Improved Conditional Differential Analysis on NLFSR‐Based Block Cipher KATAN32 with MILP [PDF]
In this paper, a new method for constructing a Mixed Integer Linear Programming (MILP) model on conditional differential cryptanalysis of the nonlinear feedback shift register‐ (NLFSR‐) based block ciphers is proposed, and an approach to detecting the bit with a strongly biased difference is provided.
Zhaohui Xing +3 more
wiley +2 more sources
A comprehensive evaluation of the seven (out of 10) algorithm finalists of the NIST IoT lightweight cipher competition that do not integrate built‐in countermeasures is proposed. The study shows that, nonetheless, they still present some residual vulnerabilities to power SCA.
Aurelien T. Mozipo, John M. Acken
wiley +1 more source
Conditional differential analysis on the KATAN ciphers based on deep learning
KATAN ciphers are block ciphers using non‐linear feedback shift registers. In this study, the authors improve the results of conditional differential analysis on KATAN by using deep learning. We present a practical key recovery attack on the 97‐round KATAN32 with 215.5 data complexity and 220.5 time complexity. The attack of the 82‐round KATAN48 and 70‐
Dongdong Lin +3 more
wiley +1 more source
Hardware implementation of a true random number generator integrating a hexagonal boron nitride memristor with a commercial microcontroller [PDF]
The development of the internet-of-things requires cheap, light, small and reliable true random number generator (TRNG) circuits to encrypt the data-generated by objects or humans-before transmitting them.
Aguirre F. +12 more
core +4 more sources
Improved Impossible Differentials and Zero‐Correlation Linear Hulls of New Structure III
Impossible differential cryptanalysis and zero‐correlation linear cryptanalysis are two kinds of most effective tools for evaluating the security of block ciphers. In those attacks, the core step is to construct a distinguisher as long as possible. In this paper, we focus on the security of New Structure III, which is a kind of block cipher structure ...
Jun He +3 more
wiley +1 more source
Development Of The Search Method For Non-linear Shift Registers Using Hardware, Implemented On Field Programmable Gate Arrays [PDF]
The nonlinear feedback shift registers of the second order inare considered, because based on them it can be developed a generator of stream ciphers with enhanced cryptographic strength.Feasibility of nonlinear feedback shift register search is analyzed.
Poluyanenko, N. (Nikolay)
core +4 more sources
Impossible Differential Distinguishers of Two Generalized Feistel Structures
Generalized Feistel structures are widely used in the design of block ciphers. In this paper, we focused on retrieving impossible differentials for two kinds of generalized Feistel structures: CAST256‐like structure with Substitution‐Permutation (SP) or Substitution‐Permutation‐Substitution (SPS) round functions (named CAST256SP and CAST256SPS ...
Huili Wang +5 more
wiley +1 more source
Supersymmetry and Combinatorics [PDF]
We show how a recently proposed supersymmetric quantum mechanics model leads to non-trivial results/conjectures on the combinatorics of binary necklaces and linear-feedback shift-registers.
Onofri, E., Veneziano, G., Wosiek, J.
core +3 more sources
Implementation of Direct Sequence Spread Spectrum Communication System Using FPGA [PDF]
This paper presents the designed and implementation of spread spectrum technology for data transfer to overcome the interference problems associated with narrow band, very high frequency and ultra high frequency data transfer systems. The spread spectrum
Karthick, N. (N) +3 more
core +1 more source
Stream ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression [PDF]
International audienceIn typical applications of homomorphic encryption, the first step consists for Alice to encrypt some plaintext m under Bob’s public key pk and to send the ciphertext c = HEpk(m) to some third-party evaluator Charlie.
Canteaut, Anne +6 more
core +6 more sources

