Filters








70 Hits in 8.3 sec

Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY

Wenying Zhang, Meichun Cao, Jian Guo, Enes Pasalic
2020 IACR Transactions on Symmetric Cryptology  
More importantly, exploiting our distinguishers, we give the first practical attack on 11-round SKINNY-128-128 in the single-key setting (a theoretical attack reaches 16 rounds).  ...  By counting the number of times these words occur in the internal state expression, we can evaluate the resistance of a given block cipher to integral and impossible/truncated differential attacks more  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their helpful comments and suggestions. The first author is supported by the National Natural Science Foundation of China (  ... 
doi:10.46586/tosc.v2019.i4.171-191 fatcat:sfu4v7qzwreshioa73kl7sow74

Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY

Wenying Zhang, Meichun Cao, Jian Guo, Enes Pasalic
2020 IACR Transactions on Symmetric Cryptology  
More importantly, exploiting our distinguishers, we give the first practical attack on 11-round SKINNY-128-128 in the single-key setting (a theoretical attack reaches 16 rounds).  ...  By counting the number of times these words occur in the internal state expression, we can evaluate the resistance of a given block cipher to integral and impossible/truncated differential attacks more  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their helpful comments and suggestions. The first author is supported by the National Natural Science Foundation of China (  ... 
doi:10.13154/tosc.v2019.i4.171-191 dblp:journals/tosc/ZhangCGP19 fatcat:vndsrjslkzhmharo3jjaiyyopi

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS [chapter]

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2016 Lecture Notes in Computer Science  
In particular, unlike SIMON, we are able to provide strong bounds for all versions, and not only in the single-key model, but also in the related-key or related-tweak model.  ...  We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security  ...  This work is partly supported by the Singapore National Research Foundation Fellowship 2012 (NRF-NRFF2012-06), the DFG Research Training Group GRK 1817 Ubicrypt and the BMBF Project UNIKOPS (01BY1040).  ... 
doi:10.1007/978-3-662-53008-5_5 fatcat:ksxdbtvcczhffd43ovxtxhw6iy

Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions [article]

Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021 IACR Cryptology ePrint Archive  
Block ciphers have been extremely predominant in the area of cryptography and due to the paradigm shift towards devices of resource constrained nature, lightweight block ciphers have totally influenced  ...  The growth of resource constrained devices have put forth a dire need for the security solutions that are feasible in terms of resources without taking a toll on the security that they offer.  ...  SKINNY Family [69] SKINNY lightweight block ciphers are a family that is based on SPN structure and follows a TWEAKEY framework taking a tweakey input. It uses a block size of 64 or 128 bits.  ... 
dblp:journals/iacr/DarLH21 fatcat:e7degswt35gefavnsbmu53r7ky

Lightweight Cryptography Algorithms for Resource-Constrained IoT Devices: A Review, Comparison and Research Opportunities

Vishal A. Thakor, Mohammad Abdur Razzaque, Muhammad R. A. Khandaker
2021 IEEE Access  
IoT is becoming more common and popular due to its wide range of applications in various domains. They collect data from the real environment and transfer it over the networks.  ...  Security is considered as the number one challenge in IoT deployments, as most of the IoT devices are physically accessible in the real world and many of them are limited in resources (such as energy,  ...  Hybrid cipher combines any three types (SPN, FN, GFN, ARX, NLFSR) or even mixes block and stream property to improve specific characteristics (for example, throughput, energy, GE, etc.) based on its application  ... 
doi:10.1109/access.2021.3052867 fatcat:lidatyjdtrh4jirpxnnvgwsupi

A Dynamic Light-Weight Symmetric Encryption Algorithm for Secure Data Transmission via BLE Beacons

Sam Banani, Surapa Thiemjarus, Kitti Wongthavarawat, Nattapong Ounanong
2021 Journal of Sensor and Actuator Networks  
To evaluate its performance, the algorithm was utilized on beacon data encryption over advertising channels.  ...  server, is applicable to dynamic message size, and also protects against attacks such as known plaintext attack, brute-force attack, replaying attack, and differential attack.  ...  Generalized Related-key Rectangle Attacks on Block Ciphers with Linear Key Schedule: Applications to SKINNY and GIFT. Des. Codes Cryptogr. 2020, 13, 1103–1126. [CrossRef] 70.  ... 
doi:10.3390/jsan11010002 fatcat:xnybx5fwcvherb7gm5j7u3u7h4

New Automatic search method for Truncated-differential characteristics: Application to Midori and SKINNY [article]

AmirHossein E. Moghaddam, Zahra Ahmadian
2019 IACR Cryptology ePrint Archive  
Using this method, we analyse Midori64, SKINNY64/X and CRAFT block ciphers, for all of which the existing results are improved.  ...  This method can be used as a new tool for differential analysis of SPN block ciphers.  ...  It is clear that in any kind of (single-key) differential characteristic, XORing with constants, round keys and tweakeys are effectless on the characteristic.  ... 
dblp:journals/iacr/MoghaddamA19 fatcat:hq6iiq2qrfanbj5paf7dg3prxe

SKINNY-AEAD and SKINNY-Hash

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2020 IACR Transactions on Symmetric Cryptology  
All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying primitive.  ...  For hashing, we use SKINNY to build a function with larger internal state and employ it in a sponge construction.  ...  Acknowledgements The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA  ... 
doi:10.13154/tosc.v2020.is1.88-131 dblp:journals/tosc/BeierleJKLMPSSS20 fatcat:u4jtzsxthjgs7gkroyq5o7mv6y

On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers

Ling Sun, David Gerault, Wei Wang, Meiqin Wang
2020 IACR Transactions on Symmetric Cryptology  
Due to the novel property of the distinguisher, the previous RK DL attack on AES-192 is improved.  ...  Also, the new distinguisher is explained from the viewpoint of differentiallinear connectivity table (DLCT) and thus can be regarded as the first application of DLCT in the related-key attack scenario.  ...  Acknowledgments The authors would like to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper  ... 
doi:10.13154/tosc.v2020.i3.262-287 dblp:journals/tosc/SunGWW20 fatcat:5g5wqxrv7behflpdshqjxbkim4

Authenticated Encryption Schemes: A Systematic Review

Mohamud Ahmed Jimale, Muhammad Reza Z'aba, Miss Laiha Mat Kiah, Mohd Yamani Idna Idris, Norziana Jamil, Moesfa Soeheila Mohamad, Mohd Saufy Rohmad
2022 IEEE Access  
A considerable amount of research has been devoted to the area since its formal inception in 2000.  ...  Different lines of research have been proposed to enhance the available schemes in terms of security, efficiency, and design and to implement new ideas.  ...  ACKNOWLEDGMENT This work was supported by the Fundamental Research Grant Scheme (FRGS) of the Ministry of Higher Education, Malaysia, Project Number FP072-2019A.  ... 
doi:10.1109/access.2022.3147201 fatcat:cybzrqntvrafnf5craphdsh7ve

SITM: See-In-The-Middle Side-Channel Assisted Middle Round Differential Cryptanalysis on SPN Block Ciphers

Shivam Bhasin, Jakub Breier, Xiaolu Hou, Dirmanto Jap, Romain Poussier, Siang Meng Sim
2019 Transactions on Cryptographic Hardware and Embedded Systems  
We generalize the attack to SPN based ciphers and calculate the effort the attacker needs to recover the secret key. We provide experimental results on 8-bit and 32-bit microcontrollers.  ...  We provide case studies on state-of-the-art symmetric block ciphers, such as AES, SKINNY, and PRESENT. Furthermore, we show how to attack shuffling-protected implementations.  ...  Acknowledgments The authors acknowledge the support from the Singapore National Research Foundation ("SOCure" grant NRF2018NCR-NCR002-0001 -www.green-ic.org/socure).  ... 
doi:10.13154/tches.v2020.i1.95-122 dblp:journals/tches/BhasinBHJPS20 fatcat:vl3nwjuqafhgjhc7mh55hvgzdu

Toward A More Efficient Gröbner-based Algebraic Cryptanalysis [article]

Hossein Arabnezhad-Khanoki, Babak Sadeghiyan
2019 IACR Cryptology ePrint Archive  
To show the effectiveness of our approach, we applied it for the cryptanalysis of several light weight block ciphers.  ...  , as what appear in higher order differential cryptanalysis and its derivatives such as cube attack or integral cryptanalysis, forces many linear relation between intermediate state bits in the cipher.  ...  Attacking PRESENT Description of Present. PRESENT [14] , presented in CHES 2007, is a lightweight block cipher based on SPN structure. It has block size of 64-bit and key size of 64/80 bits.  ... 
dblp:journals/iacr/Arabnezhad-Khanoki19 fatcat:miymtpqj6zfxza5fpsymdci3pu

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018 IACR Transactions on Symmetric Cryptology  
We finally illustrate design paradigms that combine the aforementioned TI circuits for S-Boxes and diffusion layers to obtain fully side-channel secure SPN block cipher implementations with low area and  ...  In light of NIST's lightweight cryptography project, design choices for block ciphers must consider not only security against traditional cryptanalysis, but also side-channel security, while adhering to  ...  He would also like to thank Information Security Education Awareness (ISEA), DIT, India for encouraging research in the area of computer security.  ... 
doi:10.46586/tosc.v2018.i3.311-334 fatcat:haxybsewgjaafc6viku4ihm5mu

Lightweight and Side-channel Secure 4x4 S-Boxes from Cellular Automata Rules [article]

Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018 IACR Cryptology ePrint Archive  
We finally illustrate design paradigms that combine the aforementioned TI circuits for S-Boxes and diffusion layers to obtain fully side-channel secure SPN block cipher implementations with low area and  ...  In light of NIST's lightweight cryptography project, design choices for block ciphers must consider not only security against traditional cryptanalysis, but also side-channel security, while adhering to  ...  He would also like to thank Information Security Education Awareness (ISEA), DIT, India for encouraging research in the area of computer security.  ... 
dblp:journals/iacr/GhoshalSPDPM18 fatcat:excb6zfwazdhfchanjcx3g2n6m

Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules

Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay
2018 IACR Transactions on Symmetric Cryptology  
We finally illustrate design paradigms that combine the aforementioned TI circuits for S-Boxes and diffusion layers to obtain fully side-channel secure SPN block cipher implementations with low area and  ...  In light of NIST's lightweight cryptography project, design choices for block ciphers must consider not only security against traditional cryptanalysis, but also side-channel security, while adhering to  ...  He would also like to thank Information Security Education Awareness (ISEA), DIT, India for encouraging research in the area of computer security.  ... 
doi:10.13154/tosc.v2018.i3.311-334 dblp:journals/tosc/GhoshalSPDPM18 fatcat:qk6saovj3nge5lkgyadvyiehcy
« Previous Showing results 1 — 15 out of 70 results