Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds
A secure n-bit tweakable block cipher (TBC) using t-bit tweaks can be modeled as a tweakable uniform random permutation, where each tweak defines an independent random n-bit permutation.
Wonseok Choi, Jooyoung Lee, Yeongmin Lee
doaj +1 more source
Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC
Abstract Deoxys-BC is an internal tweakable block cipher of the authenticated encryption algorithm Deoxys, which is a third-round finalist in the CAESAR competition. In this paper, we study the property of Deoxys-BC, such as the subtweakey difference cancelation and the freedom of the tweak.
Manman Li, Shaozhen Chen
openaire +1 more source
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
We present practical attacks on IAR-CTR and IAR-CFB, AE modes proposed by Hwang and Gope to offer both privacy and authenticity in a single pass. Then we use the idea of iCOFB, which is originally defined with a tweakable random function, to fix the IAR ...
Xueqi Zhu +4 more
doaj +1 more source
Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC
Joltik‐BC is an internal tweakable block cipher of the authenticated encryption algorithm Joltik, which was a second‐round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
doaj +1 more source
Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle +12 more
core +2 more sources
Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm
Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the ...
Manman LI, Shaozhen CHEN
doaj +2 more sources
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384. We show that the related-tweakey differential bounds provided by the designers can be greatly improved thanks to a Mixed ...
Cid, Carlos +4 more
openaire +4 more sources
Impossible differential cryptanalysis of lightweight tweakable block cipher CRAFT
The CRAFT cipher is a lightweight tweakable block cipher introduced at FSE 2019. Its design aims to incorporate countermeasures against Differential Fault Attacks at the algorithmic level.
Fen Liu +5 more
doaj +1 more source
BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter +9 more
doaj +1 more source
An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca +11 more
core +1 more source

