Results 1 to 10 of about 169 (90)

Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC

open access: yesIET Information Security, 2023
Deoxys‐BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys‐II is the primary choice for the use case of ‘Defence in depth’ among the portfolio of CAESAR competition.
Jiamei Liu, Lin Tan, Hong Xu
doaj   +5 more sources

New Related-Tweakey Boomerang and Rectangle Attacks on Deoxys-BC Including BDT Effect [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2019
In the CAESAR competition, Deoxys-I and Deoxys-II are two important authenticated encryption schemes submitted by Jean et al. Recently, Deoxys-II together with Ascon, ACORN, AEGIS-128, OCB and COLM have been selected as the final CAESAR portfolio ...
Boxin Zhao, Xiaoyang Dong, Keting Jia
doaj   +6 more sources

Security Analysis of SKINNY under Related-Tweakey Settings [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In CRYPTO’16, a new family of tweakable lightweight block ciphers - SKINNY was introduced. Denoting the variants of SKINNY as SKINNY-n-t, where n represents the block size and t represents the tweakey length, the design specifies t ∈ {n, 2n, 3n}. In this
Guozhen Liu, Mohona Ghosh, Ling Song
doaj   +5 more sources

Automatic Search Model for Related-Tweakey Impossible Differential Cryptanalysis [PDF]

open access: yesLecture Notes in Computer Science, 2023
The design and analysis of dedicated tweakable block ciphers constitute a dynamic and relatively recent research field in symmetric cryptanalysis. The assessment of security in the related-tweakey model is of utmost importance owing to the existence of a
Huiqin Chen   +5 more
exaly   +5 more sources

Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3 [PDF]

open access: yesLecture Notes in Computer Science, 2022
SKINNY-AEAD is one of the second-round candidates of the Lightweight Cryptography Standardization project held by NIST. SKINNY-AEAD M1 is the primary member of six SKINNY-AEAD schemes, while SKINNY-AEAD M3 is another member with a small tag.
Yanhong Fan   +4 more
exaly   +5 more sources

Improved Rectangle Attacks on SKINNY and CRAFT [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +3 more sources

Cryptanalysis of Reduced round SKINNY Block Cipher [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2018
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest hardware footprint. In this paper, we present zero-correlation linear approximations and the related-tweakey impossible differential characteristics for different ...
Sadegh Sadeghi   +2 more
doaj   +4 more sources

MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC [PDF]

open access: yesIEEE Access, 2019
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj   +3 more sources

A Note on Related-Tweakey Impossible Differential Attacks [PDF]

open access: yesIACR Communications in Cryptology
In this note we review the technique proposed at ToSC 2018 by Sadeghi et al. for attacks built upon several related-tweakey impossible differential trails. We show that the initial encryption queries are improper and lead the authors to misevaluate a filtering value in the key recovery phase.
Bonnetain, Xavier, Lallemand, Virginie
openaire   +4 more sources

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule [PDF]

open access: yes, 2021
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Keting Jia   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy