21,278 Hits in 3.6 sec

Ciphers Secure against Related-Key Attacks [chapter]

Stefan Lucks
2004 Lecture Notes in Computer Science  
This paper studies the security of PRF-and PRP-constructions against related-key attacks.  ...  Kelsey, Schneier and Wagner [9, 10] presented related-key attacks against several block ciphers, including three-key triple-DES.  ...  While rather simple, these observations may nevertheless be useful both for understanding the phenomenon of relatedkey security, and for designing ciphers provably secure against related-key attacks.  ... 
doi:10.1007/978-3-540-25937-4_23 fatcat:evqum7qqsrcoviup3jfozxzzfq

Sufficient condition for SNOW-2.0-like stream ciphers' to be secure against some related key attacks

Антон Миколайович Олексійчук
2016 Ukrainian Information Security Research Journal  
Поряд з тим, відомі ефективні атаки зі зв'язаними ключами (related key attacks), які базуються ЗАХИСТ ІНФОРМАЦІЇ, ТОМ 18, №4, ЖОВТЕНЬ-ГРУДЕНЬ 2016 на існуванні ключів, еквівалентних із затримкою [5] .  ...  Не відомо атак на повну версію шифру SNOW 2.0, спрямованих на відновлення єдиного ключа (single key recovery attacks), більш ефективних ніж повний перебір ключів.  ...  Нехай SUFFICIENT CONDITION FOR SNOW-2.0-LIKE STREAM CIPHERS' TO BE SECURE AGAINST SOME RELATED KEY ATTACKS A class of stream ciphers similar to the well-known SNOW 2.0 cipher is investigated.  ... 
doi:10.18372/2410-7840.18.11087 fatcat:m5e7xwfqszd75o64vgukff33qq

On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks [chapter]

Benoît Cogliati, Yannick Seurin
2015 Lecture Notes in Computer Science  
We then prove that for a linear key-schedule, three rounds yield a cipher which is secure against xor-induced related-key attacks up to O(2 n 2 ) queries of the adversary, whereas for a nonlinear key-schedule  ...  In this paper, we extend this line of work by considering the resistance of the iterated Even-Mansour cipher to xor-induced related-key attacks (i.e., related-key attacks where the adversary is allowed  ...  Acknowledgment We thank Gaëtan Leurent for pointing to our attention the related-key attack matching the security bound of Theorem 2.  ... 
doi:10.1007/978-3-662-46800-5_23 fatcat:dyikfqk23jcdlanqcjrhhihhbi

A Method for Security Estimation of the Spn-Based Block Cipher Against Related-Key Attacks

Dmytro Kaidalov, Roman Oliynykov, Oleksandr Kazymyrov
2014 Tatra Mountains Mathematical Publications  
This article presents an advanced method of finding the number of active substitutions that helps to estimate the security of encryption algorithms against related-key attacks.  ...  Several years ago it was found a theoretical attack exploiting the AES key expansion algorithm that allows reducing significantly the complexity comparing to the brute force attack.  ...  The algorithm for estimation of the number of active bytes for related-key attacks The method for cipher security estimation To prove the security of an encryption algorithm against related-key attacks  ... 
doi:10.2478/tmmp-2014-0023 fatcat:fevrpeywbfdtzd5yauyv3kveze

Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks [chapter]

Siwei Sun, Lei Hu, Ling Song, Yonghong Xie, Peng Wang
2014 Lecture Notes in Computer Science  
prove that the full-round PRESENT-80 is secure against single-key differential attack, and the cost of related-key differential attack on the full-round PRESENT-80 is close to that of an exhaustive search  ...  Our method is applied to the block cipher PRESENT-80, an international standard for lightweight symmetric key cryptography, to automatically evaluate its security against differential attacks.  ...  By extending Mouha et al's method, we propose an MILP based approach to prove the security of block ciphers of S-bP structures against single-key or related-key differential attacks automatically.  ... 
doi:10.1007/978-3-319-12087-4_3 fatcat:sb4ftueucfdd5buy3ezchtnyvq

Improved Related-key Attack against Recent Lightweight Block Cipher PRINCE
최신 경량 블록 암호 PRINCE에 대한 향상된 연관키 공격

Wangho Ju, Hyunjung An, Okyeon Yi, Ju-Sung Kang, Jongsung Kim
2014 Journal of the Korea Institute of Information Security and Cryptology  
The related-key attack is regarded as one of the important cryptanalytic tools for the security evaluation of block ciphers.  ...  In this paper, we improve the related-key attack on lightweight block cipher PRINCE proposed in FSE 2013. Our improved related-key attack on PRINCE reduces data complexity from   [4] to 2.  ...  Configuration about Improved Related-key Attack against PRINCE 와 연관키 사이의 관계를 사용하여 64-비트   를 획득한다. 4)   획득 후, 64-비트   에 대한 전수조사를 수 행한다.  ... 
doi:10.13089/jkiisc.2014.24.3.445 fatcat:xq5jy7lzijbv5ot4expmwmt7ou

Cryptanalysis Techniques for Stream Cipher: A Survey

M. U.Bokhari, Shadab Alam, Faheem Syeed Masoodi
2012 International Journal of Computer Applications  
It will also facilitate the security analysis of the existing stream ciphers and provide an opportunity to understand the requirements for developing a secure and efficient stream cipher design.  ...  Stream Ciphers are one of the most important cryptographic techniques for data security due to its efficiency in terms of resources and speed.  ...  Sekar et al. presented a related key attack on Py-family of stream ciphers [47, 48] .  ... 
doi:10.5120/9721-4187 fatcat:l2mdd2bl3jda5eb5xe2i7c6m5m

Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions [article]

Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021 IACR Cryptology ePrint Archive  
The growth of resource constrained devices have put forth a dire need for the security solutions that are feasible in terms of resources without taking a toll on the security that they offer.  ...  Block ciphers have been extremely predominant in the area of cryptography and due to the paradigm shift towards devices of resource constrained nature, lightweight block ciphers have totally influenced  ...  The security analysis shows that the cipher is resilient against conventional attacks, MIME attacks and related-key differential attacks.  ... 
dblp:journals/iacr/DarLH21 fatcat:e7degswt35gefavnsbmu53r7ky

Bright - Proposed Family of Lightweight Block Ciphers for IoT-Enabled Smart Environment

BRIGHT using round constant thwarts attacks like rotational cryptanalysis, self-similarity, invariant attack, related-key attacks, and weak key attacks.  ...  For this, we have used the concept of key whitening that helps to resist against attacks like MITM and brute-force.  ...  Talking about key scheduling, the BRIGHT family of ciphers provides a good level of security against related key attacks. B.  ... 
doi:10.35940/ijitee.i7778.078919 fatcat:4w7yxfomwnaazl63fsb6i3hvcy

A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications [chapter]

Mihir Bellare, Tadayoshi Kohno
2003 Lecture Notes in Computer Science  
We initiate a theoretical investigation of the popular block-cipher design-goal of security against "related-key attacks" (RKAs).  ...  Finally we prove security of various block-cipher based constructs that use related keys, including a tweakable block cipher given in [17] .  ...  on the security of a block cipher against Φ -restricted related-key attacks, as we did with our CBC-MAC variants.  ... 
doi:10.1007/3-540-39200-9_31 fatcat:ideklcfebffzpnfc5k3cyl7t7q

Practically secure Feistel ciphers [chapter]

Lars R. Knudsen
1994 Lecture Notes in Computer Science  
We i n troduce a new concept, practical security against linear and di erential attacks on Feistel ciphers.  ...  In this paper we give necessary design principles to be used, when constructing secure Feistel ciphers.  ...  At a rst glance it may seem strange and di cult to construct an initial key schedule yielding a cipher secure against a known plaintext attack and with no simple relations.  ... 
doi:10.1007/3-540-58108-1_26 fatcat:dleozhevefdxfh4mkdznsgcu24

Practically Secure Feistel Ciphers

Lars Ramkilde Knudsen
1994 DAIMI Report Series  
We introducee a new concept, <strong> practical security</strong> against linear and differential attacks on Feistel ciphers.  ...  In this paper we give necessary design principles to be used, when constructing secure Feistel ciphers.  ...  At a rst glance it may seem strange and di cult to construct an initial key schedule yielding a cipher secure against a known plaintext attack and with no simple relations.  ... 
doi:10.7146/dpb.v13i472.6945 fatcat:3jo7koc7vngkjndm3oge6wtdca

Notions and relations for RKA-secure permutation and function families

Jongsung Kim, Jaechul Sung, Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
2010 Designs, Codes and Cryptography  
Furthermore, recent cryptanalytic progress has shown that block ciphers well designed against known cryptanalysis techniques including related-key attacks (RKA) may turn out to be less secure against related-key  ...  of SPRP against some classes of related-key attacks (SPRP-RKA).  ...  secure against certain classes of Φ-restricted related-key attacks.  ... 
doi:10.1007/s10623-010-9414-8 fatcat:ajkmyhcgojfx3mryyogqjrnaiu

On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model [chapter]

M. R. Albrecht, P. Farshim, K. G. Paterson, G. J. Watson
2011 Lecture Notes in Computer Science  
They established sufficient conditions (output-unpredictability and collision-resistance) on the set of related-key-deriving (RKD) functions under which an ideal cipher is secure against related-key attacks  ...  Bellare and Kohno introduced a formal framework for the study of related-key attacks against blockciphers.  ...  about security against related-key attacks.  ... 
doi:10.1007/978-3-642-21702-9_8 fatcat:eejesz6qbne3zc7g6ehyaaszmy

Hybrid Lightweight and Robust Encryption Design for Security in IoT

Abhijit Patil, Gaurav Bansod, Narayan Pisharoty
2015 International Journal of Security and Its Applications  
With the help of a hybrid design, we have improved the key scheduling aspect of LED and related key attacks which were neglected in the LED cipher.  ...  This hybrid cipher design is secure against linear and differential cryptanalysis.  ...  In this paper, we aimed at improving design of LED cipher to protect against all types of attacks including a related key attack.  ... 
doi:10.14257/ijsia.2015.9.12.10 fatcat:eedlw7xhmbadjkay7k3bkfi37a
« Previous Showing results 1 — 15 out of 21,278 results