Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques [PDF]
Simeck is a new family of lightweight block cipher proposed by Yang $$et\ al.$$ in CHES'15, which performs efficiently in hardware implementation. In this paper, we search out Simeck's differentials with low Hamming weight and high probability using Kolbl's tool, then exploit the links between differentials and linear characteristics to construct ...
Lingyue Qin, Huaifeng Chen, Xiaoyun Wang
core +4 more sources
SIMECK-T: An Ultra-Lightweight Encryption Scheme for Resource-Constrained Devices
The Internet of Things produces vast amounts of data that require specialized algorithms in order to secure them. Lightweight cryptography requires ciphers designed to work on resource-constrained devices like sensors and smart things.
Alin-Adrian Anton +3 more
doaj +2 more sources
sLiSCP: Simeck-Based Permutations for Lightweight Sponge Cryptographic Primitives [PDF]
In this paper, we propose a family of lightweight cryptographic permutations, named sLiSCP, with the sole aim to provide a realistic minimal design that suits a variety of lightweight device applications. More precisely, we argue that for such devices the area dedicated for security purposes should not only be consumed by an encryption or hashing ...
Riham AlTawy +5 more
openaire +3 more sources
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs [PDF]
The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it.
Debasmita Chakraborty +3 more
doaj +3 more sources
Design and cryptanalysis of a new iterative structure
We propose a new iterative structure called the L‐Feistel structure, which has a similar encryption with decryption. The L‐Feistel structure not only provides a unified view of the Feistel structure and the Lai–Massey structure but also enlarges the choices of structures for block cipher designs.
Jiajie Liu, Bing Sun, Chao Li
wiley +1 more source
ALICA: A Multi‐S‐Box Lightweight Cryptographic Algorithm Based on Generalized Feistel Structure
With the development of science and technology, IoT devices have already become ubiquitous in the public eye. Through the perception layer, the collected data are displayed or transmitted to the server backend for analysis. Due to the increasing integration of IoT devices into people’s daily lives, privacy issues, such as data leaks, have received more
Jun Ye +4 more
wiley +1 more source
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)
Abstract Automated search methods based on Satisfiability Modulo Theory (SMT) problems are being widely used to evaluate the security of block ciphers against distinguishing attacks. While these methods provide a systematic and generic methodology, most of their software implementations are limited to a small set of ciphers and attacks, and extending ...
Adrián Ranea, Vincent Rijmen
wiley +1 more source
Slide Attack on Full‐Round ULC Lightweight Block Cipher Designed for IoT
To meet the security demand for IoT devices, many new lightweight block ciphers are proposed. ULC is a lightweight block cipher designed for the IoT. It has many advantages in terms of memory use, efficiency, and security. In this paper, a slide attack on full‐round ULC is proposed in a related key setting.
Kai Zhang +5 more
wiley +1 more source
Multiple Differential Distinguisher of SIMECK32/64 Based on Deep Learning
Currently, deep learning has provided an important means to solve problems in various fields. Intelligent computing will bring a new solution to the security analysis of lightweight block cipher as its analysis becomes more and more intelligent and automatic.
Huijiao Wang +5 more
wiley +1 more source
An Efficient Lightweight Cryptographic Instructions Set Extension for IoT Device Security
The Internet of Things is changing all sectors such as manufacturing, agriculture, city infrastructure, and the automotive industry. All these applications ask for secure processors that can be embedded in the IoT devices. Furthermore, these devices are restricted in terms of computing capabilities, memory, and power consumption.
Wajih El Hadj Youssef +5 more
wiley +1 more source

