Related-tweakey impossible differential attack on QARMA-128
Science China Information Sciences, 2021Juan Du +3 more
semanticscholar +2 more sources
New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC
Chinese Journal of ElectronicsJiamei Liu, Lin Tan, Hong Xu
semanticscholar +2 more sources
Related-Key Impossible-Differential Attack on Reduced-Round Skinny [PDF]
At CRYPTO’16, Beierle et al. presented SKINNY, a family of lightweight tweakable block ciphers intended to compete with the NSA designs SIMON and SPECK.
Ralph Ankele +6 more
semanticscholar +4 more sources
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT [PDF]
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply
Boxin Zhao +4 more
semanticscholar +3 more sources
Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC
Information Security Practice and ExperienceKangkang Shi +2 more
semanticscholar +2 more sources
Impossible Differential Cryptanalysis of Reduced-Round SKINNY [PDF]
SKINNY is a new lightweight tweakable block cipher family proposed by Beierle $et$ $al$. in CRYPTO 2016. SKINNY-$n$-$t$ is a block cipher with $n$-bit state and $t$-bit tweakey (key and tweak).
Mohamed F. Tolba +2 more
semanticscholar +3 more sources
Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY [PDF]
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the
Ling Song +4 more
semanticscholar +3 more sources
Zero-Correlation Linear Cryptanalysis with Equal Treatment for Plaintexts and Tweakeys
2021The original zero-correlation linear attack on a tweakable block cipher \(E_{K, T}\) (\(E_{K, T}\) is an ordinary block cipher when \(|T| = 0\)) with key K and tweak T exploits linear approximations \(\langle \alpha , x \rangle \oplus \langle \beta , E_{K,T}(x) \rangle \) with correlation zero for any fixed K and T, where the correlation is computed ...
Chao Niu +3 more
openaire +1 more source
A Practical Forgery Attack on Lilliput-AE [PDF]
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalysis so far suggests that it has a large security margin.
O. Dunkelman +3 more
semanticscholar +3 more sources
Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC
IET Information Security, 2019Deoxys-BC is a tweakable block cipher designed by Jean et al. at ASIACRYPT 2014 within the TWEAKEY framework. Then Deoxys-BC is used in the CAESAR finalist Deoxys.
Rongjia Li, Chenhui Jin
semanticscholar +1 more source

