Results 1 to 10 of about 34,576 (259)
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC [PDF]
Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys‐II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition.
Jiamei Liu, Lin Tan, Hong Xu
doaj +3 more sources
Automatic Search of Rectangle Attacks on Feistel Ciphers: Application to WARP
In this paper we present a boomerang analysis of WARP, a recently proposed Generalized Feistel Network with extremely compact hardware implementations.
Virginie Lallemand +2 more
doaj +4 more sources
Related-Key Rectangle Attack on the Full SHACAL-1 [PDF]
SHACAL-1 is a 160-bit block cipher with variable key length of up to 512-bit key based on the hash function SHA-1. It was submitted to the NESSIE project and was accepted as a finalist for the 2nd phase of the evaluation. In this paper we present rectangle attacks on 49 rounds out of the 80 rounds of SHACAL-1.
Orr Dunkelman +2 more
+12 more sources
New related-key rectangle attack on 42-round SHACAL-2
A new 34-round related-key rectangle distinguisher was constructed by exploiting the properties of the round transform of SHACAL-2. Moreover, two new relate-key rectangle attacks on 40-round and 42-round reduced SHACAL-2 were presented by using both the ...
WEI Yong-zhuang1, 2
doaj +4 more sources
New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj +4 more sources
Parallel Rectangle Flip Attack: A Query-based Black-box Attack against Object Detection [PDF]
8 pages, 5 ...
Siyuan Liang +4 more
openalex +3 more sources
Improved Rectangle Attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour +2 more
doaj +3 more sources
The Rectangle Attack — Rectangling the Serpent [PDF]
Serpent is one of the 5 AES finalists. The best attack published so far analyzes up to 9 rounds. In this paper we present attacks on 7-round, 8-round, and 10-round variants of Serpent. We attack a 7- round variant with all key lengths, and 8- and 10-round variants with 256-bit keys. The 10-round attack on the 256-bit keys variants is the best published
Eli Biham, Orr Dunkelman, Nathan Keller
+4 more sources
Related-Key Boomerang and Rectangle Attacks [PDF]
The boomerang attack and the rectangle attack are two attacks that utilize differential cryptanalysis in a larger construction. Both attacks treat the cipher as a cascade of two sub-ciphers, where there exists a good differential for each sub-cipher, but not for the entire cipher.
Eli Biham, Orr Dunkelman, Nathan Keller
openalex +2 more sources
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 [PDF]
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-round reduced AES-192 with 64 or 256 related keys and 9-round reduced AES-256 with 4 related keys.
Jongsung Kim, Seokhie Hong, Bart Preneel
openalex +2 more sources

