Filters








117 Hits in 2.5 sec

Biclique Cryptanalysis of the Full AES [chapter]

Andrey Bogdanov, Dmitry Khovratovich, Christian Rechberger
2011 Lecture Notes in Computer Science  
In this paper, we present the novel technique of block cipher cryptanalysis with bicliques, which leads to the following results: -The first key recovery method for the full AES-128 with computational  ...  As our cryptanalysis is of high computational complexity, it does not threaten the practical use of AES in any way.  ...  We thank Joan Daemen and Vincent Rijmen for their helpful feedback on the earlier versions of the paper.  ... 
doi:10.1007/978-3-642-25385-0_19 fatcat:mvuaeztrrbhojn7joqu3o7xlw4

Narrow-Bicliques: Cryptanalysis of Full IDEA [chapter]

Dmitry Khovratovich, Gaëtan Leurent, Christian Rechberger
2012 Lecture Notes in Computer Science  
We also show that the biclique approach to block cipher cryptanalysis not only obtains results on more rounds, but also improves time and data complexities over existing attacks.  ...  Our cryptanalysis is of high computational complexity, and does not threaten the practical use of IDEA in any way, yet the techniques are practically verified to a large extent.  ...  Acknowledgements We thank Orr Dunkelman and Adi Shamir for bringing to our attention their new attack on 6 middle rounds of IDEA during the MSR Symmetric Cryptanalysis Workshop 2011.  ... 
doi:10.1007/978-3-642-29011-4_24 fatcat:um5qqm6wvzhzzg3qjg335eo4au

Analysis of Confidentiality Algorithms in Different Mobile Generations

Khalid Fadhil Jasim, Imad Fakhri Al-Shaikhli
2017 Cihan University-Erbil Scientific Journal  
The protection of information confidentiality became a serious problem for the customers of these systems.  ...  This paper provides analysis study of operations and specifications for these cipher algorithms, and investigating the cryptanalysis methods which can be employed to attack these cipher algorithms.  ...  Also, Biclique technique can be adopted to attack different versions of AES block cipher. The idea of Biclique cryptanalysis against AES cipher is based on the Biclique concept presented in [22] .  ... 
doi:10.24086/cuesj.si.2017.n1a11 fatcat:3tm4sjjownanvgs6kvokhekwiu

Biclique Cryptanalysis on the Full Crypton-256 and mCrypton-128

Junghwan Song, Kwanhyung Lee, Hwanjin Lee
2014 Journal of Applied Mathematics  
Biclique cryptanalysis is an attack which reduces the computational complexity by finding a biclique which is a kind of bipartite graph.  ...  And our result on the mCrypton-128 has superiority over known result of biclique cryptanalysis on the mCrypton-128 which constructs 3-round bicliques in terms of computational time complexity.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2014/529736 fatcat:3rdheusowzgldiiswtheyshadm

Bicliques with Minimal Data and Time Complexity for AES [chapter]

Andrey Bogdanov, Donghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya
2015 Lecture Notes in Computer Science  
Each attack just requires 2 (for AES-128 and AES-192) or 3 (for AES-256) known plaintexts for success probability 1. We obtain these results using the improved biclique attack proposed in Crypto'13.  ...  However, no application of the same on AES was suggested. In this paper, we re-evaluate the security-bound of full round AES against biclique attack.  ...  Recently, the theoretical security of AES has been challenged by biclique cryptanalysis [6] .  ... 
doi:10.1007/978-3-319-15943-0_10 fatcat:d4o7mo6xsva3pmxsma4kclot4q

Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo

Guoyong Han, Wenying Zhang
2017 Security and Communication Networks  
Biclique cryptanalysis is a typical attack through finding a biclique which is a type of bipartite diagram to reduce the computational complexity.  ...  A 6-round biclique is constructed for Piccolo-80 and a 7-round biclique for Piccolo-128. Then a full round biclique cryptanalysis of Piccolo is presented.  ...  Acknowledgments This work is partially supported by National Natural Science Foundation of China (nos. 61272434, 61672330, and 61602287) and Nature Science Foundation of Shandong Province (no.  ... 
doi:10.1155/2017/7589306 fatcat:ehjcgrac4jbzzabpnb7fzs7u2y

Performance Analysis of Symmetric Key Ciphers in Linear and Grid Based Sensor Networks [article]

Kaushal Shah, Devesh C. Jinwala
2018 arXiv   pre-print
The aim of this analysis is to come up with the best suited symmetric key based cipher for the linear and grid based WSN.  ...  We analyse the symmetric ciphers with respect to the performance parameters: RAM, ROM consumption and number of CPU cycles.  ...  Authors of [36] show a possible attack on AES, known as biclique cryptanalysis. It uses the concept of exhaustive search on the key with an improvement by linking the keys through key schedule.  ... 
arXiv:1809.06587v1 fatcat:lrygdjlyy5frzkr3mn3osllgdu

A Framework for Automated Independent-Biclique Cryptanalysis [chapter]

Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel
2014 Lecture Notes in Computer Science  
of rounds and dimension of the biclique.  ...  Additionally, by using this framework, we could find the first full-round biclique attacks on all versions of the AES-like cipher BKSQ. find well-suited differentials.  ...  Independent-Biclique Cryptanalysis In this section we review the basics of independent-biclique cryptanalysis following the work of [17] .  ... 
doi:10.1007/978-3-662-43933-3_29 fatcat:fgygqor2drhwnpu2ldwqyvq7zm

A Higher Order Key Partitioning Attack with Application to LBlock [chapter]

Riham AlTawy, Mohamed Tolba, Amr M. Youssef
2015 Lecture Notes in Computer Science  
Surprisingly, our results on the full LBlock are better, in terms of both computational and data complexity, than the results of its biclique cryptanalysis.  ...  In this paper, we present a higher order key partitioning meet-in-the-middle attack. Our attack is inspired by biclique cryptanalysis combined with higher order partitioning of the key.  ...  Acknowledgment The authors would like to thank the anonymous reviewers for their valuable comments and suggestions that helped improve the quality of the paper.  ... 
doi:10.1007/978-3-319-18681-8_17 fatcat:3r32zl36jbgupkhhiaepomfqde

Lightweight Cryptography for IoT: A State-of-the-Art [article]

Vishal A. Thakor, M.A. Razzaque, Muhammad R. A. Khandaker
2020 arXiv   pre-print
With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for almost all industries due to its wide range of applications from various domains.  ...  This paper presents the performance comparison along with their reported cryptanalysis, mainly for lightweight block ciphers, and further shows new research directions to develop novel algorithms with  ...  Algorithm Cryptanalysis 1 AES Biclique Cryptanalysis [149], Boomerang [47], related key attack [47] 2 PRESENT 3 RECTANGLE Side-channel attack [49], related-key cryptanalysis [49], statistical  ... 
arXiv:2006.13813v1 fatcat:tydoekhuvrhjtek64z77zw34ti

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family [chapter]

Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva
2012 Lecture Notes in Computer Science  
The new tool has proved to be widely applicable by inspiring many authors to publish new results of the full versions of AES, KASUMI, IDEA, and Square.  ...  We present a new concept of biclique as a tool for preimage attacks, which employs many powerful techniques from differential cryptanalysis of block ciphers and hash functions.  ...  The authors would like to thank Eik List and anonymous reviewers for useful comments on earlier versions of the paper.  ... 
doi:10.1007/978-3-642-34047-5_15 fatcat:fzzpccda6fhdvjqpihrctlv34a

Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT

Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
2014 IEEE Transactions on Information Forensics and Security  
In this paper, we present a framework for biclique cryptanalysis of block ciphers with an extremely low data complexity. To that end, we enjoy a new representation of biclique attack.  ...  In all attacks the computational complexity remains the same as the previous ones or even it is slightly improved.  ...  Conclusions We presented a variant of biclique attack adapted to cryptanalysis of generalized feistel ciphers with word-wise permutation-like key schedules.  ... 
doi:10.1109/tifs.2014.2344445 fatcat:33rmsanhdbdzhoruj4o53i37ea

The DBlock family of block ciphers

WenLing Wu, Lei Zhang, XiaoLi Yu
2015 Science China Information Sciences  
For key schedule of DBlock, it basically employs the same module used in encryption, except the choice of different byte permutations, which can improve its suitability for various implementation environments  ...  Also, its design of round function employs different linear transforms operating on various word-sizes, which efficiently improve the diffusion effect.  ...  Biclique cryptanalysis Biclique cryptanalysis [6] is a new powerful technique proposed against full-round AES in Asiacrypt 2011, and then it has also been applied to many other block ciphers successfully  ... 
doi:10.1007/s11432-014-5219-0 fatcat:kmj5v65jijgmpa3kygk25geyh4

Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings [chapter]

Dmitry Khovratovich
2012 Lecture Notes in Computer Science  
We extend and improve biclique attacks, which were recently introduced for the cryptanalysis of block ciphers and hash functions.  ...  We introduce the concept of sliced bicliques, which is a translation of regular bicliques to the framework with permutations.  ...  The rest of this section is devoted to finding an improved way to test a single set of states.  ... 
doi:10.1007/978-3-642-34961-4_33 fatcat:ue5h3crqgnamzhl3i6onf5c5ri

CHAM: A Family of Lightweight Block Ciphers for Resource-Constrained Devices [chapter]

Bonwook Koo, Dongyoung Roh, Hyeonjin Kim, Younghoon Jung, Dong-Geon Lee, Daesung Kwon
2018 Lecture Notes in Computer Science  
Bearing this in mind, we analyze the security of CHAM against various attacks, including differential cryptanalysis and linear cryptanalysis.  ...  We have attempted to improve LEA by increasing the level of suitability for resource-constrained environment such as hardware and 8-bit and 16-bit microcontrollers.  ...  In [50] , Sun et al. improved the integral cryptanalysis result of LEA slightly by applying the bit-based division property.  ... 
doi:10.1007/978-3-319-78556-1_1 fatcat:fcilmpcigjd27bujxww2kicu24
« Previous Showing results 1 — 15 out of 117 results