Results 11 to 20 of about 34,576 (259)

A Related-Key Rectangle Attack on the Full KASUMI [PDF]

open access: closed, 2005
KASUMI is an 8-round Feistel block cipher used in the confidentiality and the integrity algorithms of the 3GPP mobile communications. As more and more 3GPP networks are being deployed, more and more users use KASUMI to protect their privacy. Previously known attacks on KASUMI can break up to 6 out of the 8 rounds faster than exhaustive key search, and ...
Eli Biham, Orr Dunkelman, Nathan Keller
  +4 more sources

Rectangle Attack Against Type‐I Generalized Feistel Structures [PDF]

open access: hybridChinese Journal of Electronics, 2022
Yi Zhang   +3 more
openalex   +2 more sources

Rectangle and Boomerang Attacks on DES [PDF]

open access: bronzeJournal of Software, 2008
Lei Zhang, Wenling Wu
openalex   +3 more sources

New Results on Boomerang and Rectangle Attacks [PDF]

open access: closed, 2002
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount.
Eli Biham, Orr Dunkelman, Nathan Keller
  +4 more sources

IMPROVED RELATED-KEY RECTANGLE ATTACK ON THE FULL HAS-160 ENCRYPTION MODE [PDF]

open access: closedInternational Journal of Foundations of Computer Science, 2012
In this paper we investigate the security of the encryption mode of the HAS-160 hash function. HAS-160 is a Korean hash standard which is widely used in Korean industry. The structure of HAS-160 is similar to SHA-1 besides some modifications. In this paper, we present the first cryptographic attack that breaks the encryption mode of the full 80-round ...
Yuechuan Wei, Chao Li, Dan Cao
  +4 more sources

Related-key rectangle attack on the full ARIRANG encryption mode

open access: yesTongxin xuebao, 2011
The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round ...
ZHANG Peng1, LI Rui-lin1, LI Chao1
doaj   +3 more sources

New Rectangle Attack Against SKINNY Block Cipher

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The issue of security and privacy plays an important role in the wireless networks and directly affects the wide application of wireless network systems. In order to protect the confidentiality of data for wireless networks, especially for the wireless sensor networks, a series of lightweight ciphers have been proposed in recent years. SKINNY, a family
Jiyan Zhang, Ting Cui, Chenhui Jin
openaire   +4 more sources

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule

open access: yesIACR Transactions on Symmetric Cryptology, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin   +4 more
doaj   +1 more source

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search is not always satisfactory for the search of long trails or ciphers with large state sizes ...
Ling Su, Wei Wang, Meiqin Wang
doaj   +1 more source

A Formal Analysis of Boomerang Probabilities

open access: yesIACR Transactions on Symmetric Cryptology, 2022
In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying ...
Andreas B. Kidmose, Tyge Tiessen
doaj   +1 more source

Home - About - Disclaimer - Privacy