Exploring Secret Keys in Searching Integral Distinguishers Based on Division Property
Division property proposed by Todo at EUROCRYPT 2015 is a generalized integral property. Then, conventional bit-based division property (CBDP) and bitbased division property using three subsets (BDPT) were proposed by Todo and Morii at FSE 2016.
Senpeng Wang +4 more
doaj +1 more source
Deep Features and Clustering Based Keyframes Selection with Security [PDF]
The digital world is developing more quickly than ever. Multimedia processing and distribution, however become vulnerable issues due to the enormous quantity and significance of vital information.
Chauhan, Prachi +2 more
core +1 more source
Differential analysis of lightweight cipher algorithm ACE based on MILP
The differential property of the lightweight cipher algorithm ACE was researched.n-dimension ring AND-gate combination was defined and its differential property was described accurately by only O(n) expressions with the MILP method by analyzing the ...
Shuai LIU, Jie GUAN, Bin HU, Sudong MA
doaj +2 more sources
Optimal Differential Trails in SIMON-like Ciphers
In the present paper, we propose an automatic search algorithm for optimal differential trails in SIMON-like ciphers. First, we give a more accurate upper bound on the differential probability of SIMON-like round function.
Zhengbin Liu +2 more
doaj +1 more source
Rotational-XOR Cryptanalysis of Simon-like Block Ciphers [PDF]
Rotational-XOR cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in ARX-C ciphers, i.e., ciphers that can be described only using modular addition, cyclic rotation, XOR, and the injection of constants.
B Koo +16 more
core +1 more source
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor
Recently, many lightweight block ciphers are proposed, such as PRESENT, SIMON, SPECK, Simeck, SPARX, GIFT, and CHAM. Most of these ciphers are designed with Addition–Rotation–Xor (ARX)-based structure for the resource-constrained environment because ARX ...
Byoungjin Seok, Changhoon Lee
doaj +1 more source
Improved Integral Attacks on SIMON32 and SIMON48 with Dynamic Key‐Guessing Techniques
Dynamic key‐guessing techniques, which exploit the property of AND operation, could improve the differential and linear cryptanalytic results by reducing the number of guessed subkey bits and lead to good cryptanalytic results for SIMON. They have only been applied in differential and linear attacks as far as we know.
Zhihui Chu +5 more
wiley +1 more source
Secure Data Encryption for Cloud‐Based Human Care Services
Sensor network services utilize sensor data from low‐end IoT devices of the types widely deployed over long distances. After the collection of sensor data, the data is delivered to the cloud server, which processes it to extract useful information. Given that the data may contain sensitive and private information, it should be encrypted and exchanged ...
Taehwan Park +4 more
wiley +1 more source
Enabling low-latency IoT communication for resource-constrained devices with the led cipher and decipher protocol [PDF]
Block cipher algorithms are crucial for securing applications on resource-constrained devices. This paper introduces the modified light encryption device (MLED) cipher-decipher architecture, specifically designed to accommodate both 64-bit and 128-bit ...
Naik, Mahendra Shridhar +2 more
core +2 more sources
Symmetric block ciphers with a block length of 32 bit [PDF]
Subject of the thesis at hand is the analysis of symmetric block ciphers with a block length of 32 bit. It is meant to give a comprising overview over the topic of 32 bit block ciphers. The topic is divided in the examination of three questions.
Rothe, Stephan
core

