Filters








1,092 Hits in 5.9 sec

Cryptanalysis of Stream Ciphers with Linear Masking [chapter]

Don Coppersmith, Shai Halevi, Charanjit Jutla
2002 Lecture Notes in Computer Science  
We describe a cryptanalytical technique for distinguishing some stream ciphers from a truly random process.  ...  The output of the cipher can be the linear sum of both processes. To attack such ciphers, we look for any property of the "non-linear process" that can be distinguished from random.  ...  In this work we describe a technique that can be used to distinguish such ciphers from random. The basic idea is very simple.  ... 
doi:10.1007/3-540-45708-9_33 fatcat:bqgsc3hq3rbgpoicuqu45ksdai

Cryptanalysis of Efficient Masked Ciphers: Applications to Low Latency

Tim Beyne, Siemen Dhooghe, Amir Moradi, Aein Rezaei Shahmirzadi
2021 Transactions on Cryptographic Hardware and Embedded Systems  
This work introduces second-order masked implementation of LED, Midori, Skinny, and Prince ciphers which do not require fresh masks to be updated at every clock cycle.  ...  The presented masked designs only use a minimal number of shares, i.e., three to achieve second-order security, and we make use of a trick to pair a couple of S-boxes to reduce their latency.  ...  Tim Beyne and Siemen Dhooghe are supported by a PhD Fellowship from the Research Foundation -Flanders (FWO).  ... 
doi:10.46586/tches.v2022.i1.679-721 fatcat:tsmt4xjlbrdjpfn5fvi5giee6i

Real Time Cryptanalysis of Bluetooth Encryption with Condition Masking [chapter]

Bin Zhang, Chao Xu, Dengguo Feng
2013 Lecture Notes in Computer Science  
Our attacks have been fully implemented on one core of a single PC. It takes only a few seconds to restore the original encryption key.  ...  stream ciphers.  ...  Correlation attack [28] is a classical method in the cryptanalysis of stream ciphers, which exploits some statistically biased relation between the produced keystream and the output of certain underlying  ... 
doi:10.1007/978-3-642-40041-4_10 fatcat:dan77pbhljewnc5svun2diebni

A Middleware Design for Block Cipher Seamless Connected into Stream Cipher Mode

Lan Luo, ZhiGuang Qin, ShiJie Zhou, ShaoQuan Jiang, Juan Wang
2008 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing  
The approach of this paper is that a kind of complex mask was used in block cipher algorithm when embedded it into stream operation mode such as Cipher Feedback Mode , Output Feedback Mode and Counter  ...  Secure of this design was demonstrated by the block cipher algorithm itself and the complexity of mask algorithm.  ...  In another view we can think this design as a simple nonlinear mask of block cipher's OFB operation mode. The mask changes the output character easily.  ... 
doi:10.1109/iih-msp.2008.26 dblp:conf/iih-msp/LuoQZJW08 fatcat:6x3neveyuzccdeb2rwxf5gvu5e

An introduction to Block Cipher Cryptanalysis

C. de Canniere, A. Biryukov, B. Preneel
2006 Proceedings of the IEEE  
This paper reviews the fundamental principles behind today's state of the art in block cipher cryptanalysis.  ...  Because of the growing number of practical applications relying on their security, block ciphers have received, and are still receiving, a substantial amount of attention from academic cryptanalysts.  ...  Interestingly enough, the ideas that were originally developed for exploiting algebraic properties of block ciphers, have had a much larger impact on stream cipher cryptanalysis.  ... 
doi:10.1109/jproc.2005.862300 fatcat:7r2f6t67unbo5cu4vb7z4p5loa

Cryptanalysis Techniques for Stream Cipher: A Survey

M. U.Bokhari, Shadab Alam, Faheem Syeed Masoodi
2012 International Journal of Computer Applications  
This study aims to provide a comprehensive survey that summarizes the existing cryptanalysis techniques for stream ciphers.  ...  It will also facilitate the security analysis of the existing stream ciphers and provide an opportunity to understand the requirements for developing a secure and efficient stream cipher design.  ...  in the design, so that the new design is not vulnerable to these attacks.  ... 
doi:10.5120/9721-4187 fatcat:l2mdd2bl3jda5eb5xe2i7c6m5m

KFC – The Krazy Feistel Cipher [chapter]

Thomas Baignères, Matthieu Finiasz
2006 Lecture Notes in Computer Science  
We introduce KFC, a block cipher based on a three round Feistel scheme.  ...  To the best of our knowledge, KFC is the first practical (in the sense that it can be implemented) block cipher to propose tight security proofs of resistance against large classes of attacks, including  ...  Just as the typical security proofs of block ciphers do not compare to ours, the encryption speed reached by KFC does not compare to those of nowadays block ciphers.  ... 
doi:10.1007/11935230_25 fatcat:wfwbuqfnhneghpvaj45v2umuvi

How to Backdoor a Cipher [article]

Raluca Posteuca, Tomer Ashur
2021 IACR Cryptology ePrint Archive  
We introduce , a block cipher with a carefully crafted backdoor. By using the means of the wide-trail strategy, we argue the resistance of the cipher against linear and differential cryptanalysis.  ...  In this paper we show that in the case of linear cryptanalysis such strategies can sometimes lead to a gap between the claimed security and the actual one, and that this gap can be exploited by a malicious  ...  Therefore, depending on the value of the round key, the sign of a trail's correlation is a random variable, while the absolute value is a constant.  ... 
dblp:journals/iacr/PosteucaA21 fatcat:fxxl5zdcdzf7bmgme5ntr3m6lu

Integral Cryptanalysis of the Block Cipher E2 [article]

Wentan Yi, Shaozhen Chen
2014 arXiv   pre-print
Block cipher E2, designed and submitted by Nippon Telegraph and Telephone Corporation, is a first-round Advanced Encryption Standard candidate.  ...  The design principles influences several more recent block ciphers including Camellia, an ISO/IEC standard cipher.  ...  Section 2 gives a brief description of block cipher E2 and outlines the ideas of zero-correlation linear cryptanalysis and integral cryptanalysis.  ... 
arXiv:1405.6483v2 fatcat:havevott5nadxegtwbabuz67gy

A Framework for Describing Block Cipher Cryptanalysis

R.C.-W. Phan, M.U. Siddiqi
2006 IEEE transactions on computers  
rounds not covered by the reduced cipher.  ...  Then, during cryptanalysis, we are often interested in searching for properties of some middle rounds of a cipher because the outer rounds not covered by these middle rounds can be peeled off by guessing  ... 
doi:10.1109/tc.2006.169 fatcat:5rhz4frytne6rajcwty2nbc57y

Towards a Unifying View of Block Cipher Cryptanalysis [chapter]

David Wagner
2004 Lecture Notes in Computer Science  
We introduce commutative diagram cryptanalysis, a framework for expressing certain kinds of attacks on product ciphers.  ...  Thus, we show that commutative diagram attacks provide a unifying view into the field of block cipher cryptanalysis.  ...  This allows to distinguish any cipher with this property from a random permutation. The idea can be generalized in many ways.  ... 
doi:10.1007/978-3-540-25937-4_2 fatcat:nmwdngustzhqtmr7cd7jugrgti

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [article]

Wentan Yi, Shaozhen Chen
2014 arXiv   pre-print
There are a great deal of cryptanalytic results on KASUMI, however, its security evaluation against the recent zero-correlation linear attacks is still lacking so far.  ...  The block cipher KASUMI is widely used for security in many synchronous wireless standards.  ...  It uses the linear approximation with correlation zero generally existing in block ciphers to distinguish between a random permutation and a block cipher.  ... 
arXiv:1404.6100v4 fatcat:mi4u2oyr3jdx3mhuoxmk6y7zgy

Linear Cryptanalysis for Block Ciphers [chapter]

Johannes Gehrke, Daniel Kifer, Ashwin Machanavajjhala, Arjen K. Lenstra, Phong Nguyen, Phong Nguyen, Daniele Micciancio, Scott Contini, Sabrina De Capitani diVimercati, Burt Kaliski, Stephen M Papa, William D. Casper (+13 others)
2011 Encyclopedia of Cryptography and Security  
Definition ℓ-diversity is a method for publishing data about individuals while limiting the amount of sensitive information disclosed about them.  ...  The linear cryptanalysis provides a known plaintext attack on various stream ciphers, which allows to distinguish the keystream from a truly random sequence.  ...  Background Linear cryptanalysis is a powerful method of cryptanalysis of block ciphers introduced by Matsui in  [] .  ... 
doi:10.1007/978-1-4419-5906-5_589 fatcat:zn4blza5ezggzhayzeuxeix5oa

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

Thorsten Kranz, Gregor Leander, Friedrich Wiemer
2017 IACR Transactions on Symmetric Cryptology  
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.  ...  Moreover, we investigate how tweakable block ciphers can be analyzed with respect to linear cryptanalysis, a topic that surprisingly has not been scrutinized until now.  ...  Acknowledgements We would like to thank Anne Canteaut and Kaisa Nyberg for interesting discussions and valuable comments on earlier versions of this paper.  ... 
doi:10.46586/tosc.v2017.i1.474-505 fatcat:clhcq4hjizdftjz2osxpsuxbmm

Linear Cryptanalysis: Key Schedules and Tweakable Block Ciphers

Thorsten Kranz, Gregor Leander, Friedrich Wiemer
2017 IACR Transactions on Symmetric Cryptology  
This paper serves as a systematization of knowledge of linear cryptanalysis and provides novel insights in the areas of key schedule design and tweakable block ciphers.  ...  Moreover, we investigate how tweakable block ciphers can be analyzed with respect to linear cryptanalysis, a topic that surprisingly has not been scrutinized until now.  ...  Acknowledgements We would like to thank Anne Canteaut and Kaisa Nyberg for interesting discussions and valuable comments on earlier versions of this paper.  ... 
doi:10.13154/tosc.v2017.i1.474-505 dblp:journals/tosc/KranzLW17 fatcat:hdq2aodubbgzdltzc7n75qvjum
« Previous Showing results 1 — 15 out of 1,092 results