Finding the impossible: Automated search for full impossible-differential, zero-correlation, and integral attacks
Abstract Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of
important attacks on block ciphers. For example, the impossible differential attack was the …
important attacks on block ciphers. For example, the impossible differential attack was the …
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li… - Designs, Codes and …, 2022 - Springer
We revisit designing AND-RX block ciphers, that is, the designs assembled with the most
fundamental binary operations—AND, Rotation and XOR operations and do not rely on …
fundamental binary operations—AND, Rotation and XOR operations and do not rely on …
Improved rectangle attacks on SKINNY and CRAFT
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …
Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck …
Abstract In 1994, Langford and Hellman introduced differential-linear (DL) cryptanalysis,
with the idea of decomposing the block cipher E into two parts, E u and E ℓ, such that E u …
with the idea of decomposing the block cipher E into two parts, E u and E ℓ, such that E u …
Proposing an milp-based method for the experimental verification of difference-based trails: application to speck, SIMECK
Searching for the right pairs of inputs in difference-based distinguishers is an important task
for the experimental verification of the distinguishers in symmetric-key ciphers. In this paper …
for the experimental verification of the distinguishers in symmetric-key ciphers. In this paper …
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)
A Ranea, V Rijmen - IET Information Security, 2022 - Wiley Online Library
Automated search methods based on Satisfiability Modulo Theory (SMT) problems are
being widely used to evaluate the security of block ciphers against distinguishing attacks …
being widely used to evaluate the security of block ciphers against distinguishing attacks …
Differential attacks on CRAFT exploiting the involutory s-boxes and tweak additions
CRAFT is a lightweight tweakable block cipher proposed at FSE 2019, which allows
countermeasures against Differential Fault Attacks to be integrated into the cipher at the …
countermeasures against Differential Fault Attacks to be integrated into the cipher at the …
A novel lightweight block cipher-based mutual authentication protocol for constrained environments
The communication security of constrained objects such as radio frequency identification
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …
Automatic generation of declarative models for differential cryptanalysis
When designing a new symmetric block cipher, it is necessary to evaluate its robustness
against differential attacks. This is done by computing Truncated Differential Characteristics …
against differential attacks. This is done by computing Truncated Differential Characteristics …
Related-Key Differential Cryptanalysis of Full Round CRAFT
CRAFT is a lightweight tweakable block cipher introduced in FSE 2019. One of the main
design criteria of CRAFT is the efficient protection of its implementations against differential …
design criteria of CRAFT is the efficient protection of its implementations against differential …