Results 21 to 28 of about 30 (28)

A New Approach to Improved PNB-based Attacks on Reduced-round ChaCha and Salsa [PDF]

open access: yes
ChaCha and Salsa are two ARX based stream ciphers which are widely used in data encryption including TLS v1.3 standard, VPN software etc. Exploiting Probabilistic Neutral Bits (PNB) is one of the most significant cryptanalysis strategies for reduced ...
Anup Kumar Kundu   +2 more
core  

XXIX Congresso de iniciação científica e tecnológica da UFRN - eCICT 2018 [PDF]

open access: yes, 2018
Anais 29º Congresso de Iniciação Científica e Tecnológica (eCICT) realizado pela a Pró-Reitoria de Pesquisa da Universidade Federal do Rio Grande do Norte.
Brasil, Universidade Federal do Rio Grande do Norte   +1 more
core  

Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing [PDF]

open access: yes
ChaCha is a widely deployed stream cipher and one of the most important symmetric primitives. Due to this practical importance, many cryptanalysis have been proposed. Until now, Probabilistic Neutral Bits (PNBs) have been the most successful.
Antonio Flórez-Gutiérrez, Yosuke Todo
core  

Generic Partial Decryption as Feature Engineering for Neural Distinguishers [PDF]

open access: yes
In Neural Cryptanalysis, a deep neural network is trained as a cryptographic distinguisher between pairs of ciphertexts $(F(X), F(X \oplus \delta))$, where $F$ is either a random permutation or a block cipher, $\delta$ is a fixed difference.
Anna Hambitzer   +4 more
core  

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs [PDF]

open access: yes
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty   +3 more
core  

Moving a Step of ChaCha in Syncopated Rhythm (Extended Version)

open access: yes
The stream cipher ChaCha is one of the most widely used ciphers in the real world, such as in TLS, SSH and so on. In this paper, we study the security of ChaCha via differential cryptanalysis based on probabilistic neutral bits (PNBs).
Chengan Hou   +4 more
core  

Home - About - Disclaimer - Privacy