Filters








4 Hits in 4.1 sec

New Family of Stream Ciphers as Physically Clone-Resistant VLSI-Structures

Ayoub Mars, Wael Adi
2019 Cryptography  
The proposed sample cipher-structure is based on non-linear merging of randomly selected 16 Nonlinear Feedback Shift Registers (NLFSRs).  ...  A concept for creating a large class of lightweight stream ciphers as Key Stream Generators KSGs is presented. The resulting class-size exceeds 2323 possible different KSGs.  ...  To make a usable comparison with the state-of-the-art stream ciphers, the hardware complexity of the proposed family of stream ciphers is compared with all profile-2 eSTREAM finalists: Grain v1 [32] ,  ... 
doi:10.3390/cryptography3020011 fatcat:rcnfqj57c5gzpgjjyairdz4kaa

Fault Attacks In Symmetric Key Cryptosystems [article]

Anubhab Baksi, Shivam Bhasin, Jakub Breier, Dirmanto Jap, Dhiman Saha
2020 IACR Cryptology ePrint Archive  
and going to stay as an active research interest for a foreseeable future.  ...  Fault attacks work by forcing a device to work under non-ideal environmental conditions (such as high temperature) or external disturbances (such as glitch in the power supply) while performing a cryptographic  ...  It may be noted that AFA is particularly useful against stream ciphers and stream cipher based designs; as it is relatively straightforward to get the algebraic equations in the computer rather than manually  ... 
dblp:journals/iacr/BaksiBBJS20 fatcat:dln4jkk6mvb33okcmlwrkkjm54

Links between Division Property and Other Cube Attack Variants

Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang
2020 IACR Transactions on Symmetric Cryptology  
Secondly, now that the bias phenomenon can be efficiently and elaborately evaluated, we further derive new secure bounds for Grain-like primitives (namely Grain-128, Grain-128a, Grain-V1, Plantlet) against  ...  This is an efficient tool for newly designed stream ciphers for determining the number of initialization rounds. Thirdly, we improve Wang et al.'  ...  There are also other applications namely: drawing secure bounds for Grain-like stream ciphers against bias cube testers, and improved cube attack results on Kreyvium and Acorn.  ... 
doi:10.13154/tosc.v2020.i1.363-395 dblp:journals/tosc/HaoJLMTW20 fatcat:2whx4nizzrfurfweptdcsmqokm

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly [chapter]

Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier
2018 Lecture Notes in Computer Science  
The cube attack is an important technique for the cryptanalysis of symmetric key primitives, especially for stream ciphers.  ...  To be specific, our key recovery attacks have mounted to 839-round Trivium, 891-round Kreyvium, 184-round Grain-128a and 750-round Acorn respectively.  ...  We would like to thank Christian Rechberger, Elmar Tischhauser, Lorenzo Grassi and Liang Zhong for their fruitful discussions, and the anonymous reviewers for their valuable comments.  ... 
doi:10.1007/978-3-319-96884-1_10 fatcat:gmktfhmzkrhe3lkcrqc42mijy4