A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati +3 more
core +1 more source
Improved (Related-key) Differential Cryptanalysis on GIFT [PDF]
In this paper, we reevaluate the security of GIFT against differential cryptanalysis under both single-key scenario and related-key scenario. Firstly, we apply Matsui\u27s algorithm to search related-key differential trails of GIFT.
Chunning Zhou +3 more
core
A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core
A Practical Forgery Attack on Lilliput-AE [PDF]
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalysis so far suggests that it has a large security margin.
Eran Lambooij +3 more
core
Revisiting Differential-Linear Attacks via a Boomerang Perspective with Application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT [PDF]
In 1994, Langford and Hellman introduced differential-linear (DL) cryptanalysis, with the idea of decomposing the block cipher E into two parts, EU and EL, such that EU exhibits a high-probability differential trail, while EL has a high-correlation ...
Hosein Hadipour +2 more
core
Boomerang Connectivity Table Revisited [PDF]
The boomerang attack is a variant of differential cryptanalysis which regards a block cipher $E$ as the composition of two sub-ciphers, i.e., $E=E_1\circ E_0$, and which constructs distinguishers for $E$ with probability $p^2q^2$ by combining ...
Lei Hu, Ling Song, Xianrui Qin
core
Related-Key Differential and Boomerang Cryptanalysis in the Fixed-Key Model [PDF]
Differential cryptanalysis, along with its variants such as boomerang attacks, is widely used to evaluate the security of block ciphers. These cryptanalytic techniques often rely on assumptions like the \textit{hypothesis of stochastic equivalence} and ...
Chengcheng Chang +3 more
core
Improving dependability with low power fault detection model for skinny-hash. [PDF]
Arvind Barge S, Mary GI.
europepmc +1 more source
Augmented sets of output differences and new distinguishers for SPN ciphers. [PDF]
Girme R, Rohit R, Sarkar S.
europepmc +1 more source

