Automated Differential‐Linear Cryptanalysis for AND‐RX Ciphers
Differential and linear cryptanalysis are two important methods to evaluate the security of block ciphers. Building on these two methods, differential‐linear (DL) cryptanalysis was introduced by Langford and Hellman in 1994. This cryptanalytic method has been not only extensively researched but also proven to be effective.
Wenya Li, Kai Zhang, Bin Hu, Yong Yu
wiley +1 more source
Design and Analysis of Cryptographic Hash Functions [PDF]
Wydział Matematyki i InformatykiKryptograficzne funkcje haszujące stanowią element składowy wielu algorytmów kryptograficznych. Przykładowymi zastosowaniami kryptograficznych funkcji haszujących są podpisy cyfrowe oraz kody uwierzytelniania wiadomości.
Sokołowski, Przemysław
core
New Differential‐Based Distinguishers for Ascon via Constraint Programming
As the winner of the NIST lightweight cryptography project, Ascon has undergone extensive self‐evaluation and third‐party cryptanalysis. In this paper, we use constraint programming (CP) as a tool to analyze the Ascon permutation and propose several differential‐based distinguishers.
Chan Song +3 more
wiley +1 more source
Differential‐linear (DL) cryptanalysis is an important cryptanalytic method in cryptography and has received extensive attention from the cryptography community since its proposal by Langford and Hellman in 1994. At CT‐RSA 2023, Bellini et al. introduced continuous difference propagations of XOR, rotation, and modulo‐addition operations and proposed a ...
Yanyan Zhou +3 more
wiley +1 more source
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. [PDF]
Azimi SA +5 more
europepmc +1 more source
An Easy-to-Use Tool for Rotational-XOR Cryptanalysis of ARX Block Ciphers [PDF]
An increasing number of lightweight cryptographic primitives have been published recently. Some of these proposals are ARX primitives, which have shown a great performance in software.
Adrian Ranea, Tomer Ashur, Yunwen Liu
core
Allocating Rotational Cryptanalysis based Preimage Attack on 4-round Keccak-224 for Quantum Setting [PDF]
In this paper, we aim to present a quantum setting oriented preimage attack against 4-round Keccak-224. An important technique we called the allocating rotational cryptanalysis takes the preimage attack into the situation of 2-block preimage recovery ...
Baocang Wang +4 more
core
A Survey on Air-Gap Attacks: Fundamentals, Transport Means, Attack Scenarios and Challenges. [PDF]
Park J, Yoo J, Yu J, Lee J, Song J.
europepmc +1 more source
Extending Differential Fault Analysis to Dynamic S-Box Advanced Encryption Standard Implementations [PDF]
Advanced Encryption Standard (AES) is a worldwide cryptographic standard for symmetric key cryptography. Many attacks try to exploit inherent weaknesses in the algorithm or use side channels to reduce entropy.
Flamm, Bradley M.
core +1 more source
A highly nonlinear substitution-box (S-box) design using action of modular group on a projective line over a finite field. [PDF]
Siddiqui N +7 more
europepmc +1 more source

