Filters








35 Hits in 2.1 sec

Security Analysis of SKINNY under Related-Tweakey Settings (Long Paper)

Guozhen Liu, Mohona Ghosh, Ling Song
2017 IACR Transactions on Symmetric Cryptology  
In this work, we evaluate the security of SKINNY against differential cryptanalysis in the related-tweakey model.  ...  Next, actual differential trails for SKINNY under related-tweakey model are explored and optimal differential trails of SKINNY-64 within certain number of rounds are searched with an indirect searching  ...  Conclusion This paper analyzes the security of SKINNY under related-tweakey settings using impossible differential and rectangle attacks which have a data complexity below codebook.  ... 
doi:10.13154/tosc.v2017.i3.37-72 dblp:journals/tosc/LiuGL17 fatcat:aowr3iihtnhqtgcy6y47uvofmu

Security Analysis of SKINNY under Related-Tweakey Settings

Guozhen Liu, Mohona Ghosh, Ling Song
2017 IACR Transactions on Symmetric Cryptology  
In this work, we evaluate the security of SKINNY against differential cryptanalysis in the related-tweakey model.  ...  Next, actual differential trails for SKINNY under related-tweakey model are explored and optimal differential trails of SKINNY-64 within certain number of rounds are searched with an indirect searching  ...  Conclusion This paper analyzes the security of SKINNY under related-tweakey settings using impossible differential and rectangle attacks which have a data complexity below codebook.  ... 
doi:10.46586/tosc.v2017.i3.37-72 fatcat:ekler62d6zbcjndcr5ojb7gkti

SKINNY-AEAD and SKINNY-Hash

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2020 IACR Transactions on Symmetric Cryptology  
In the last part of the paper, we provide a variety of ASIC implementations of our schemes and propose new simple SKINNY-AEAD and SKINNY-Hash variants with a reduced number of rounds while maintaining  ...  To highlight the extensive amount of third-party analysis that SKINNY obtained since its publication, we briefly survey the existing cryptanalysis results for SKINNY-128-256 and SKINNY-128-384 as of February  ...  Acknowledgements The work described in this paper has been supported in part by the Deutsche Forschungsgemeinschaft (DFG, German Research Foundation) under Germany's Excellence Strategy -EXC 2092 CASA  ... 
doi:10.13154/tosc.v2020.is1.88-131 dblp:journals/tosc/BeierleJKLMPSSS20 fatcat:u4jtzsxthjgs7gkroyq5o7mv6y

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS [chapter]

Christof Beierle, Jérémy Jean, Stefan Kölbl, Gregor Leander, Amir Moradi, Thomas Peyrin, Yu Sasaki, Pascal Sasdrich, Siang Meng Sim
2016 Lecture Notes in Computer Science  
We present a new tweakable block cipher family SKINNY, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security  ...  Secondly, we present MANTIS, a dedicated variant of SKINNY for lowlatency implementations, that constitutes a very efficient solution to the problem of designing a tweakable block cipher for memory encryption  ...  Security Analysis In this section, we provide a short summary of the in-depth analysis we conducted on the security of the SKINNY family of block ciphers.  ... 
doi:10.1007/978-3-662-53008-5_5 fatcat:ksxdbtvcczhffd43ovxtxhw6iy

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Leander Gregor, Yosuke Todo
2019 Zenodo  
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.  ...  Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of QARMA, MANTIS, and Skinny.  ...  The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] .  ... 
doi:10.5281/zenodo.2593578 fatcat:rka7qhw4l5b75bnhdfugcixnzi

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019 IACR Transactions on Symmetric Cryptology  
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.  ...  Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of Qarma, Mantis, and Skinny.  ...  The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] .  ... 
doi:10.13154/tosc.v2019.i1.192-235 dblp:journals/tosc/AnkeleDGLLT19 fatcat:ixcmix2zjrhojnn7aj6vid432u

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019 IACR Transactions on Symmetric Cryptology  
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights.  ...  Moreover, this also implies the existence of integral distinguishers on the same number of rounds. We have applied our technique on round reduced versions of Qarma, Mantis, and Skinny.  ...  The property of linear hulls under the related-key setting was also discussed by Bogdanov et al. in [BBR + 13] .  ... 
doi:10.46586/tosc.v2019.i1.192-235 fatcat:ivshx5lfhjfbdlezsmg743phvy

Cryptanalysis of SKINNY in the Framework of the SKINNY 2018–2019 Cryptanalysis Competition [chapter]

Patrick Derbez, Virginie Lallemand, Aleksei Udovenko
2020 Lecture Notes in Computer Science  
In April 2018, Beierle et al. launched the 3rd SKINNY cryptanalysis competition, a contest that aimed at motivating the analysis of their recent tweakable block cipher SKINNY.  ...  In this paper, we explain how to solve the challenges for 10-round SKINNY-128-128 and for 12-round SKINNY-64-128 in time equivalent to roughly 2 52 simple operations.  ...  The definition of the tweakey schedule of SKINNY implies that the round tweakeys of all the even rounds (similarly of all the odd rounds) are related together by linear relations.  ... 
doi:10.1007/978-3-030-38471-5_6 fatcat:v7oevhhgyzbxva7kywcpzaxgju

Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule

Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
2021 IACR Transactions on Symmetric Cryptology  
In this paper, we try to combine the two phases in a uniform automatic model.Concretely, we apply this idea to automate the related-key rectangle attacks on SKINNY and ForkSkinny.  ...  Our key-recovery attacks on a few versions of round-reduced SKINNY and ForkSkinny cover 1 to 2 more rounds than the best previous attacks.  ...  And Romulus is one of the finalists in the LWC project. So the security analysis of SKINNY is of great importance, which also affects the security evaluation of these candidates.  ... 
doi:10.46586/tosc.v2021.i2.249-291 fatcat:43ui6tm7evbftjoylx4o5djksi

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

Ling Song, Xianrui Qin, Lei Hu
2019 IACR Transactions on Symmetric Cryptology  
In the application to AES, the new framework is used to exclude incompatibility and find high probability distinguishers of AES-128 under the related-subkey setting.  ...  between the two differential trails is handled by a careful analysis of the probability of the middle part Em.  ...  In Table 5 , we copy the lowerbounds on the number of active S-boxes in SKINNY under the related-tweakey setting from [BJK + 16] .  ... 
doi:10.46586/tosc.v2019.i1.118-141 fatcat:oaycmbqhbjaclbgfatllgq4mym

Boomerang Connectivity Table Revisited. Application to SKINNY and AES

Ling Song, Xianrui Qin, Lei Hu
2019 IACR Transactions on Symmetric Cryptology  
In the application to AES, the new framework is used to exclude incompatibility and find high probability distinguishers of AES-128 under the related-subkey setting.  ...  between the two differential trails is handled by a careful analysis of the probability of the middle part Em.  ...  In Table 5 , we copy the lowerbounds on the number of active S-boxes in SKINNY under the related-tweakey setting from [BJK + 16] .  ... 
doi:10.13154/tosc.v2019.i1.118-141 dblp:journals/tosc/SongQH19 fatcat:my5o766t5vfl5mmpes35puzpcy

Analysis of AES, SKINNY, and Others with Constraint Programming

Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
2017 IACR Transactions on Symmetric Cryptology  
As a result, we find 16 related-tweakey impossible differentials for 12-round SKINNY-64-128 based on which we construct an 18-round attack on SKINNY-64-128 (one target version for the crypto competition  ...  6-round AES-128 in the related-key model.  ...  The figure of AES in the paper is produced by TkiZ [Jea16] . The work of this paper was supported by the National Key  ... 
doi:10.13154/tosc.v2017.i1.281-306 dblp:journals/tosc/SunGLYTQH17 fatcat:txrp6m7oxjbq3nbvcwxzfw4jky

Improved Rectangle Attacks on SKINNY and CRAFT

Hosein Hadipour, Nasour Bagheri, Ling Song
2021 IACR Transactions on Symmetric Cryptology  
CRAFT is another SKINNY-like tweakable block cipher for which we provide the security analysis against rectangle attack for the first time.  ...  Based on the improved boomerang distinguishers for SKINNY, we provide related-tweakey rectangle attacks on 23 rounds of SKINNY-64-128, 24 rounds of SKINNY-128-256, 29 rounds of SKINNY-64-192, and 30 rounds  ...  Nasour Bagheri was supported in part by the Iran National Science Foundation (INSF) under contract No. 98010674.  ... 
doi:10.46586/tosc.v2021.i2.140-198 fatcat:xucyzoijpzapvfs7dcvcwegn3e

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256

Rui Zong, Xiaoyang Dong, Xiaoyun Wang
2019 Science China Information Sciences  
Note that this paper only gives a more accurate security evaluation and does not threaten the security of full-round Deoxys-BC-256.  ...  In this study, by adequately studying the tweakey schedule, we seek a six-round related-tweakey impossible distinguisher of Deoxys-BC-256, which is transformed from a 3.5-round single-key impossible distinguisher  ...  In Deoxys, the size of the key and the tweak can vary within the tweakey length as long as the key size is longer than or equal to the block size, i.e., 128 bits. Related work. At FSE 2018, Ref.  ... 
doi:10.1007/s11432-017-9382-2 fatcat:ahnnhe4na5hsjkqkcz2uq7zao4

Boomerang Connectivity Table: A New Cryptanalysis Tool [chapter]

Carlos Cid, Tao Huang, Thomas Peyrin, Yu Sasaki, Ling Song
2018 Lecture Notes in Computer Science  
To illustrate the power of the BCT-based analysis, we improve boomerang attacks against Deoxys-BC, and disclose the mechanism behind an unsolved probability amplification for generating a quartet in SKINNY  ...  Crucially the validity of this figure is under the assumption that the characteristics for E0 and E1 can be chosen independently.  ...  We also thank attendees of the 2018 Dagstuhl seminar for Symmetric Cryptography, who provided us with various comments. The last author is supported by the  ... 
doi:10.1007/978-3-319-78375-8_22 fatcat:3shnwhxr7jbglipivjqw2iu4ye
« Previous Showing results 1 — 15 out of 35 results