Results 21 to 30 of about 738 (105)

Rotational-XOR Differential Rectangle Cryptanalysis on Simon-like Ciphers [PDF]

open access: yes, 2023
In this paper, we propose a rectangle-like method called \textit{rotational-XOR differential rectangle} attack to search for better distinguishers. It is a combination of the rotational-XOR cryptanalysis and differential cryptanalysis in the rectangle ...
Mingming Zhu   +5 more
core   +2 more sources

Commutative Cryptanalysis Made Practical

open access: yesIACR Transactions on Symmetric Cryptology, 2023
About 20 years ago, Wagner showed that most of the (then) known techniques used in the cryptanalysis of block ciphers were particular cases of what he called commutative diagram cryptanalysis.
Jules Baudrin   +5 more
doaj   +1 more source

On Boomerang Attacks on Quadratic Feistel Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2023
The recent introduction of the Boomerang Connectivity Table (BCT) at Eurocrypt 2018 revived interest in boomerang cryptanalysis and in the need to correctly build boomerang distinguishers.
Xavier Bonnetain, Virginie Lallemand
doaj   +1 more source

Bounds for the Security of Ascon against Differential and Linear Cryptanalysis

open access: yesIACR Transactions on Symmetric Cryptology, 2022
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices.
Johannes Erlacher   +2 more
doaj   +1 more source

Rotational-XOR Rectangle Cryptanalysis on Round-Reduced Simon [PDF]

open access: yesSecurity and Communication Networks, 2020
Recently, Ashur and Liu introduced the Rotational-XOR-difference approach which is a modification of rotational cryptanalysis, for an ARX cipher Speck (Ashur and Liu, 2016). In this paper, we apply the Rotational-XOR-difference (RXD) approach to a non-ARX cipher Simon and evaluate its security.
Bonwook Koo   +2 more
openaire   +1 more source

ROTATIONAL CRYPTANALYSIS OF GOST WITH IDENTICAL S-BOXES [PDF]

open access: yesTatra Mountains Mathematical Publications, 2013
ABSTRACT Rotational cryptanalysis was introduced by Khovratovich and Nikoli ´c as a tool to analyse ARX-type cipher designs. GOST 28147-89 is a former Soviet Union cipher standard based on a Feistel construction with 32 rounds. Each round function adds the round key modulo 232, transforms the result with 4-to-4 bit S-boxes, and rotates the output.
Zajac, Pavol, Ondroš, Michal
openaire   +2 more sources

A Survey of ARX-based Symmetric-key Primitives [PDF]

open access: yes, 2022
Addition Rotation XOR is suitable for fast implementation symmetric –key primitives, such as stream and block ciphers. This paper presents a review of several block and stream ciphers based on ARX construction followed by the discussion on the security ...
Abdul Latip, Shekh Faisal   +2 more
core   +2 more sources

MergeMAC:A MAC for Authentication with Strict Time Constraints and Limited Bandwidth [PDF]

open access: yes, 2018
This paper presents MergeMAC, a MAC that is particularly suitable for environments with strict time requirements and extremely limited bandwidth. MergeMAC computes the MAC by splitting the message into two parts.
Ankele, Ralph   +2 more
core   +2 more sources

Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK [PDF]

open access: yes, 2021
Under embargo until: 2022-07-08Searching for the right pairs of inputs in difference-based distinguishers is an important task for the experimental verification of the distinguishers in symmetric-key ciphers.
Bagheri, Nasour   +2 more
core   +3 more sources

Electromagnetic glitch on the AES round counter [PDF]

open access: yes, 2013
International audienceThis article presents a Round Addition Analysis on a software implementation of the Advanced Encryption Standard (AES) algorithm. The round keys are computed on-the-fly during each encryption.
Dehbaoui, Amine   +4 more
core   +2 more sources

Home - About - Disclaimer - Privacy