Results 11 to 20 of about 423 (100)

MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC [PDF]

open access: yesIEEE Access, 2019
In this paper, we study the relation of related-tweak/key impossible differentials with single-key ones. Following a heuristic strategy, we can derive longer related-tweak/key impossible differentials from single-key ones. We implement this strategy with
Rui Zong, Xiaoyang Dong
doaj   +4 more sources

Improved Rectangle Attacks on SKINNY and CRAFT [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2021
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short ...
Hosein Hadipour   +2 more
doaj   +3 more sources

Impossible Boomerang Attacks Revisited

open access: yesIACR Transactions on Symmetric Cryptology
The impossible boomerang (IB) attack was first introduced by Lu in his doctoral thesis and subsequently published at DCC in 2011. The IB attack is a variant of the impossible differential (ID) attack by incorporating the idea of the boomerang attack. In
Jianing Zhang, Haoyang Wang, Deng Tang
doaj   +2 more sources

A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers

open access: yesIACR Transactions on Symmetric Cryptology, 2017
In this article, we provide the first independent security analysis of Deoxys, a third-round authenticated encryption candidate of the CAESAR competition, and its internal tweakable block ciphers Deoxys-BC-256 and Deoxys-BC-384.
Carlos Cid   +4 more
doaj   +2 more sources

Analysis of AES, SKINNY, and Others with Constraint Programming

open access: yesIACR Transactions on Symmetric Cryptology, 2017
Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems.
Siwei Sun   +6 more
doaj   +2 more sources

Clustering Related-Tweak Characteristics: Application to MANTIS-6

open access: yesIACR Transactions on Symmetric Cryptology, 2018
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. Several recent attacks have analyzed the implications of this approach for differential cryptanalysis and ...
Maria Eichlseder, Daniel Kales
doaj   +2 more sources

Practical Key-Recovery Attack on MANTIS5

open access: yesIACR Transactions on Symmetric Cryptology, 2017
MANTIS is a lightweight tweakable block cipher published at CRYPTO 2016. In addition to the full 14-round version, MANTIS7, the designers also propose an aggressive 10-round version, MANTIS5.
Christoph Dobraunig   +3 more
doaj   +2 more sources

Impossible differential cryptanalysis of lightweight tweakable block cipher CRAFT

open access: yesCybersecurity
The CRAFT cipher is a lightweight tweakable block cipher introduced at FSE 2019. Its design aims to incorporate countermeasures against Differential Fault Attacks at the algorithmic level.
Fen Liu   +5 more
doaj   +2 more sources

Cryptanalysis of Forkciphers [PDF]

open access: yesIACR Transactions on Symmetric Cryptology, 2020
The forkcipher framework was designed in 2018 by Andreeva et al. for authenticated encryption of short messages. Two dedicated ciphers were proposed in this framework: ForkAES based on the AES (and its tweakable variant Kiasu-BC), and ForkSkinny based on
Augustin Bariant   +2 more
doaj   +3 more sources

Dialga: A Family of Low-Latency Tweakable Block Ciphers Using Multiple Linear Layers

open access: yesIACR Transactions on Symmetric Cryptology
In this paper, we propose Dialga, a family of low-latency tweakable block ciphers designed to support 128/256-bit tweaks and 256-bit keys. Dialga achieves significantly small latency by leveraging multiple novel strategies.
Subhadeep Banik   +7 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy