Results 21 to 28 of about 30 (28)
A New Approach to Improved PNB-based Attacks on Reduced-round ChaCha and Salsa [PDF]
ChaCha and Salsa are two ARX based stream ciphers which are widely used in data encryption including TLS v1.3 standard, VPN software etc. Exploiting Probabilistic Neutral Bits (PNB) is one of the most significant cryptanalysis strategies for reduced ...
Anup Kumar Kundu +2 more
core
A new distinguishing attack on reduced round ChaCha permutation. [PDF]
Dey C, Sarkar S.
europepmc +1 more source
XXIX Congresso de iniciação científica e tecnológica da UFRN - eCICT 2018 [PDF]
Anais 29º Congresso de Iniciação Científica e Tecnológica (eCICT) realizado pela a Pró-Reitoria de Pesquisa da Universidade Federal do Rio Grande do Norte.
Brasil, Universidade Federal do Rio Grande do Norte +1 more
core
Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing [PDF]
ChaCha is a widely deployed stream cipher and one of the most important symmetric primitives. Due to this practical importance, many cryptanalysis have been proposed. Until now, Probabilistic Neutral Bits (PNBs) have been the most successful.
Antonio Flórez-Gutiérrez, Yosuke Todo
core
Generic Partial Decryption as Feature Engineering for Neural Distinguishers [PDF]
In Neural Cryptanalysis, a deep neural network is trained as a cryptographic distinguisher between pairs of ciphertexts $(F(X), F(X \oplus \delta))$, where $F$ is either a random permutation or a block cipher, $\delta$ is a fixed difference.
Anna Hambitzer +4 more
core
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs [PDF]
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty +3 more
core
Moving a Step of ChaCha in Syncopated Rhythm (Extended Version)
The stream cipher ChaCha is one of the most widely used ciphers in the real world, such as in TLS, SSH and so on. In this paper, we study the security of ChaCha via differential cryptanalysis based on probabilistic neutral bits (PNBs).
Chengan Hou +4 more
core

