Filters








159 Hits in 8.6 sec

Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions [article]

Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021 IACR Cryptology ePrint Archive  
Block ciphers have been extremely predominant in the area of cryptography and due to the paradigm shift towards devices of resource constrained nature, lightweight block ciphers have totally influenced  ...  In this paper, we review the state-of-the-art lightweight block ciphers, present a comprehensive design niche, give a detailed taxonomy with multiple classifications and present future research directions  ...  Both the variants provide a decent level of security against boomerang attack, differential and linear attacks, impossible differential attacks, meet-inthe-middle attack and others.  ... 
dblp:journals/iacr/DarLH21 fatcat:e7degswt35gefavnsbmu53r7ky

Modified Round Function of SIMECK 32/64 Block Cipher

Philipcris C. Encarnacion
2020 International Journal of Advanced Trends in Computer Science and Engineering  
Various LBC addressed such concerns as the SIMON and SPECK block ciphers, which are known for security and performance. SIMECK, a combination of SIMON and SPECK, shows better performance.  ...  The study explores the ARX structure of LBC, which leads to a good venue to implement with other block ciphers.  ...  Also, the authors acknowledge the support of the Commission on Higher Education in providing financial support in the study.  ... 
doi:10.30534/ijatcse/2020/3991.32020 fatcat:3htg3pak4zaynnvernma7mtehe

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS [chapter]

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2016 Lecture Notes in Computer Science  
Secondly, we present MANTIS, a dedicated variant of SKINNY for lowlatency implementations, that constitutes a very efficient solution to the problem of designing a tweakable block cipher for memory encryption  ...  We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security  ...  This work is partly supported by the Singapore National Research Foundation Fellowship 2012 (NRF-NRFF2012-06), the DFG Research Training Group GRK 1817 Ubicrypt and the BMBF Project UNIKOPS (01BY1040).  ... 
doi:10.1007/978-3-662-53008-5_5 fatcat:ksxdbtvcczhffd43ovxtxhw6iy

WARP : Revisiting GFN for Lightweight 128-bit Block Cipher [article]

Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri
2020 IACR Cryptology ePrint Archive  
The overall structure of WARP is a variant of 32-nibble Type-2 Generalized Feistel Network (GFN), with a permutation over nibbles designed to optimize the security and efficiency.  ...  It aims at small-footprint circuit in the field of 128-bit block ciphers, possibly for a unified encryption and decryption functionality.  ...  Zhenzhen Bao is partially supported by Nanyang Technological University in Singapore under Grant 04INS000397C230, and Singapore's Ministry of Education under Grants RG18/19 and MOE2019-T2-1-060.  ... 
dblp:journals/iacr/BanikBIKLMSSS20 fatcat:f2bwzyo435ddza4w42mcqzf4hi

Triathlon of lightweight block ciphers for the Internet of things

Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Léo Perrin, Johann Großschädl, Alex Biryukov
2018 Journal of Cryptographic Engineering  
In this paper we introduce a framework for the benchmarking of lightweight block ciphers on a multitude of embedded platforms.  ...  The benchmarking framework provides cipher designers with an easy-to-use tool to compare new algorithms with the state-of-the-art and allows standardization organizations to conduct a fair and consistent  ...  Acknowledgements We thank all contributors listed at http://www.cryptolux.org/index.php/FELICS_Contributors for the submitted implementations and their support for a fair evaluation of lightweight block  ... 
doi:10.1007/s13389-018-0193-x fatcat:vs3xmwzyzren5amerho5cwnztu

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
2019 IACR Transactions on Symmetric Cryptology  
In this work we present the tweakable block cipher CRAFT: the efficient protection of its implementations against Differential Fault Analysis (DFA) attacks has been one of the main design criteria, while  ...  Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic  ...  Integral Attack Integral attacks [29, 55] are likely to be efficient for SPN block ciphers.  ... 
doi:10.13154/tosc.v2019.i1.5-45 dblp:journals/tosc/BeierleLMR19 fatcat:4q6m3ausjba6texe56dppgmlnm

CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks

Christof Beierle, Gregor Leander, Amir Moradi, Shahram Rasoolzadeh
2019 IACR Transactions on Symmetric Cryptology  
In this work we present the tweakable block cipher CRAFT: the efficient protection of its implementations against Differential Fault Analysis (DFA) attacks has been one of the main design criteria, while  ...  Traditionally, countermeasures against physical attacks are integrated into the implementation of cryptographic primitives after the algorithms have been designed for achieving a certain level of cryptanalytic  ...  Integral Attack Integral attacks [29, 55] are likely to be efficient for SPN block ciphers.  ... 
doi:10.46586/tosc.v2019.i1.5-45 fatcat:ry32mpm6dbhttenjxypp2ptf6m

Integral Distinguishers of the Full-Round Lightweight Block Cipher SAT_Jo

Xueying Qiu, Yongzhuang Wei, Samir Hodzic, Enes Pasalic, Chien Ming Chen
2021 Security and Communication Networks  
Although this technique was demonstrated to be efficient in specifying distinguishers of reduced round versions of several families of lightweight block ciphers (such as SIMON, PRESENT, and few others)  ...  Using a 30-round distinguisher, we also describe a subkey recovery attack on the SAT_Jo algorithm whose time complexity is about 2 66 encryptions (noting that SAT_Jo is designed to provide 80 bits of security  ...  Although designers of new schemes provide a security analysis against the well-known attacks (e.g., integral attacks [8] , differential attacks [9] , and linear attacks [10] ), it may happen that not  ... 
doi:10.1155/2021/5310545 fatcat:shkiztfqqjh37lukklkwbergja

Masta: An HE-friendly Cipher Using Modular Arithmetic

Jincheol Ha, Seongkwang Kim, Wonseok Choi, Jooyoung Lee, Dukjae Moon, Hyojin Yoon, Jihoon Cho
2020 IEEE Access  
There are many variants of differential and linear attacks such as truncated differential attacks, higher-order differential attacks, impossible differential attacks, boomerang attacks and differential-linear  ...  Cube attacks and interpolation attacks can be seen as variants of algebraic attacks and integral attacks, respectively [22] , [36] , [44] .  ...  His main research interest is focused on security and analysis of symmetric ciphers.  ... 
doi:10.1109/access.2020.3033564 fatcat:k4lufbccufacfg3by4l33bizay

Adapting Rigidity to Symmetric Cryptography

Orr Dunkelman, Léo Perrin
2019 Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop - SSR'19  
We motivate this need via a study of the literature on symmetric "kleptography" and via the study of some real-world standards.  ...  We then suggest some guidelines that could be used to leverage the unswervingness of a symmetric algorithm to standardize a highly trusted and equally safe variant of it.  ...  The first author was supported in part by the Israel Ministry of Science and Technology, the Center for Cyber, Law, and Policy in  ... 
doi:10.1145/3338500.3360335 dblp:conf/secsr/DunkelmanP19 fatcat:bezax4gyj5cd5ir6xjon6hxd5q

Adapting Rigidity to Symmetric Cryptography: Towards "Unswerving" Designs [article]

Orr Dunkelman, Léo Perrin
2019 IACR Cryptology ePrint Archive  
We motivate this need via a study of the literature on symmetric "kleptography" and via the study of some real-world standards.  ...  We then suggest some guidelines that could be used to leverage the unswervingness of a symmetric algorithm to standardize a highly trusted and equally safe variant of it.  ...  The first author was supported in part by the Israel Ministry of Science and Technology, the Center for Cyber, Law, and Policy in  ... 
dblp:journals/iacr/DunkelmanP19 fatcat:ry4momkhqbaaxbxobxqpla2tia

Cryptanalysis of Reduced-round SPECK

Jiongjiong Ren, Shaozhen Chen
2019 IEEE Access  
In this paper, we investigate both the security of SPECK against impossible differential, zero-correlation linear, and integral attacks as well as the design choice of NSA.  ...  INDEX TERMS Block cipher, impossible differential cryptanalysis, zero-correlation linear cryptanalysis, integral cryptanalysis, SPECK, design rationale.  ...  Later, many researchers investigated the security of SIMON-like ciphers considering differential and linear attacks [11] , impossible and integral attacks [12] for all design choices.  ... 
doi:10.1109/access.2019.2917015 fatcat:gf2dzy7dufcnzghjqjon4m5miu

A Security Analysis of IoT Encryption : Side Channel Cube Attack on SIMECK32/64

Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad
2018 International Journal of Computer Networks & Communications  
Therefore, this paper presents the security of the Simeck32/64 block cipher against side-channel cube attack.  ...  Simeck, a lightweight block cipher has been proposed to be one of the encryption that can be employed in the Internet of Things (IoT) applications.  ...  Simeck32/64 [1] is a lightweight block cipher that was designed based on the combination of good design components from SIMON and SPECK block ciphers [2] .  ... 
doi:10.5121/ijcnc.2018.10406 fatcat:dj6gi43vjfc2lcv5e3suhmqqom

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
The purpose of all these design choices is to harden the cipher against various classes of attacks. We also describe new S-Box search heuristics aimed at minimising the critical path.  ...  QARMA exists in 64- and 128-bit block sizes, where block and tweak size are equal, and keys are twice as long as the blocks.  ...  Scott McGregor deserves a special mention for teaching us hardware design, fixing our Verilog, and running the synthesis.  ... 
doi:10.46586/tosc.v2017.i1.4-44 fatcat:iaiczp4lhzh5pgz4quzhjcj3jm

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
The purpose of all these design choices is to harden the cipher against various classes of attacks. We also describe new S-Box search heuristics aimed at minimising the critical path.  ...  QARMA exists in 64- and 128-bit block sizes, where block and tweak size are equal, and keys are twice as long as the blocks.  ...  Scott McGregor deserves a special mention for teaching us hardware design, fixing our Verilog, and running the synthesis.  ... 
doi:10.13154/tosc.v2017.i1.4-44 dblp:journals/tosc/Avanzi17 fatcat:l5zgiqa3lzedpdajqqomixpabe
« Previous Showing results 1 — 15 out of 159 results