Filters








537 Hits in 5.5 sec

Correlation Power Analysis of Lightweight Block Ciphers: From Theory to Practice [chapter]

Alex Biryukov, Daniel Dinu, Johann Großschädl
2016 Lecture Notes in Computer Science  
Our results shed new light on the resilience of basic operations executed by these ciphers against CPA and help to bridge the gap between theory and practice.  ...  To this end, we attacked implementations of the lightweight block ciphers AES, Fantomas, LBlock, Piccolo, PRINCE, RC5, Simon, and Speck on an 8-bit AVR processor.  ...  The work of Daniel Dinu is supported by the CORE project ACRYPT (ID C12-15-4009992) funded by the Fonds National de la Recherche (FNR) Luxembourg.  ... 
doi:10.1007/978-3-319-39555-5_29 fatcat:brvzxxvihffbvkrxiux325zt54

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
Provable secure stream cipher The current status of stream cipher design is characterized by a considerable discrepancy between theory and practice.  ...  JAMBU [72] is a lightweight authenticated encryption mode submitted to CAESAR, motivated by developing secure structure that can convert lightweight block ciphers to lightweight authenticated encryption  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

KAMAR: A Lightweight Feistel Block Cipher Using Cellular Automata

Jegadish Kumar Kailairajan Jeyaprakash, Joseph Gladwin Seka, Kamaraj Villayutham
2016 Circuits and Systems  
The proposed approach supports both software and hardware implementation and provides better performance compared to other existing algorithms in terms of number of slices, throughput and other hardware  ...  key encryption algorithm based on 1 D cellular automata theory.  ...  The symbol # denotes the block ciphers that are implemented straightforwardly in to the same FPGA device to aid precise comparative analysis.  ... 
doi:10.4236/cs.2016.74021 fatcat:m4ogy243krgh3oppo46ruz67wy

Charge Based Power Side-Channel Attack Methodology for an Adiabatic Cipher

Krithika Dhananjay, Emre Salman
2021 Electronics  
SIMON is a block cipher developed to provide flexible security options for lightweight hardware applications such as the Internet-of-things (IoT).  ...  In this work, a charge-based methodology is developed to mount a correlation power analysis (CPA) based side-channel attack to an adiabatic SIMON core.  ...  Correlation Power Analysis (CPA) Side-Channel Attack CPA attacks exploit the statistical theory of Pearson correlation between a chosen hypothetical power model and the actual current consumption for various  ... 
doi:10.3390/electronics10121438 fatcat:p3hwnzgtgnewhbfwwpvhe2t5rq

A New Lightweight Stream Cipher Based on Chaos

Lina Ding, Chunyuan Liu, Yanpeng Zhang, Qun Ding
2019 Symmetry  
Many analyses are made from the angle of entropy in order to verify the cryptographic characteristics of the stream cipher, and National Institute of Standards and Technology (NIST) statistical test is  ...  completed to analyze the cipher.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym11070853 fatcat:gw6filhqqzdptgx3fki2mqcnw4

Observations on the SIMON Block Cipher Family [chapter]

Stefan Kölbl, Gregor Leander, Tyge Tiessen
2015 Lecture Notes in Computer Science  
In this paper we analyze the general class of functions underlying the SIMON block cipher.  ...  As a result of this analysis we propose different sets of rotation constants, which feature better properties on some criteria, and might be interesting for further analysis.  ...  In this sense the area of lightweight ciphers also increased our fundamental understanding of block ciphers.  ... 
doi:10.1007/978-3-662-47989-6_8 fatcat:2k2at4hvnjgopb4s3y3a7eb374

Block Ciphers – Focus on the Linear Layer (feat. PRIDE) [chapter]

Martin R. Albrecht, Benedikt Driessen, Elif Bilge Kavun, Gregor Leander, Christof Paar, Tolga Yalçın
2014 Lecture Notes in Computer Science  
The linear layer is a core component in any substitutionpermutation network block cipher. Its design significantly influences both the security and the efficiency of the resulting block cipher.  ...  We give several instances of our construction and on top underline its value by presenting a new block cipher.  ...  From a coding theory perspective, this construction corresponds to a construction known as block-interleaving (see [40] , pages 131-132).  ... 
doi:10.1007/978-3-662-44371-2_4 fatcat:fx6kyv6p4zdftktt4npkliv2za

Fault-Resilient Lightweight Cryptographic Block Ciphers for Secure Embedded Systems

Mehran Mozaffari-Kermani, Kai Tian, Reza Azarderakhsh, Siavash Bayat-Sarmadi
2014 IEEE Embedded Systems Letters  
We note that lightweight block ciphers might be better suited for low-resource environments compared to the Advanced Encryption Standard, providing low complexity and power consumption.  ...  Indeed, lightweight block ciphers are essential for providing low-cost confidentiality to such applications.  ...  The main differences between the lightweight block ciphers and the conventional block ciphers are centered on: the block size for a lightweight block cipher is generally 32, 48 or 64 bits and equal to  ... 
doi:10.1109/les.2014.2365099 fatcat:bmpoyosicbh67bffjc5d2isrou

Generic Parity Based Concurrent Error Detection for Lightweight ARX Ciphers

Sergei Bauer, Stefan Rass, Peter Schartner
2020 IEEE Access  
INDEX TERMS Concurrent error detection, group based parity prediction, lightweight cryptography, ARX cipher primitive, directed acyclic graph, transient fault.  ...  We propose an algorithm to generate a group parity based concurrent error detection for generic ciphers based on addition, rotation and XOR (ARX).  ...  He has coauthored the book Cryptography for Security and Privacy in Cloud Computing (Artech House) and was an Editor of the Springer book Game Theory for Security and Risk Management: From Theory to Practice  ... 
doi:10.1109/access.2020.3010555 fatcat:y7prf4gyondhdlkohrpcywfbam

The DBlock family of block ciphers

WenLing Wu, Lei Zhang, XiaoLi Yu
2015 Science China Information Sciences  
In this paper, we propose a new family of block ciphers named DBlock. It consists of three variants which are specified as respectively. DBlock-n has the equal n-bit block length and key length.  ...  The structure of DBlock successfully combines the advantages of Feistel and Type-2 generalized Feistel structures together.  ...  According to the analysis in [16] , a general meet-in-the-middle attack can always be mounted against any practical block ciphers, and they suggest that when the number of rounds is fixed, it is better  ... 
doi:10.1007/s11432-014-5219-0 fatcat:kmj5v65jijgmpa3kygk25geyh4

Improved Cube Attacks on some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things

Yu He, Gaoli Wang, Wenshan Li, Yizhi Ren
2020 IEEE Access  
The attacks can improve the number of attacking rounds and efficiency, and provide a vital reference for security analysis of other Authenticated Encryption ciphers and lightweight stream ciphers.  ...  In this work, we investigate the security of Authenticated Encryption ciphers and stream cipher by using the improved cube attack.  ...  It can be used to construct the integral distinguisher against block ciphers with non-linear components.  ... 
doi:10.1109/access.2020.2967070 fatcat:dxgjrojilvhsde3s7njcc6dl5u

SCARL: Side-Channel Analysis with Reinforcement Learning on the Ascon Authenticated Cipher [article]

Keyvan Ramezanpour, Paul Ampadu, William Diehl
2020 arXiv   pre-print
On a lightweight implementation of the Ascon authenticated cipher on the Artix-7 FPGA, SCARL is able to recover the secret key using 24K power traces during the key insertion, or Initialization Stage,  ...  of the cipher.  ...  Manuscript submitted to ACM Model-based power analysis techniques are based on finding the maximum correlation between the data leakage of (1) and the power measurements.  ... 
arXiv:2006.03995v1 fatcat:hmcsk4duq5enpmyvgkz267hmgy

The Robust Stream Cipher for Securing Data in the Smartphones

Abdullah S. Abid, Mohammed J. Zaiter, Tayseer S. Atia
2019 Journal of University of Babylon for Engineering Sciences  
In this study presented a new design for the stream cipher to protect mobile data. The strength of stream cipher depends on it is' key. There are several methods to generate key.  ...  One of these techniques is a stream cipher which considered the strongest and fastest method used in encryption and decryption process.  ...  In fact, it is not found any method or mathematical theory can analysis them until now. So, it is considered one of the most powerful ways to design the keystream [7] .  ... 
doi:10.29196/jubes.v27i1.1981 fatcat:ob6rahgijncopayiuqlgbxpagm

SLEPX: An Efficient Lightweight Cipher for Visual Protection of Scalable HEVC Extension

Rizwan A. Shah, Mamoona N. Asghar, Saima Abdullah, Nadia Kanwal, Martin Fleury
2020 IEEE Access  
Given that the key-length for SLEPX is a power of two, it is important to assemble blocks of SE elements that are also dyadic, i.e. a power of two.  ...  To examine the analysis of correlation coefficient of the SLEPX, the following steps occurred:  Selection of 1000 pixels randomly from the video sequences under test (Jockey, Kimono, Four People and Paris  ...  He has more than 10 years of teaching and R&D experience.  ... 
doi:10.1109/access.2020.3030608 fatcat:nxg5pqqh7rhwdiyosvmaixeaue

Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency

Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
2021 Transactions on Cryptographic Hardware and Embedded Systems  
To improve this cryptanalytic analysis, we use the noisy probing model which allows for the inclusion of noise in the framework of Beyne et al.  ...  This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle.  ...  Tim Beyne and Siemen Dhooghe are supported by a PhD Fellowship from the Research Foundation -Flanders (FWO).  ... 
doi:10.46586/tches.v2022.i1.679-721 fatcat:tsmt4xjlbrdjpfn5fvi5giee6i
« Previous Showing results 1 — 15 out of 537 results