A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA
[chapter]
2016
Lecture Notes in Computer Science
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with respect to XOR-difference, and develop Mouha et al.' ...
The new method reduces the searching time a lot and makes it possible to search differential characteristics for ARX block ciphers with large word sizes such as n = 48, 64. ...
Acknowledgement: The authors would like to thank Jian Guo for his valuable suggestions and thank the anonymous reviewers for their valuable comments and suggestions. ...
doi:10.1007/978-3-319-40367-0_24
fatcat:qnnvmvvmwfhezg7heivko55mbu
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
[chapter]
2016
Lecture Notes in Computer Science
The practical application of the new algorithm is demonstrated on reduced round variants of block ciphers from the Speck family. ...
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers. ...
Acknowledgments We thank our colleagues from the Laboratory of Algorithmics, Cryptology and Security (LACS) at the University of Luxembourg for the stimulating discus- ...
doi:10.1007/978-3-662-52993-5_15
fatcat:y7vyfvhfuvdapmduu6sx3su42u
CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices
[chapter]
2018
Lecture Notes in Computer Science
Among these algorithms, SIMON and SPECK designed by NSA in 2013, are the most focused and evaluated ciphers. They are families of non-S-box based lightweight block ciphers. ...
Table 2 shows a brief comparison with SPECK on the two widely adopted target platforms of Atmega128 and MSP430. ...
Moreover, the simplicity and flexibility of CHAM allow one to design ciphers with other block sizes and key lengths. Of course, a rigorous security analysis should be followed. ...
doi:10.1007/978-3-319-78556-1_1
fatcat:fcilmpcigjd27bujxww2kicu24
MILP-Based Automatic Differential Search forLEA and HIGHT Block Ciphers
2020
IET Information Security
The authors use the mixed-integer linear programming (MILP) technique for the automatic search for differential characteristics of LEA and HIGHT ciphers. ...
In the case of HIGHT block cipher, they found new 12-and 13-round differentials, though with the same best-reported probabilities. * ...
Differential analysis of LEA block cipher using MILP method LEA is an ARX block cipher proposed by Hong et al. in Workshop on Information Security Applications 2009 [9] . ...
doi:10.1049/iet-ifs.2018.5539
fatcat:v3e4owgqsjb2tnzt2iwhyp7lyy
PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices
2019
Sensors
We verify that ChaCha20-Poly1305 is a very good option for resource constrained devices, along with the lightweight block ciphers SPECK128 and LEA. ...
measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC. ...
Acknowledgments: The research of André Filipe Sales Mendes has been co-financed by the European Social Fund and Junta de Castilla y León (Operational Programme 2014-2020 for Castilla y León, EDU/556/2019 ...
doi:10.3390/s19194312
fatcat:tzra7jduxfberhx2xslirg3mdy
BRISK: Dynamic Encryption Based Cipher for Long Term Security
2021
Sensors
In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit. ...
Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message. ...
[41, 42] presented an heuristic tool to find differential path for ARX based ciphers. ...
doi:10.3390/s21175744
pmid:34502635
fatcat:suobfqpiibh2hew7rwvdwe7amy
Triathlon of lightweight block ciphers for the Internet of things
2018
Journal of Cryptographic Engineering
The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state-of-the-art and allows standardization organizations to conduct a fair and consistent ...
In this paper we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms. ...
Acknowledgements We thank all contributors listed at http://www.cryptolux.org/index.php/FELICS_Contributors for the submitted implementations and their support for a fair evaluation of lightweight block ...
doi:10.1007/s13389-018-0193-x
fatcat:vs3xmwzyzren5amerho5cwnztu
Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors
2021
Mathematics
In this paper, we present a novel approach to prevent crypto-ransomware by detecting block cipher algorithms for Internet of Things (IoT) platforms. ...
The general software from AVR packages and block cipher implementations written in C language from lightweight block cipher library(i.e., Fair Evaluation of Lightweight Cryptographic Systems (FELICS)) ...
In Reference [8] , an approach is presented to automatically identify parameters and block cipher algorithms in the binary code, and it is based on static. ...
doi:10.3390/math9070705
fatcat:ewsyc55elrd77pn6w3qv3su4wu
Cryptanalysis of Reduced-round SPECK
2019
IEEE Access
SPECK, a family of lightweight block ciphers proposed by the National Security Agency (NSA), is widely used under resource constrained environment. ...
INDEX TERMS Block cipher, impossible differential cryptanalysis, zero-correlation linear cryptanalysis, integral cryptanalysis, SPECK, design rationale. ...
A BRIEF DESCRIPTION ON SPECK SPECK is a family of ARX-based block ciphers. ...
doi:10.1109/access.2019.2917015
fatcat:gf2dzy7dufcnzghjqjon4m5miu
Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64
2020
Security and Communication Networks
With the combination of the optimization strategies and the branch-and-bound search algorithm, we can improve the search efficiency for linear characteristics on ARX ciphers. ...
In this paper, we revisit the Walsh transformation for linear correlation calculation of modular addition, and an efficient algorithm is proposed to construct the input-output mask space of specified correlation ...
CHAM is a family of lightweight block ciphers that was proposed by Koo et al. at ICISC′17, which blends the good designs of SIMON and SPECK [7] . 3 variants of CHAM have two kinds of block size, i.e., ...
doi:10.1155/2020/4898612
fatcat:aefw3q7gpjayjaibexlj2r2jym
Accelerating the Search of Differential and Linear Characteristics with the SAT Method
2021
IACR Transactions on Symmetric Cryptology
For PRESENT, GIFT-64, RECTANGLE, LBlock, TWINE, and some versions in SIMON and SPECK families of block ciphers, we obtain the complete bounds (full rounds) on the number of active S-boxes, the differential ...
The new idea is applied to search for optimal differential and linear characteristics for multiple ciphers. ...
Acknowledgments The authors would like to thank the shepherd Stefan Kölbl and the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper. ...
doi:10.46586/tosc.v2021.i1.269-315
fatcat:sfdtcdt3cbhdjmoozh5qjasawy
LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications
2021
KSII Transactions on Internet and Information Systems
Moreover, this newly designed technique is tested on (Virtex-7) XC7VX330T FPGA board and it takes much little area of 224 GE (Gate Equivalent) and is extremely fast with very less combinational path delay ...
LCB exploits the benefits of Feistel structure and the architectural benefits of substitution permutation network both to give more security. ...
Scheme of Ministry of Human Resource and Development, Government of India, being implemented by Digital India Corporation. ...
doi:10.3837/tiis.2021.11.014
fatcat:beell73eqjcmfbzsnbgxhc4yvi
Lightweight Cryptographic for Securing Constrained Resource IoT Devices
2020
International journal of recent technology and engineering
Many kinds of research continue moving forward to find a suitable algorithm that meets the specific demands of the IoT application. ...
The idea is to connect a variety of objects or things (e.g., RFID tags, NFC tags, sensors, etc.), which can interact and exchange data with each other anywhere and everywhere over the internet. ...
32
64
128
Related key
RC5
ARX
Not fixed
20
32
16
Differential and Timing
Table V . ...
doi:10.35940/ijitee.d9060.029420
fatcat:fne4gzufcnfslpsua4jw2ifpzm
MILP-aided Cryptanalysis of Round Reduced ChaCha
unpublished
The inclusion of ChaCha20 and Poly1305 into the list of supported ciphers in TLS 1.3 necessitates a security evaluation of those ciphers with all the state-of-the-art tools and innovative cryptanalysis ...
Mixed Integer Linear Programming (MILP) has been successfully applied to find more accurate characteristics of several ciphers such as SIMON and SPECK. ...
In [15] Sun et al. used MILP to propose an automatic method for finding high probability differential and linear characteristics of block ciphers. ...
fatcat:coht7tuzzfcypb3mnzsrzs2azy