493 Hits in 9.4 sec

A Review on Performance Evaluation Criteria and Tools for Lightweight Block Ciphers

Deepti Sehrawat, Maharshi Dayanand University, Rohtak, Haryana (India)
2019 International Journal of Advanced Trends in Computer Science and Engineering  
Security is considered as one of the most important concerns of constraint end nodes.  ...  Internet of Things (IoT) has become a powerful paradigm that has made significant progress in almost all areas. It has attracted worldwide attention in the smart computing environment.  ...  Various attacks are applied on Trivium and analyzed like linear approximation [54] , conditional differential attack, differential fault attack, statistical attack, algebraic analysis, fault attack [  ... 
doi:10.30534/ijatcse/2019/47832019 fatcat:h53wq7vj6bfdxhuekl7t7cz2yi

A Survey on Stream Ciphers for Constrained Environments

Alaa Kadhim Farhan
2021 Zenodo  
The conclusion is the Fruit stream cipher has good resistance to known attacks, whereas the Enocoro128 and F-FCSR stream ciphers have large throughputs, as well as a WG, Grain, and MICKEY-128 stream ciphers  ...  Therefore, IoT devices must ensure basic security characteristics to protect that information. In this paper, we will make a survey on a solution that used stream cipher in cryptography.  ...  Three shift registers (3SHR) 86[56] Guess and Determine+algebraic + Resynchronization attacks Salsa[21] 2005 128/256 512 128 ARX 160.46[55] Power analysis attacks+ differential attacks Grain[23] 2005 80  ... 
doi:10.5281/zenodo.5732804 fatcat:5izov35nwzbrzp6nkjgftvqzpy

Differential Fault Attack on Grain v1, ACORN v3 and Lizard [chapter]

Akhilesh Siddhanti, Santanu Sarkar, Subhamoy Maitra, Anupam Chattopadhyay
2017 Lecture Notes in Computer Science  
ACORN v3 is a third round candidate of CAESAR and there is only one hard fault attack on an earlier version of this cipher.  ...  Differential Fault Attack (DFA) is presently a very well known technique to evaluate security of a stream cipher. This considers that the stream cipher can be weakened by injection of the fault.  ...  To obtain the streams, the attacker needs to re-key the cipher a few times and inject the required number of faults. A.  ... 
doi:10.1007/978-3-319-71501-8_14 fatcat:2eqv6ima2naiblx2dpr2s7kq74

On DPA-Resistive Implementation of FSR-based Stream Ciphers using SABL Logic Styles

Reza Ebrahimi Atani, Sattar Mirzakuchaki, Shahabaddin Ebrahimi Atani, Willi Meier
2008 International Journal of Computers Communications & Control  
Circuit simulations and statistical power analysis show that DPA resistivity of SABL implementation of both stream ciphers has a major improvement.  ...  Particularly, two Feedback Shift Register (FSR) based stream ciphers, Grain v.1 and Trivium are designed in both BSim3 130nm and typical 350nm technologies and simulated by HSpice software.  ...  In that paper, a chosen IV DPA attack on Grain and Trivium stream ciphers has been described and executed. Protecting implementations against DPA attacks is usually difficult and expensive.  ... 
doi:10.15837/ijccc.2008.4.2400 fatcat:36p2caastndbpbspc22q3zd3jy

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
There are three stream ciphers, Grain-128a, Grain-128, and Grain-v1, in the Grain family, where Grain-v1 is in the eSTREAM portfolio and Grain-128a is standardized by ISO/IEC.  ...  Grain series Grain family.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

Grain-128a: a new version of Grain-128 with optional authentication

Martin Ågren, Martin Hell, Thomas Johansson, Willi Meier
2011 International Journal of Wireless and Mobile Computing  
A new version of the stream cipher Grain-128 is proposed.  ...  The new version, Grain-128a, is strengthened against all known attacks and observations on the original Grain-128, and has built-in support for optional authentication.  ...  Conclusion A new stream cipher, Grain-128a, has been presented. The design is a new member in the family of Grain stream ciphers. The size of the key is 128 bits and the size of the IV is 96 bits.  ... 
doi:10.1504/ijwmc.2011.044106 fatcat:bxcud66u3zdftpcllzcrrc67vi

Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD

Iftekhar Salam, Thian Hooi Ooi, Luxin Xue, Wei-Chuen Yau, Josef Pieprzyk, Raphael C.-W. Phan
2021 IEEE Access  
Grain-128AEAD belongs to the Grain family of stream ciphers that consists of Grain-v1 [3] , Grain-128 [4] , Grain-128a [5] and Grain-128AEAD [2] .  ...  The design of the Grain family of stream ciphers has matured from its first version Grainv1 (that is a one of the winning algorithms in the eStream project [6] ) to the last version called Grain-128AEAD  ... 
doi:10.1109/access.2021.3078845 fatcat:kfrlficqrnbf5nvd6kw5odk7v4

Secure and Efficient Implementation of Symmetric Encryption Schemes using FPGAs [chapter]

François-Xavier Standaert
2009 Cryptographic Engineering  
This chapter discusses how the specificities of Field Programmable Gate Arrays (FPGAs) can be exploited for the secure and efficient implementation of symmetric cryptographic algorithms and protocols.  ...  Due to its potential to greatly accelerate a wide variety of applications, reconfigurable computing has gained importance in the industrial development of digital signal processing systems.  ...  Acknowledgements: The author would like to thank Fraçois Macé, Guerric Meurice and Gaël Rouvroy for meaningful comments on this work.  ... 
doi:10.1007/978-0-387-71817-0_11 fatcat:bn7exzl3mffm5k2f6f3v5firfy

A comprehensive taxonomy of security and privacy issues in RFID

Atul Kumar, Ankit Kumar Jain, Mohit Dua
2021 Complex & Intelligent Systems  
Finally, the paper describes various issues and challenges to have a better understanding of scope of the future research in the field of RFID security.  ...  Hence, this paper discusses various possible attacks that can occur on an RFID system, and several security schemes that have been proposed to handle these attacks.  ...  The family of Welch Gong (WG) stream cipher consists of excellent property of randomness, and this stream cipher efficiently executes on resource-constrained devices. Fan et al.  ... 
doi:10.1007/s40747-021-00280-6 fatcat:vqaowzxtwrh6hjaio6nmfzjay4

Differential Fault Analysis on the Key Schedule of the LBlock Algorithm

Haiyan Xiao, Lifang Wang
2022 IEEE Access  
In this paper, we study the security of LBlock against the differential fault analysis (DFA) on its key scheduling.  ...  A quantitative analysis of the input-output differentials of the S-boxes in LBlock shows that our attack reduces the searching space of master key from 2 80 to 2 23 .  ...  ACKNOWLEDGMENT The authors would like to thank the anonymous reviewers for their invaluable suggestions and comments.  ... 
doi:10.1109/access.2022.3181992 fatcat:yggccega4zc33ay3wakti62bfa

Algebraic fault analysis of SHA-3

Pei Luo, Konstantinos Athanasiou, Yunsi Fei, Thomas Wahl
2017 Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017  
Comparing with previous work on differential fault analysis of SHA-3, algebraic fault analysis can identify the injected faults with much higher rates, and recover an entire internal state of the penultimate  ...  Results show that algebraic fault analysis on SHA-3 is very efficient and effective due to the clear algebraic properties of Keccak operations.  ...  Acknowledgment: This paper is originally published in DATE'17, and supported in part by National Science Foundation under grants SaTC-1314655 and MRI-1337854.  ... 
doi:10.23919/date.2017.7926974 dblp:conf/date/LuoAFW17 fatcat:55sxqlmzmjf2pmtggmurtcxkpe

Cryptography for Network Security: Failures, Successes and Challenges [chapter]

Bart Preneel
2010 Lecture Notes in Computer Science  
and their implementations.  ...  This article discusses the state of the art for a broad range of cryptographic algorithms that are used in networking applications.  ...  This work was partially funded by the European Commission through the IST Programme under Contract ICT-2007-216676 ECRYPT II and by the Belgian Government through the IUAP Programme under contract P6/26  ... 
doi:10.1007/978-3-642-14706-7_4 fatcat:hzrbqmkyuzc2hiz3jf6whoxelu

A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks and Defenses in Cryptography [article]

Xiaoxuan Lou, Tianwei Zhang, Jun Jiang, Yinqian Zhang
2021 arXiv   pre-print
One popular type of such attacks is the microarchitectural attack, where the adversary exploits the hardware features to break the protection enforced by the operating system and steal the secrets from  ...  Side-channel attacks have become a severe threat to the confidentiality of computer applications and systems.  ...  [125] applied the cache timing analysis on LFSR-based stream ciphers, and proposed a general framework showing that the internal state of these ciphers can be recovered with very little computational  ... 
arXiv:2103.14244v1 fatcat:u35eyivqbngplfa4qrswfsqqti

Architectures of flexible symmetric key crypto engines—a survey

Lilian Bossuet, Michael Grand, Lubos Gaspar, Viktor Fischer, Guy Gogniat
2013 ACM Computing Surveys  
block ciphers, stream ciphers, and hash functions).  ...  of the information to be protected and on the cost of protection.  ...  Its design is based on the analysis of the common functional requirements of a wide range of block ciphers (more than 40 algorithms were analyzed).  ... 
doi:10.1145/2501654.2501655 fatcat:h5pccigb35hfvinkrpn7s75gl4

Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity

Ahmed Alamer, Ben Soh, Ahmed H. Alahmadi, David E. Brumbaugh
2019 IEEE Access  
, distribution, and alteration of the IVs and keys for use with the MICKEY 2.0 stream cipher.  ...  Considering the limitations of RFID tagging in terms of space, power, and storage, there is a need for practical low-power hardware microcontrollers with lightweight encryption methods suitable for implementation  ...  In addition, the complexity of its interior design ensures that the cipher shows more resistance to differential fault attacks than do Trivium and Grain ciphers [16] .  ... 
doi:10.1109/access.2019.2954413 fatcat:vqdy65c7nfdvdb3xalib5i5y5m
« Previous Showing results 1 — 15 out of 493 results