +4 more sources

Supersymmetry and Combinatorics [PDF]

open access: yes, 2006
We show how a recently proposed supersymmetric quantum mechanics model leads to non-trivial results/conjectures on the combinatorics of binary necklaces and linear-feedback shift-registers.
Onofri, E., Veneziano, G., Wosiek, J.
core   +3 more sources

On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2020
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32 second-round candidates in NIST’s lightweight cryptography standardization process. TinyJAMBU adopts an NLFSR based keyed-permutation that computes only a single
Dhiman Saha   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy