Filters








14 Hits in 4.6 sec

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA [chapter]

Ling Song, Zhangjie Huang, Qianqian Yang
2016 Lecture Notes in Computer Science  
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with respect to XOR-difference, and develop Mouha et al.'  ...  The new method reduces the searching time a lot and makes it possible to search differential characteristics for ARX block ciphers with large word sizes such as n = 48, 64.  ...  Acknowledgement: The authors would like to thank Jian Guo for his valuable suggestions and thank the anonymous reviewers for their valuable comments and suggestions.  ... 
doi:10.1007/978-3-319-40367-0_24 fatcat:qnnvmvvmwfhezg7heivko55mbu

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck [chapter]

Alex Biryukov, Vesselin Velichkov, Yann Le Corre
2016 Lecture Notes in Computer Science  
The practical application of the new algorithm is demonstrated on reduced round variants of block ciphers from the Speck family.  ...  We propose the first adaptation of Matsui's algorithm for finding the best differential and linear trails to the class of ARX ciphers.  ...  Acknowledgments We thank our colleagues from the Laboratory of Algorithmics, Cryptology and Security (LACS) at the University of Luxembourg for the stimulating discus-  ... 
doi:10.1007/978-3-662-52993-5_15 fatcat:y7vyfvhfuvdapmduu6sx3su42u

CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices [chapter]

Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Dong-Geon Lee, Daesung Kwon
2018 Lecture Notes in Computer Science  
Among these algorithms, SIMON and SPECK designed by NSA in 2013, are the most focused and evaluated ciphers. They are families of non-S-box based lightweight block ciphers.  ...  Table 2 shows a brief comparison with SPECK on the two widely adopted target platforms of Atmega128 and MSP430.  ...  Moreover, the simplicity and flexibility of CHAM allow one to design ciphers with other block sizes and key lengths. Of course, a rigorous security analysis should be followed.  ... 
doi:10.1007/978-3-319-78556-1_1 fatcat:fcilmpcigjd27bujxww2kicu24

MILP-Based Automatic Differential Search forLEA and HIGHT Block Ciphers

Zahra Ahmadian, Elnaz Bagherzadeh
2020 IET Information Security  
The authors use the mixed-integer linear programming (MILP) technique for the automatic search for differential characteristics of LEA and HIGHT ciphers.  ...  In the case of HIGHT block cipher, they found new 12-and 13-round differentials, though with the same best-reported probabilities. *  ...  Differential analysis of LEA block cipher using MILP method LEA is an ARX block cipher proposed by Hong et al. in Workshop on Information Security Applications 2009 [9] .  ... 
doi:10.1049/iet-ifs.2018.5539 fatcat:v3e4owgqsjb2tnzt2iwhyp7lyy

PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices

Daniel A. F. Saraiva, Valderi Reis Quietinho Leithardt, Diandre de Paula, André Sales Mendes, Gabriel Villarrubia González, Paul Crocker
2019 Sensors  
We verify that ChaCha20-Poly1305 is a very good option for resource constrained devices, along with the lightweight block ciphers SPECK128 and LEA.  ...  measuring their execution times, throughput, and power consumption, with the main goal of determining which symmetric key ciphers are best to be applied in PRISEC.  ...  Acknowledgments: The research of André Filipe Sales Mendes has been co-financed by the European Social Fund and Junta de Castilla y León (Operational Programme 2014-2020 for Castilla y León, EDU/556/2019  ... 
doi:10.3390/s19194312 fatcat:tzra7jduxfberhx2xslirg3mdy

BRISK: Dynamic Encryption Based Cipher for Long Term Security

Ashutosh Dhar Dwivedi
2021 Sensors  
In this paper, a new block cipher, BRISK, is proposed with a block size of 32-bit.  ...  Knudsen initially proposed dynamic encryption in 2015, where the sender picks a cipher from a large pool of ciphers to encrypt the data and send it along with the encrypted message.  ...  [41, 42] presented an heuristic tool to find differential path for ARX based ciphers.  ... 
doi:10.3390/s21175744 pmid:34502635 fatcat:suobfqpiibh2hew7rwvdwe7amy

Triathlon of lightweight block ciphers for the Internet of things

Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
2018 Journal of Cryptographic Engineering  
The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state-of-the-art and allows standardization organizations to conduct a fair and consistent  ...  In this paper we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms.  ...  Acknowledgements We thank all contributors listed at http://www.cryptolux.org/index.php/FELICS_Contributors for the submitted implementations and their support for a fair evaluation of lightweight block  ... 
doi:10.1007/s13389-018-0193-x fatcat:vs3xmwzyzren5amerho5cwnztu

Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors

Hyunji Kim, Jaehoon Park, Hyeokdong Kwon, Kyoungbae Jang, Hwajeong Seo
2021 Mathematics  
In this paper, we present a novel approach to prevent crypto-ransomware by detecting block cipher algorithms for Internet of Things (IoT) platforms.  ...  The general software from AVR packages and block cipher implementations written in C language from lightweight block cipher library(i.e., Fair Evaluation of Lightweight Cryptographic Systems (FELICS))  ...  In Reference [8] , an approach is presented to automatically identify parameters and block cipher algorithms in the binary code, and it is based on static.  ... 
doi:10.3390/math9070705 fatcat:ewsyc55elrd77pn6w3qv3su4wu

Cryptanalysis of Reduced-round SPECK

Jiongjiong Ren, Shaozhen Chen
2019 IEEE Access  
SPECK, a family of lightweight block ciphers proposed by the National Security Agency (NSA), is widely used under resource constrained environment.  ...  INDEX TERMS Block cipher, impossible differential cryptanalysis, zero-correlation linear cryptanalysis, integral cryptanalysis, SPECK, design rationale.  ...  A BRIEF DESCRIPTION ON SPECK SPECK is a family of ARX-based block ciphers.  ... 
doi:10.1109/access.2019.2917015 fatcat:gf2dzy7dufcnzghjqjon4m5miu

Automatic Search for the Linear (Hull) Characteristics of ARX Ciphers: Applied to SPECK, SPARX, Chaskey, and CHAM-64

Mingjiang Huang, Liming Wang
2020 Security and Communication Networks  
With the combination of the optimization strategies and the branch-and-bound search algorithm, we can improve the search efficiency for linear characteristics on ARX ciphers.  ...  In this paper, we revisit the Walsh transformation for linear correlation calculation of modular addition, and an efficient algorithm is proposed to construct the input-output mask space of specified correlation  ...  CHAM is a family of lightweight block ciphers that was proposed by Koo et al. at ICISC′17, which blends the good designs of SIMON and SPECK [7] . 3 variants of CHAM have two kinds of block size, i.e.,  ... 
doi:10.1155/2020/4898612 fatcat:aefw3q7gpjayjaibexlj2r2jym

Accelerating the Search of Differential and Linear Characteristics with the SAT Method

Ling Sun, Wei Wang, Meiqin Wang
2021 IACR Transactions on Symmetric Cryptology  
For PRESENT, GIFT-64, RECTANGLE, LBlock, TWINE, and some versions in SIMON and SPECK families of block ciphers, we obtain the complete bounds (full rounds) on the number of active S-boxes, the differential  ...  The new idea is applied to search for optimal differential and linear characteristics for multiple ciphers.  ...  Acknowledgments The authors would like to thank the shepherd Stefan Kölbl and the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper.  ... 
doi:10.46586/tosc.v2021.i1.269-315 fatcat:sfdtcdt3cbhdjmoozh5qjasawy

LCB: Light Cipher Block An Ultrafast Lightweight Block Cipher For Resource Constrained IOT Security Applications

2021 KSII Transactions on Internet and Information Systems  
Moreover, this newly designed technique is tested on (Virtex-7) XC7VX330T FPGA board and it takes much little area of 224 GE (Gate Equivalent) and is extremely fast with very less combinational path delay  ...  LCB exploits the benefits of Feistel structure and the architectural benefits of substitution permutation network both to give more security.  ...  Scheme of Ministry of Human Resource and Development, Government of India, being implemented by Digital India Corporation.  ... 
doi:10.3837/tiis.2021.11.014 fatcat:beell73eqjcmfbzsnbgxhc4yvi

Lightweight Cryptographic for Securing Constrained Resource IoT Devices

2020 International journal of recent technology and engineering  
Many kinds of research continue moving forward to find a suitable algorithm that meets the specific demands of the IoT application.  ...  The idea is to connect a variety of objects or things (e.g., RFID tags, NFC tags, sensors, etc.), which can interact and exchange data with each other anywhere and everywhere over the internet.  ...  32 64 128 Related key RC5 ARX Not fixed 20 32 16 Differential and Timing Table V .  ... 
doi:10.35940/ijitee.d9060.029420 fatcat:fne4gzufcnfslpsua4jw2ifpzm

MILP-aided Cryptanalysis of Round Reduced ChaCha

Najwa Aaraj, Florian Caullery, Marc Darkmatter, Uae
unpublished
The inclusion of ChaCha20 and Poly1305 into the list of supported ciphers in TLS 1.3 necessitates a security evaluation of those ciphers with all the state-of-the-art tools and innovative cryptanalysis  ...  Mixed Integer Linear Programming (MILP) has been successfully applied to find more accurate characteristics of several ciphers such as SIMON and SPECK.  ...  In [15] Sun et al. used MILP to propose an automatic method for finding high probability differential and linear characteristics of block ciphers.  ... 
fatcat:coht7tuzzfcypb3mnzsrzs2azy