Filters








7 Hits in 3.5 sec

A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro [chapter]

Gregor Leander, Brice Minaud, Sondre Rønjom
2015 Lecture Notes in Computer Science  
We apply this algorithm to the CAESAR candidate iSCREAM, the closely related LS-design Robin, as well as the lightweight cipher Zorro.  ...  Here, based on a rather simple observation, we introduce a generic algorithm to detect invariant subspaces.  ...  Acknowledgments The authors would like to thank Henri Gilbert for many fruitful discussions related to the attacks presented in this article.  ... 
doi:10.1007/978-3-662-46800-5_11 fatcat:xz2bxp7hifec5n3ucjfsyqhi7m

Correlation Differential Power Analysis Attack to Midori64 [article]

Behrooz Khadem, Hamid Ghanbari, Amin Masoumi souteh
2021 arXiv   pre-print
In this paper, a differential power attack (DPA) to the Midori64 block cipher is designed.  ...  Furthermore, we obtained the master key with a smaller number of samples than the electromagnetic analysis attack.  ...  Acknowledgment The authors want to thank Mr. Mohammad Gholi, Mr. Habibi, and Mr. Mahdavi for their kind contributions during this paper.  ... 
arXiv:2108.11115v1 fatcat:7bsha7noszesveqkywxuxoitym

Catalog and Illustrative Examples of Lightweight Cryptographic Primitives [chapter]

Aleksandra Mileva, Vesna Dimitrova, Orhun Kara, Miodrag J. Mihaljević
2021 Security of Ubiquitous Computing Systems  
AbstractThe main objective of this chapter is to offer to practitioners, researchers and all interested parties a brief categorized catalog of existing lightweight symmetric primitives with their main  ...  cryptographic features, ultimate hardware performance, and existing security analysis, so they can easily compare the ciphers or choose some of them according to their needs.  ...  In the first part, a generic approach for security evaluation is discussed, and in the second an advanced dedicated approach is pointed out.  ... 
doi:10.1007/978-3-030-10591-4_2 fatcat:d2gtrxu225asnmubp5ezfloz3m

Subspace Trail Cryptanalysis and its Applications to AES

Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017 IACR Transactions on Symmetric Cryptology  
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis.  ...  With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector.  ...  We also thank Charles Bouillaguet for helping us with the tool described in [BDF11] to find attacks that better match the settings we consider.  ... 
doi:10.13154/tosc.v2016.i2.192-225 dblp:journals/tosc/GrassiRR16 fatcat:rm7yye34gvg3dc7s6jpo3hv72e

Subspace Trail Cryptanalysis and its Applications to AES

Lorenzo Grassi, Christian Rechberger, Sondre Rønjom
2017 IACR Transactions on Symmetric Cryptology  
We introduce subspace trail cryptanalysis, a generalization of invariant subspace cryptanalysis.  ...  With this more generic treatment of subspaces we do no longer rely on specific choices of round constants or subkeys, and the resulting method is as such a potentially more powerful attack vector.  ...  We also thank Charles Bouillaguet for helping us with the tool described in [BDF11] to find attacks that better match the settings we consider.  ... 
doi:10.46586/tosc.v2016.i2.192-225 fatcat:7xxvgajoyfhc3cdalrzfxm7j3i

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to {  ...  This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of  ...  We express gratitude to the authors of [BJK + 16] for the fruitful interaction, in particular to Christof Beierle for sharing his MILP modelling of the Class I state transitions used in § 3.1.2.  ... 
doi:10.13154/tosc.v2017.i1.4-44 dblp:journals/tosc/Avanzi17 fatcat:l5zgiqa3lzedpdajqqomixpabe

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to {  ...  This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of  ...  We express gratitude to the authors of [BJK + 16] for the fruitful interaction, in particular to Christof Beierle for sharing his MILP modelling of the Class I state transitions used in § 3.1.2.  ... 
doi:10.46586/tosc.v2017.i1.4-44 fatcat:iaiczp4lhzh5pgz4quzhjcj3jm