Results 11 to 20 of about 34,576 (259)
A Related-Key Rectangle Attack on the Full KASUMI [PDF]
KASUMI is an 8-round Feistel block cipher used in the confidentiality and the integrity algorithms of the 3GPP mobile communications. As more and more 3GPP networks are being deployed, more and more users use KASUMI to protect their privacy. Previously known attacks on KASUMI can break up to 6 out of the 8 rounds faster than exhaustive key search, and ...
Eli Biham, Orr Dunkelman, Nathan Keller
+4 more sources
Rectangle Attack Against Type‐I Generalized Feistel Structures [PDF]
Yi Zhang +3 more
openalex +2 more sources
Rectangle and Boomerang Attacks on DES [PDF]
Lei Zhang, Wenling Wu
openalex +3 more sources
New Results on Boomerang and Rectangle Attacks [PDF]
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount.
Eli Biham, Orr Dunkelman, Nathan Keller
+4 more sources
IMPROVED RELATED-KEY RECTANGLE ATTACK ON THE FULL HAS-160 ENCRYPTION MODE [PDF]
In this paper we investigate the security of the encryption mode of the HAS-160 hash function. HAS-160 is a Korean hash standard which is widely used in Korean industry. The structure of HAS-160 is similar to SHA-1 besides some modifications. In this paper, we present the first cryptographic attack that breaks the encryption mode of the full 80-round ...
Yuechuan Wei, Chao Li, Dan Cao
+4 more sources
Related-key rectangle attack on the full ARIRANG encryption mode
The security of the block cipher used in the compression function of ARIRANG,which was one of the SHA-3 candidates,was revaluated.Based on a linear transformation of the master key and the all-one differential of the round function,a full 40-round ...
ZHANG Peng1, LI Rui-lin1, LI Chao1
doaj +3 more sources
New Rectangle Attack Against SKINNY Block Cipher
The issue of security and privacy plays an important role in the wireless networks and directly affects the wide application of wireless network systems. In order to protect the confidentiality of data for wireless networks, especially for the wireless sensor networks, a series of lightweight ciphers have been proposed in recent years. SKINNY, a family
Jiyan Zhang, Ting Cui, Chenhui Jin
openaire +4 more sources
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Lingyue Qin +4 more
doaj +1 more source
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search is not always satisfactory for the search of long trails or ciphers with large state sizes ...
Ling Su, Wei Wang, Meiqin Wang
doaj +1 more source
A Formal Analysis of Boomerang Probabilities
In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying ...
Andreas B. Kidmose, Tyge Tiessen
doaj +1 more source

