Improved Search for Integral, Impossible-Differential and Zero-Correlation Attacks: Application to Ascon, ForkSKINNY, SKINNY, MANTIS, PRESENT and QARMAv2 [PDF]
Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most important attacks on block ciphers. However, manually finding these attacks can be a daunting task, which is why automated methods are becoming increasingly ...
Hosein Hadipour +3 more
core
Design, realization and performance evaluation of a low latency high throughput authenticated encryption module [PDF]
LAUREA MAGISTRALELa necessità di sicurezza delle informazioni scambiate su Internet è al suo massimo. Anche le reti in fibra ottica, che compongono la spina dorsale di Internet ed erano considerate sicure, sono ora vulnerabili a tentativi di ...
dell'Oglio, Luca
core
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny [PDF]
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today.
Keting Jia +4 more
core
Autoguess: A Tool for Finding Guess-and-Determine Attacks and Key Bridges [PDF]
The guess-and-determine technique is one of the most widely used techniques in cryptanalysis to recover unknown variables in a given system of relations.
Hosein Hadipour, Maria Eichlseder
core
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMAv1 with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
doaj +1 more source
Improving the Security Bounds against Differential Attacks for Pholkos Family
SUMMARY At CT-RSA 2022, Bossert et al. proposed Pholkos family, an efficient large-state tweakable block cipher. In order to evaluate the security of differential attacks on Pholkos , they obtained the lower bounds for the number of active S-boxes for ...
Nobuyuki Takeuchi +3 more
semanticscholar +1 more source
Computing the Differential Probability of a Word-Based Block Cipher
Differential cryptanalysis is one of the fundamental cryptanalysis techniques to evaluate the security of the block cipher. In many cases, resistance to differential cryptanalysis is proven through the upper bound of the differential characteristic ...
Dawoon Kwon, Junghwan Song
doaj +1 more source
Related-Tweakey Impossible Differential Attack on Reduced-Round Deoxys-BC-256 [PDF]
Deoxys-BC is the internal tweakable block cipher of Deoxys, a third-round authenticated encryption candidate at the CAESAR competition. In this study, by adequately studying the tweakey schedule, we seek a six-round related-tweakey impossible ...
Rui Zong, Xiaoyang Dong, Xiaoyun Wang
core
Cryptanalysis of QARMAv2 [PDF]
QARMAv2 is a general-purpose and hardware-oriented family of lightweight tweakable block ciphers (TBCs) introduced in ToSC 2023. QARMAv2, as a redesign of QARMA with a longer tweak and tighter security margins, is also designed to be suitable for ...
Hosein Hadipour, Yosuke Todo
core
Chosen-Key Distinguishing Attacks on Full AES-192, AES-256, Kiasu-BC, and More [PDF]
At CRYPTO 2020, Liu et al. find that many differentials on Gimli are actually incompatible. On the related-key differential of AES, the incompatibilities also exist and are handled in different ad-hoc ways by adding respective constraints into the ...
Phuong Pham, Shun Li, Xiaoyang Dong
core

