Improved Conditional Differential Analysis on NLFSR Based Block Cipher KATAN32 with MILP [PDF]
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register- (NLFSR-) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing, Wenying Zhang, Guoyong Han
openaire +2 more sources
Security Analysis of the GF-NLFSR Structure and Four-Cell Block Cipher [PDF]
The overall structure is one of the most important properties of block ciphers. At present, the most common structures include Feistel structure, SP structure, MISTY structure, L-M structure and Generalized Feistel structure. In [12], Choy et al. proposed a new structure called GF-NLFSR (Generalized Feistel-NonLinear Feedback Shift Register), and ...
Wenling Wu +3 more
core +6 more sources
New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures
A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs.
Ayoub Mars, Wael Adi
doaj +3 more sources
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley +1 more source
Conditional differential analysis on the KATAN ciphers based on deep learning
KATAN ciphers are block ciphers using non‐linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. We present a practical key recovery attack on the 97‐round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82‐round KATAN48 and 70‐
Dongdong Lin +3 more
wiley +1 more source
Hardware implementation of a true random number generator integrating a hexagonal boron nitride memristor with a commercial microcontroller [PDF]
The development of the internet-of-things requires cheap, light, small and reliable true random number generator (TRNG) circuits to encrypt the data—generated by objects or humans—before transmitting them.
Pazos, Sebastián +1 more
core +4 more sources
Improved Impossible Differentials and Zero‐Correlation Linear Hulls of New Structure III
Impossible differential cryptanalysis and zero‐correlation linear cryptanalysis are two kinds of most effective tools for evaluating the security of block ciphers. In those attacks, the core step is to construct a distinguisher as long as possible. In this paper, we focus on the security of New Structure III, which is a kind of block cipher structure ...
Jun He +3 more
wiley +1 more source
Development Of The Search Method For Non-linear Shift Registers Using Hardware, Implemented On Field Programmable Gate Arrays [PDF]
The nonlinear feedback shift registers of the second order inare considered, because based on them it can be developed a generator of stream ciphers with enhanced cryptographic strength.Feasibility of nonlinear feedback shift register search is analyzed.
Poluyanenko, N. (Nikolay)
core +4 more sources
Supersymmetry and Combinatorics [PDF]
We show how a recently proposed supersymmetric quantum mechanics model leads to non-trivial results/conjectures on the combinatorics of binary necklaces and linear-feedback shift-registers.
Onofri, E., Veneziano, G., Wosiek, J.
core +3 more sources
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32 second-round candidates in NIST’s lightweight cryptography standardization process. TinyJAMBU adopts an NLFSR based keyed-permutation that computes only a single
Dhiman Saha +5 more
doaj +1 more source

