A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
2019
Zenodo
It turns out that the tweak can often be used to get zero-correlation linear hulls covering more rounds compared to just searching zero-correlation linear hulls on the data-path of a cipher. ...
In this paper, we consider --- to the best of our knowledge --- for the first time the effect of the tweak on zero-correlation linear cryptanalysis for ciphers that have a linear tweak schedule. ...
Zero-Correlation Linear Hull on STK with TK-1 When we consider the zero-correlation linear hull on general tweakable block ciphers, the domain space is expanded to n + t. ...
doi:10.5281/zenodo.2593578
fatcat:rka7qhw4l5b75bnhdfugcixnzi
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
2019
IACR Transactions on Symmetric Cryptology
It turns out that the tweak can often be used to get zero-correlation linear hulls covering more rounds compared to just searching zero-correlation linear hulls on the data-path of a cipher. ...
In this paper, we consider – to the best of our knowledge – for the first time the effect of the tweak on zero-correlation linear cryptanalysis for ciphers that have a linear tweak schedule. ...
Zero-Correlation Linear Hull on STK with TK-1 When we consider the zero-correlation linear hull on general tweakable block ciphers, the domain space is expanded to n + t. ...
doi:10.46586/tosc.v2019.i1.192-235
fatcat:ivshx5lfhjfbdlezsmg743phvy
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
2019
IACR Transactions on Symmetric Cryptology
It turns out that the tweak can often be used to get zero-correlation linear hulls covering more rounds compared to just searching zero-correlation linear hulls on the data-path of a cipher. ...
In this paper, we consider – to the best of our knowledge – for the first time the effect of the tweak on zero-correlation linear cryptanalysis for ciphers that have a linear tweak schedule. ...
Zero-Correlation Attacks on Tweakable Block Ciphers Jean et al. ...
doi:10.13154/tosc.v2019.i1.192-235
dblp:journals/tosc/AnkeleDGLLT19
fatcat:ixcmix2zjrhojnn7aj6vid432u
Pholkos - Efficient Large-state Tweakable Block Ciphers from the AES Round Function
[article]
2020
IACR Cryptology ePrint Archive
We propose Pholkos, a family of (1) highly efficient, (2) highly secure, and (3) tweakable block ciphers. ...
Using the additional public input of tweakable block ciphers for domain separation allows for exceptionally high security or performance as recently proposed modes have shown. ...
We are highly thankful to fruitful discussions with Maria Eichlseder, Lorenzo Grassi, Reinhard Lüftenegger, Christian Rechberger, and Markus Schofnegger. ...
dblp:journals/iacr/BossertLLS20
fatcat:evqbtwf5erhqjjshnjnmyvxwdm
Weak Tweak-Keys for the CRAFT Block Cipher
2022
IACR Transactions on Symmetric Cryptology
CRAFT is a lightweight tweakable Substitution-Permutation-Network (SPN) block cipher optimized for efficient protection of its implementations against Differential Fault Analysis (DFA) attacks. ...
Note that these attacks do not break the security claim of the CRAFT block cipher. ...
Introduction CRAFT is a tweakable block cipher presented at FSE 2019 and designed by Beierle, Leander, Moradi, and Rasoolzadeh [BLMR19] . ...
doi:10.46586/tosc.v2022.i1.38-63
fatcat:kcppj2pclvaslpuhiw366x2vui
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
2017
IACR Transactions on Symmetric Cryptology
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of ...
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to { ...
We acknowledge many interesting discussions with Can Acar, Satish Anand, Christina Boura, Antonio Cardoso Costa, Xiaoyang Dong, Orr Dunkelman, Richard Grisenthwaite, Rene Peralta, Meltem Sönmez Turan, ...
doi:10.46586/tosc.v2017.i1.4-44
fatcat:iaiczp4lhzh5pgz4quzhjcj3jm
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
2017
IACR Transactions on Symmetric Cryptology
This paper introduces QARMA, a new family of lightweight tweakable block ciphers targeted at applications such as memory encryption, the generation of very short tags for hardware-assisted prevention of ...
We introduce and analyse a family of Almost MDS matrices defined over a ring with zero divisors that allows us to encode rotations in its operation while maintaining the minimal latency associated to { ...
We acknowledge many interesting discussions with Can Acar, Satish Anand, Christina Boura, Antonio Cardoso Costa, Xiaoyang Dong, Orr Dunkelman, Richard Grisenthwaite, Rene Peralta, Meltem Sönmez Turan, ...
doi:10.13154/tosc.v2017.i1.4-44
dblp:journals/tosc/Avanzi17
fatcat:l5zgiqa3lzedpdajqqomixpabe
Stream cipher designs: a review
2020
Science China Information Sciences
The security of the tweakable block cipher designed under TWEAKEY framework is worth of further consideration. ...
the entire block cipher with efficient software-oriented instruction set (such as AES) and the tweakable block cipher with work mode. ...
doi:10.1007/s11432-018-9929-x
fatcat:owggwpyki5dydekbh6dg7zvofm
Symmetric Cryptography (Dagstuhl Seminar 18021)
2018
Dagstuhl Reports
I wish to thank Eli Biham for discussions related to conditional linear cryptanalysis and Céline Blondeau for suggestions how to improve the presentation. ...
The TWEAKEY/STK construction is an increasingly popular approach for designing tweakable block ciphers that notably uses a linear tweakey schedule. ...
These constructions make use of block ciphers, tweakable block ciphers or permutations. ...
doi:10.4230/dagrep.8.1.1
dblp:journals/dagstuhl-reports/DaemenILN18
fatcat:qffcmfhvu5bappymycvy5pbxvy
Revisiting Lightweight Block Ciphers: Review, Taxonomy and Future directions
[article]
2021
IACR Cryptology ePrint Archive
In this paper, we review the state-of-the-art lightweight block ciphers, present a comprehensive design niche, give a detailed taxonomy with multiple classifications and present future research directions ...
Block ciphers have been extremely predominant in the area of cryptography and due to the paradigm shift towards devices of resource constrained nature, lightweight block ciphers have totally influenced ...
attacks, differential attacks and advanced attacks like Biclique and Zero correlation attack.DoT is a Substitution Permutation Network (SPN) based ultra-lightweight block cipher that iterates over 31 ...
dblp:journals/iacr/DarLH21
fatcat:e7degswt35gefavnsbmu53r7ky
The design of Xoodoo and Xoofff
2018
IACR Transactions on Symmetric Cryptology
We analyze its differential and linear propagation properties and, in particular, prove lower bounds on the weight of trails using the tree search-based technique of Mella et al. (ToSC 2017). ...
Combining a relatively narrow permutation with the parallelism of Farfalle results in very efficient schemes on a wide range of platforms, from low-end devices to high-end processors with vector instructions ...
No security claims are made on the round function nor the key schedule. • Tweakable block ciphers can be built using the tweakey framework [JNP14] . ...
doi:10.46586/tosc.v2018.i4.1-38
fatcat:fyqmlptcpbgx5al5zbk72m6fma
The design of Xoodoo and Xoofff
2018
IACR Transactions on Symmetric Cryptology
We analyze its differential and linear propagation properties and, in particular, prove lower bounds on the weight of trails using the tree search-based technique of Mella et al. (ToSC 2017). ...
Combining a relatively narrow permutation with the parallelism of Farfalle results in very efficient schemes on a wide range of platforms, from low-end devices to high-end processors with vector instructions ...
No security claims are made on the round function nor the key schedule. • Tweakable block ciphers can be built using the tweakey framework [JNP14] . ...
doi:10.13154/tosc.v2018.i4.1-38
dblp:journals/tosc/DaemenHAK18
fatcat:g5yefloefnf7fl3wzdi3zkppo4
Dagstuhl Reports, Volume 10, Issue 1, January 2020, Complete Issue
2020
Oliver Stein for his remarks on constraint feasibility.
Participants
Richard
-Symmetric Cryptography model in the original submission. ...
This means that SAEF can be safely used when plaintext or ciphertext arrives in blocks, and does not crumble if nonces accidentally repeat, while being more efficient than many existing constructions. ...
Proving relevant bounds for permutations and (tweakable) block ciphers. Security arguments for symmetric cryptographic primitives often rely on simplifying assumptions and unproven heuristics. ...
doi:10.4230/dagrep.10.1
fatcat:bcgvzpofpfdsfapuhkstc6teyi