Filters








13 Hits in 3.6 sec

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Leander Gregor, Yosuke Todo
2019 Zenodo  
It turns out that the tweak can often be used to get zero-correlation linear hulls covering more rounds compared to just searching zero-correlation linear hulls on the data-path of a cipher.  ...  In this paper, we consider --- to the best of our knowledge --- for the first time the effect of the tweak on zero-correlation linear cryptanalysis for ciphers that have a linear tweak schedule.  ...  Zero-Correlation Linear Hull on STK with TK-1 When we consider the zero-correlation linear hull on general tweakable block ciphers, the domain space is expanded to n + t.  ... 
doi:10.5281/zenodo.2593578 fatcat:rka7qhw4l5b75bnhdfugcixnzi

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019 IACR Transactions on Symmetric Cryptology  
It turns out that the tweak can often be used to get zero-correlation linear hulls covering more rounds compared to just searching zero-correlation linear hulls on the data-path of a cipher.  ...  In this paper, we consider – to the best of our knowledge – for the first time the effect of the tweak on zero-correlation linear cryptanalysis for ciphers that have a linear tweak schedule.  ...  Zero-Correlation Linear Hull on STK with TK-1 When we consider the zero-correlation linear hull on general tweakable block ciphers, the domain space is expanded to n + t.  ... 
doi:10.46586/tosc.v2019.i1.192-235 fatcat:ivshx5lfhjfbdlezsmg743phvy

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo
2019 IACR Transactions on Symmetric Cryptology  
It turns out that the tweak can often be used to get zero-correlation linear hulls covering more rounds compared to just searching zero-correlation linear hulls on the data-path of a cipher.  ...  In this paper, we consider – to the best of our knowledge – for the first time the effect of the tweak on zero-correlation linear cryptanalysis for ciphers that have a linear tweak schedule.  ...  Zero-Correlation Attacks on Tweakable Block Ciphers Jean et al.  ... 
doi:10.13154/tosc.v2019.i1.192-235 dblp:journals/tosc/AnkeleDGLLT19 fatcat:ixcmix2zjrhojnn7aj6vid432u

Pholkos - Efficient Large-state Tweakable Block Ciphers from the AES Round Function [article]

Jannis Bossert, Eik List, Stefan Lucks, Sebastian Schmitz
2020 IACR Cryptology ePrint Archive  
We propose Pholkos, a family of (1) highly efficient, (2) highly secure, and (3) tweakable block ciphers.  ...  Using the additional public input of tweakable block ciphers for domain separation allows for exceptionally high security or performance as recently proposed modes have shown.  ...  We are highly thankful to fruitful discussions with Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, and Markus Schofnegger.  ... 
dblp:journals/iacr/BossertLLS20 fatcat:evqbtwf5erhqjjshnjnmyvxwdm

Weak Tweak-Keys for the CRAFT Block Cipher

Gregor Leander, Shahram Rasoolzadeh
2022 IACR Transactions on Symmetric Cryptology  
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks.  ...  Note that these attacks do not break the security claim of the CRAFT block cipher.  ...  Introduction CRAFT is a tweakable block cipher presented at FSE 2019 and designed by Beierle, Leander, Moradi, and Rasoolzadeh [BLMR19] .  ... 
doi:10.46586/tosc.v2022.i1.38-63 fatcat:kcppj2pclvaslpuhiw366x2vui

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of  ...  We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to {  ...  We acknowledge many interesting discussions with Can Acar, Satish Anand, Christina Boura, Antonio Cardoso Costa, Xiaoyang Dong, Orr Dunkelman, Richard Grisenthwaite, Rene Peralta, Meltem Sönmez Turan,  ... 
doi:10.46586/tosc.v2017.i1.4-44 fatcat:iaiczp4lhzh5pgz4quzhjcj3jm

The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes

Roberto Avanzi
2017 IACR Transactions on Symmetric Cryptology  
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of  ...  We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to {  ...  We acknowledge many interesting discussions with Can Acar, Satish Anand, Christina Boura, Antonio Cardoso Costa, Xiaoyang Dong, Orr Dunkelman, Richard Grisenthwaite, Rene Peralta, Meltem Sönmez Turan,  ... 
doi:10.13154/tosc.v2017.i1.4-44 dblp:journals/tosc/Avanzi17 fatcat:l5zgiqa3lzedpdajqqomixpabe

Stream cipher designs: a review

Lin Jiao, Yonglin Hao, Dengguo Feng
2020 Science China Information Sciences  
The security of the tweakable block cipher designed under TWEAKEY framework is worth of further consideration.  ...  the entire block cipher with efficient software-oriented instruction set (such as AES) and the tweakable block cipher with work mode.  ... 
doi:10.1007/s11432-018-9929-x fatcat:owggwpyki5dydekbh6dg7zvofm

Symmetric Cryptography (Dagstuhl Seminar 18021)

Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg, Michael Wagner
2018 Dagstuhl Reports  
I wish to thank Eli Biham for discussions related to conditional linear cryptanalysis and Céline Blondeau for suggestions how to improve the presentation.  ...  The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule.  ...  These constructions make use of block ciphers, tweakable block ciphers or permutations.  ... 
doi:10.4230/dagrep.8.1.1 dblp:journals/dagstuhl-reports/DaemenILN18 fatcat:qffcmfhvu5bappymycvy5pbxvy

Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions [article]

Aaqib Bashir Dar, Mashhood Jeelani Lone, Nuzhat Hussain
2021 IACR Cryptology ePrint Archive  
In this paper, we review the state-of-the-art lightweight block ciphers, present a comprehensive design niche, give a detailed taxonomy with multiple classifications and present future research directions  ...  Block ciphers have been extremely predominant in the area of cryptography and due to the paradigm shift towards devices of resource constrained nature, lightweight block ciphers have totally influenced  ...  attacks, differential attacks and advanced attacks like Biclique and Zero correlation attack.DoT is a Substitution Permutation Network (SPN) based ultra-lightweight block cipher that iterates over 31  ... 
dblp:journals/iacr/DarLH21 fatcat:e7degswt35gefavnsbmu53r7ky

The design of Xoodoo and Xoofff

Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
2018 IACR Transactions on Symmetric Cryptology  
We analyze its differential and linear propagation properties and, in particular, prove lower bounds on the weight of trails using the tree search-based technique of Mella et al. (ToSC 2017).  ...  Combining a relatively narrow permutation with the parallelism of Farfalle results in very efficient schemes on a wide range of platforms, from low-end devices to high-end processors with vector instructions  ...  No security claims are made on the round function nor the key schedule. • Tweakable block ciphers can be built using the tweakey framework [JNP14] .  ... 
doi:10.46586/tosc.v2018.i4.1-38 fatcat:fyqmlptcpbgx5al5zbk72m6fma

The design of Xoodoo and Xoofff

Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer
2018 IACR Transactions on Symmetric Cryptology  
We analyze its differential and linear propagation properties and, in particular, prove lower bounds on the weight of trails using the tree search-based technique of Mella et al. (ToSC 2017).  ...  Combining a relatively narrow permutation with the parallelism of Farfalle results in very efficient schemes on a wide range of platforms, from low-end devices to high-end processors with vector instructions  ...  No security claims are made on the round function nor the key schedule. • Tweakable block ciphers can be built using the tweakey framework [JNP14] .  ... 
doi:10.13154/tosc.v2018.i4.1-38 dblp:journals/tosc/DaemenHAK18 fatcat:g5yefloefnf7fl3wzdi3zkppo4

Dagstuhl Reports, Volume 10, Issue 1, January 2020, Complete Issue

2020
Oliver Stein for his remarks on constraint feasibility. Participants Richard -Symmetric Cryptography model in the original submission.  ...  This means that SAEF can be safely used when plaintext or ciphertext arrives in blocks, and does not crumble if nonces accidentally repeat, while being more efficient than many existing constructions.  ...  Proving relevant bounds for permutations and (tweakable) block ciphers. Security arguments for symmetric cryptographic primitives often rely on simplifying assumptions and unproven heuristics.  ... 
doi:10.4230/dagrep.10.1 fatcat:bcgvzpofpfdsfapuhkstc6teyi