Filters








2 Hits in 2.4 sec

Linear Cryptanalysis of PRINTcipher – Trails and Samples Everywhere [chapter]

Martin Ågren, Thomas Johansson
2011 Lecture Notes in Computer Science  
This paper identifies several larger classes of weak keys. We show how to distinguish classes of keys and give a 28-round linear attack applicable to half the keys.  ...  We also observe how some specific properties of PRINTcipher allow us to collect several samples from each plaintext-ciphertext pair.  ...  With this work, linear cryptanalysis has reached 28 rounds of PRINTcipher.  ... 
doi:10.1007/978-3-642-25578-6_10 fatcat:eokqsr3gcbeq3dq5itdkq7gpua

Security analysis of cryptographic algorithms

Sareh Sadet Emami
2022
This thesis studies cryptanalysis of symmetric algorithms including block ciphers and hash functions.  ...  We employ differential probability distributions to improve the truncated differential cryptanalysis and apply key-recovery attacks to the reduced variants of LBlock.  ...  ACKNOWLEDGEMENTS x List of Publications  ... 
doi:10.25949/19436372.v1 fatcat:sxez4wtoebfm3jfqitpapci7e4