A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice
[chapter]
2016
Lecture Notes in Computer Science
Our results shed new light on the resilience of basic operations executed by these ciphers against CPA and help to bridge the gap between theory and practice. ...
To this end, we attacked implementations of the lightweight block ciphers AES, Fantomas, LBlock, Piccolo, PRINCE, RC5, Simon, and Speck on an 8-bit AVR processor. ...
The work of Daniel Dinu is supported by the CORE project ACRYPT (ID C12-15-4009992) funded by the Fonds National de la Recherche (FNR) Luxembourg. ...
doi:10.1007/978-3-319-39555-5_29
fatcat:brvzxxvihffbvkrxiux325zt54
Stream cipher designs: a review
2020
Science China Information Sciences
Provable secure stream cipher The current status of stream cipher design is characterized by a considerable discrepancy between theory and practice. ...
JAMBU [72] is a lightweight authenticated encryption mode submitted to CAESAR, motivated by developing secure structure that can convert lightweight block ciphers to lightweight authenticated encryption ...
doi:10.1007/s11432-018-9929-x
fatcat:owggwpyki5dydekbh6dg7zvofm
KAMAR: A Lightweight Feistel Block Cipher Using Cellular Automata
2016
Circuits and Systems
The proposed approach supports both software and hardware implementation and provides better performance compared to other existing algorithms in terms of number of slices, throughput and other hardware ...
key encryption algorithm based on 1 D cellular automata theory. ...
The symbol # denotes the block ciphers that are implemented straightforwardly in to the same FPGA device to aid precise comparative analysis. ...
doi:10.4236/cs.2016.74021
fatcat:m4ogy243krgh3oppo46ruz67wy
Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher
2021
Electronics
SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT). ...
In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core. ...
Correlation Power Analysis (CPA) Side-Channel Attack CPA attacks exploit the statistical theory of Pearson correlation between a chosen hypothetical power model and the actual current consumption for various ...
doi:10.3390/electronics10121438
fatcat:p3hwnzgtgnewhbfwwpvhe2t5rq
A New Lightweight Stream Cipher Based on Chaos
2019
Symmetry
Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is ...
completed to analyze the cipher. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/sym11070853
fatcat:gw6filhqqzdptgx3fki2mqcnw4
Observations on the SIMON Block Cipher Family
[chapter]
2015
Lecture Notes in Computer Science
In this paper we analyze the general class of functions underlying the SIMON block cipher. ...
As a result of this analysis we propose different sets of rotation constants, which feature better properties on some criteria, and might be interesting for further analysis. ...
In this sense the area of lightweight ciphers also increased our fundamental understanding of block ciphers. ...
doi:10.1007/978-3-662-47989-6_8
fatcat:2k2at4hvnjgopb4s3y3a7eb374
Block Ciphers – Focus on the Linear Layer (feat. PRIDE)
[chapter]
2014
Lecture Notes in Computer Science
The linear layer is a core component in any substitutionpermutation network block cipher. Its design significantly influences both the security and the efficiency of the resulting block cipher. ...
We give several instances of our construction and on top underline its value by presenting a new block cipher. ...
From a coding theory perspective, this construction corresponds to a construction known as block-interleaving (see [40] , pages 131-132). ...
doi:10.1007/978-3-662-44371-2_4
fatcat:fx6kyv6p4zdftktt4npkliv2za
Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems
2014
IEEE Embedded Systems Letters
We note that lightweight block ciphers might be better suited for low-resource environments compared to the Advanced Encryption Standard, providing low complexity and power consumption. ...
Indeed, lightweight block ciphers are essential for providing low-cost confidentiality to such applications. ...
The main differences between the lightweight block ciphers and the conventional block ciphers are centered on: the block size for a lightweight block cipher is generally 32, 48 or 64 bits and equal to ...
doi:10.1109/les.2014.2365099
fatcat:bmpoyosicbh67bffjc5d2isrou
Generic Parity Based Concurrent Error Detection for Lightweight ARX Ciphers
2020
IEEE Access
INDEX TERMS Concurrent error detection, group based parity prediction, lightweight cryptography, ARX cipher primitive, directed acyclic graph, transient fault. ...
We propose an algorithm to generate a group parity based concurrent error detection for generic ciphers based on addition, rotation and XOR (ARX). ...
He has coauthored the book Cryptography for Security and Privacy in Cloud Computing (Artech House) and was an Editor of the Springer book Game Theory for Security and Risk Management: From Theory to Practice ...
doi:10.1109/access.2020.3010555
fatcat:y7prf4gyondhdlkohrpcywfbam
The DBlock family of block ciphers
2015
Science China Information Sciences
In this paper, we propose a new family of block ciphers named DBlock. It consists of three variants which are specified as respectively. DBlock-n has the equal n-bit block length and key length. ...
The structure of DBlock successfully combines the advantages of Feistel and Type-2 generalized Feistel structures together. ...
According to the analysis in [16] , a general meet-in-the-middle attack can always be mounted against any practical block ciphers, and they suggest that when the number of rounds is fixed, it is better ...
doi:10.1007/s11432-014-5219-0
fatcat:kmj5v65jijgmpa3kygk25geyh4
Improved Cube Attacks on some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
2020
IEEE Access
The attacks can improve the number of attacking rounds and efficiency, and provide a vital reference for security analysis of other Authenticated Encryption ciphers and lightweight stream ciphers. ...
In this work, we investigate the security of Authenticated Encryption ciphers and stream cipher by using the improved cube attack. ...
It can be used to construct the integral distinguisher against block ciphers with non-linear components. ...
doi:10.1109/access.2020.2967070
fatcat:dxgjrojilvhsde3s7njcc6dl5u
SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher
[article]
2020
arXiv
pre-print
On a lightweight implementation of the Ascon authenticated cipher on the Artix-7 FPGA, SCARL is able to recover the secret key using 24K power traces during the key insertion, or Initialization Stage, ...
of the cipher. ...
Manuscript submitted to ACM Model-based power analysis techniques are based on finding the maximum correlation between the data leakage of (1) and the power measurements. ...
arXiv:2006.03995v1
fatcat:hmcsk4duq5enpmyvgkz267hmgy
The Robust Stream Cipher for Securing Data in the Smartphones
2019
Journal of University of Babylon for Engineering Sciences
In this study presented a new design for the stream cipher to protect mobile data. The strength of stream cipher depends on it is' key. There are several methods to generate key. ...
One of these techniques is a stream cipher which considered the strongest and fastest method used in encryption and decryption process. ...
In fact, it is not found any method or mathematical theory can analysis them until now. So, it is considered one of the most powerful ways to design the keystream [7] . ...
doi:10.29196/jubes.v27i1.1981
fatcat:ob6rahgijncopayiuqlgbxpagm
SLEPX: An Efficient Lightweight Cipher for Visual Protection of Scalable HEVC Extension
2020
IEEE Access
Given that the key-length for SLEPX is a power of two, it is important to assemble blocks of SE elements that are also dyadic, i.e. a power of two. ...
To examine the analysis of correlation coefficient of the SLEPX, the following steps occurred: Selection of 1000 pixels randomly from the video sequences under test (Jockey, Kimono, Four People and Paris ...
He has more than 10 years of teaching and R&D experience. ...
doi:10.1109/access.2020.3030608
fatcat:nxg5pqqh7rhwdiyosvmaixeaue
Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency
2021
Transactions on Cryptographic Hardware and Embedded Systems
To improve this cryptanalytic analysis, we use the noisy probing model which allows for the inclusion of noise in the framework of Beyne et al. ...
This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle. ...
Tim Beyne and Siemen Dhooghe are supported by a PhD Fellowship from the Research Foundation -Flanders (FWO). ...
doi:10.46586/tches.v2022.i1.679-721
fatcat:tsmt4xjlbrdjpfn5fvi5giee6i
« Previous
Showing results 1 — 15 out of 537 results