Filters








105 Hits in 3.4 sec

New Analysis of Reduced-Version of Piccolo in the Single-Key Scenario

2019 KSII Transactions on Internet and Information Systems  
As a matter of fact, we first study some linear relations among the round subkeys and the properties of linear layer.  ...  Azimi et al. attacked 12 rounds of Piccolo-80 not including post-whitening keys, 13 rounds of Piccolo-80 not including pre-and post-whitening keys and 15 rounds of Piccolo-128 not including pre-whitening  ...  Cryptanalysis of 13 Rounds of Piccolo-80 from the First Round We apply 5 rounds of the meet-in-the-middle distinguisher proposed in [6] to perform an attack on 13 rounds of Piccolo-80 from the round  ... 
doi:10.3837/tiis.2019.09.022 fatcat:ghcpdtfwebf67azfvbfih54phu

Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo

Guoyong Han, Wenying Zhang
2017 Security and Communication Networks  
A 6-round biclique is constructed for Piccolo-80 and a 7-round biclique for Piccolo-128. Then a full round biclique cryptanalysis of Piccolo is presented.  ...  Biclique cryptanalysis is a typical attack through finding a biclique which is a type of bipartite diagram to reduce the computational complexity.  ...  Acknowledgments This work is partially supported by National Natural Science Foundation of China (nos. 61272434, 61672330, and 61602287) and Nature Science Foundation of Shandong Province (no.  ... 
doi:10.1155/2017/7589306 fatcat:ehjcgrac4jbzzabpnb7fzs7u2y

Secure and efficient k-nearest neighbor query for location-based services in outsourced environments

Haiqin Wu, Liangmin Wang, Tao Jiang
2017 Science China Information Sciences  
If not considering results on biclique cryptanalysis, these are currently the best public results on this reduced version of the Piccolo block cipher.  ...  In this paper, we mounted meet-in-the-middle attacks on 14-round Piccolo-80 without preand post-whitening keys and 18-round Piccolo-128 with post-whitening keys by exploiting the properties of the key  ...  Conflict of interest The authors declare that they have no conflict of interest.  ... 
doi:10.1007/s11432-017-9090-6 fatcat:m2folbx6nzhvtm63j35gotex7q

Meet-in-the-Middle Attacks on Reduced Round Piccolo [chapter]

Mohamed Tolba, Ahmed Abdelkhalek, Amr M. Youssef
2016 Lecture Notes in Computer Science  
In this paper, we propose meet-in-the-middle attacks on 14-round reduced Piccolo-80 and 16, 17-round reduced Piccolo-128.  ...  First, we build a 5-round distinguisher by using specific properties of the linear transformation of Piccolo. This 5-round distinguisher is then used to launch a 14-round attack on Piccolo-80.  ...  In this paper, we present MitM attacks on 14-round reduced Piccolo-80 and 16, 17-round reduced Piccolo-128.  ... 
doi:10.1007/978-3-319-29078-2_1 fatcat:bue7pzsjynewdnxl34h6gjfeim

Low-Data Complexity Biclique Cryptanalysis of Block Ciphers With Application to Piccolo and HIGHT

Siavash Ahmadi, Zahra Ahmadian, Javad Mohajeri, Mohammad Reza Aref
2014 IEEE Transactions on Information Forensics and Security  
For fullround Piccolo-80 and 128, the data complexity of the attacks are only 16 plaintext-ciphertext pairs and for full-round HIGHT our attack requires 256 pairs.  ...  In this paper, we present a framework for biclique cryptanalysis of block ciphers with an extremely low data complexity. To that end, we enjoy a new representation of biclique attack.  ...  It is worth noticing that these low data complexities are achieved by making use of an asymmetric biclique shorter than that in the most efficient attacks on Piccolo-80, Piccolo-128 and HIGHT.  ... 
doi:10.1109/tifs.2014.2344445 fatcat:33rmsanhdbdzhoruj4o53i37ea

LBC-IoT: Lightweight Block Cipher for IoT Constraint Devices

Rabie A. Ramadan, Bassam W. Aboshosha, Kusum Yadav, Ibrahim M. Alseadoon, Munawar J. Kashout, Mohamed Elhoseny
2021 Computers Materials & Continua  
Besides, it is immune to different types of attacks such as linear, differential, and side-channel as well as exible in terms of implementation.  ...  The proposed block length is 32-bit supporting key lengths of 80-bit, and it is mainly based on the Feistel structure.  ...  It suffers from meet-in-the-middle attacks on 14round PICCOLO-80 and 18-round PICCOLO-128. Differential attacks up to 13 rounds and 15 rounds of PICCOLO-80 and 128, respectively can also be mounted.  ... 
doi:10.32604/cmc.2021.015519 fatcat:i5fq2pf3ybbo5ict2imqwrdxhu

Performance Analysis of Symmetric Key Ciphers in Linear and Grid Based Sensor Networks [article]

Kaushal Shah, Devesh C. Jinwala
2018 arXiv   pre-print
The aim of this analysis is to come up with the best suited symmetric key based cipher for the linear and grid based WSN.  ...  The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form.  ...  The authors show the differential cryptanalysis on 14 rounds, ciphertext only attacks on 13 rounds and an impossible differential attack on 12 rounds of MIBS. PICCOLO.  ... 
arXiv:1809.06587v1 fatcat:lrygdjlyy5frzkr3mn3osllgdu

Lightweight Cryptography for IoT: A State-of-the-Art [article]

Vishal A. Thakor, M.A. Razzaque, Muhammad R. A. Khandaker
2020 arXiv   pre-print
This paper presents the performance comparison along with their reported cryptanalysis, mainly for lightweight block ciphers, and further shows new research directions to develop novel algorithms with  ...  With the emergence of 5G, Internet of Things (IoT) has become a center of attraction for almost all industries due to its wide range of applications from various domains.  ...  Biclique attacks on full round [24] [120], impossible differential cryptanalysis on reduced round versions [121] were reported on Piccolo.  ... 
arXiv:2006.13813v1 fatcat:tydoekhuvrhjtek64z77zw34ti

Differential Factors: Improved Attacks on SERPENT [chapter]

Cihangir Tezcan, Ferruh Özbudak
2015 Lecture Notes in Computer Science  
Existence of differential factors can reduce the time complexity of differential attacks and as an example we show that the 10, 11, and 12-round differential-linear attacks of Dunkelman et al. on Serpent  ...  can actually be performed with time complexities reduced by a factor of 4, 4, and 8, respectively.  ...  We reduce the time complexities of these attacks by using the differential factors and provide the best differential-linear attacks on this cipher.  ... 
doi:10.1007/978-3-319-16363-5_5 fatcat:w2jr4jh5xvdphd6j3ooinavk54

New Observations on Piccolo Block Cipher [chapter]

Yanfeng Wang, Wenling Wu
2016 Lecture Notes in Computer Science  
Besides, an automatic searching algorithm is designed to find weak keys for Piccolo ciphers. Results show that 7-round Piccolo-80 and 10-round Piccolo-128 both have many weak keys.  ...  To reduce the cost in hardware, key schedules of lightweight block ciphers are usually simple and some even are direct linear transformations on master keys.  ...  The research presented in this paper is supported by the National Basic Research Program of China (No. 2013CB338002) and National Natural Science Foundation of China (No. 61272476, No.61232009 and No.  ... 
doi:10.1007/978-3-319-29485-8_22 fatcat:oixljgfrgbbpzispsoxupxgmdi

RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms

WenTao Zhang, ZhenZhen Bao, DongDai Lin, Vincent Rijmen, BoHan Yang, Ingrid Verbauwhede
2015 Science China Information Sciences  
For the 80-bit key version, a one-cycle-per-round parallel implementation only needs 1600 gates for a throughput of 246 Kbits/s at 100 kHz clock and an energy efficiency of 3.0 pJ/bit.  ...  For the 80-bit key version, using UMC 0.13 µm standard cell library at 100 kHz, our round-based implementation could obtain a throughput of 246 Kbits/s and an energy efficiency of 3.0 pJ/bit with only  ...  The new criteria are mainly motivated by the existing security analysis of PRESENT, specifically (multiple) differential/linear cryptanalysis on reduced-round PRESENT [18] [19] [20] .  ... 
doi:10.1007/s11432-015-5459-7 fatcat:rni2w7bsufflhepqekyrsc557q

Hybrid Lightweight and Robust Encryption Design for Security in IoT

Abhijit Patil, Gaurav Bansod, Narayan Pisharoty
2015 International Journal of Security and Its Applications  
This hybrid cipher design is secure against linear and differential cryptanalysis.  ...  S-box of RECTANGLE is perfectly interfaced with LED design as their combination results in a differential path probability which is has an upper bound of 2 -50 in its first round.  ...  Acknowledgment The authors would like to thank Symbiosis Institute of Technology, Pune, Symbiosis International University, Pune for providing resources to carry out this research successfully.  ... 
doi:10.14257/ijsia.2015.9.12.10 fatcat:eedlw7xhmbadjkay7k3bkfi37a

The Security Weakness of Block Cipher Piccolo against Fault Analysis

Junghwan Song, Kwanhyung Lee, Younghoon Jung
2014 International Journal of Distributed Sensor Networks  
Our attack has the complexity of 2 8.49 and 2 9.21 encryptions with fault injections of target bit positions into Piccolo-80 and Piccolo-128, respectively.  ...  In this paper, we show a fault analysis on the Piccolo by using cube attack. We find 16 linear equations corresponding to a round function F by cube attack, which are used to fault analysis.  ...  Conflict of Interests The authors declare that there is no conflict of interests regarding the publication of this paper.  ... 
doi:10.1155/2014/842675 fatcat:55zeriewwza2dnz4ponf7uedi4

GRANULE: An Ultra lightweight cipher design for embedded security [article]

Gaurav Bansod, Abhijit Patil, Narayan Pisharoty
2018 IACR Cryptology ePrint Archive  
It also shows good resistance against linear and differential cryptanalysis.  ...  It is based on Feistel network which encrypts 64 bits of data with 80/128 bits of key.  ...  Related key attack successfully applied on reduced round AES-256 [21] . Slide attack is independent on the number of rounds of the cipher.  ... 
dblp:journals/iacr/BansodPP18 fatcat:i5c2xbzzqfe5lem6xi2xgs3wvi

PERFORMANCE ANALYSIS OF SYMMETRIC KEY CIPHERS IN LINEAR AND GRID BASED SENSOR NETWORKS

Kaushal Shah, Devesh C. Jinwala
2018 Figshare  
The aim of this analysis is to come up with the best suited symmetric key based cipher for the linear and grid based WSN.  ...  The linear and grid based Wireless Sensor Networks (WSN) are formed by applications where objects being monitored are either placed in linear or grid based form.  ...  The authors show the differential cryptanalysis on 14 rounds, ciphertext only attacks on 13 rounds and an impossible differential attack on 12 rounds of MIBS. PICCOLO.  ... 
doi:10.6084/m9.figshare.6216446 fatcat:hfqjyto7hnchxnem33d7seh6rq
« Previous Showing results 1 — 15 out of 105 results