Results 61 to 70 of about 1,484 (155)

Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds

open access: yesIACR Transactions on Symmetric Cryptology
A secure n-bit tweakable block cipher (TBC) using t-bit tweaks can be modeled as a tweakable uniform random permutation, where each tweak defines an independent random n-bit permutation.
Wonseok Choi, Jooyoung Lee, Yeongmin Lee
doaj   +1 more source

Improved Meet-in-the-Middle Attacks on Reduced-Round Tweakable Block Cipher Deoxys-BC

open access: yesThe Computer Journal, 2021
Abstract Deoxys-BC is an internal tweakable block cipher of the authenticated encryption algorithm Deoxys, which is a third-round finalist in the CAESAR competition. In this paper, we study the property of Deoxys-BC, such as the subtweakey difference cancelation and the freedom of the tweak.
Manman Li, Shaozhen Chen
openaire   +1 more source

Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method

open access: yesCybersecurity
We present practical attacks on IAR-CTR and IAR-CFB, AE modes proposed by Hwang and Gope to offer both privacy and authenticity in a single pass. Then we use the idea of iCOFB, which is originally defined with a tweakable random function, to fix the IAR ...
Xueqi Zhu   +4 more
doaj   +1 more source

Improved meet‐in‐the‐middle attacks on reduced‐round Joltik‐BC

open access: yesIET Information Security, 2021
Joltik‐BC is an internal tweakable block cipher of the authenticated encryption algorithm Joltik, which was a second‐round finalist in the CAESAR competition.
Manman Li, Shaozhen Chen
doaj   +1 more source

Practical Low Data-Complexity Subspace-Trail Cryptanalysis of Round-Reduced PRINCE [PDF]

open access: yes, 2016
Subspace trail cryptanalysis is a very recent new cryptanalysis technique, and includes differential, truncated differential, impossible differential, and integral attacks as special cases.
C Beierle   +12 more
core   +2 more sources

Improved meet-in-the-middle attack on reduced-round Kiasu-BC algorithm

open access: yesTongxin xuebao, 2022
Kiasu-BC algorithm is an internal tweakable block cipher of authenticated encryption algorithm Kiasu as one of first-round candidates in the CAESAR competition.The precomputation complexity is reduced by utilizing the freedom of the tweak and the ...
Manman LI, Shaozhen CHEN
doaj   +2 more sources

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384. We show that the related-tweakey differential bounds provided by the designers can be greatly improved thanks to a Mixed ...
Cid, Carlos   +4 more
openaire   +4 more sources

Impossible differential cryptanalysis of lightweight tweakable block cipher CRAFT

open access: yesCybersecurity
The CRAFT cipher is a lightweight tweakable block cipher introduced at FSE 2019. Its design aims to incorporate countermeasures against Differential Fault Attacks at the algorithmic level.
Fen Liu   +5 more
doaj   +1 more source

BEANIE – A 32-bit Cipher for Cryptographic Mitigations Against Software Attacks

open access: yesIACR Transactions on Symmetric Cryptology
In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks
Simon Gerhalter   +9 more
doaj   +1 more source

An IoT Endpoint System-on-Chip for Secure and Energy-Efficient Near-Sensor Analytics

open access: yes, 2017
Near-sensor data analytics is a promising direction for IoT endpoints, as it minimizes energy spent on communication and reduces network load - but it also poses security concerns, as valuable data is stored or sent over the network at various stages of ...
Benini, Luca   +11 more
core   +1 more source

Home - About - Disclaimer - Privacy