Finding the impossible: Automated search for full impossible-differential, zero-correlation, and integral attacks

H Hadipour, S Sadeghi, M Eichlseder - … on the Theory and Applications of …, 2023 - Springer
Abstract Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of
important attacks on block ciphers. For example, the impossible differential attack was the …

SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations

S Chen, Y Fan, L Sun, Y Fu, H Zhou, Y Li… - Designs, Codes and …, 2022 - Springer
We revisit designing AND-RX block ciphers, that is, the designs assembled with the most
fundamental binary operations—AND, Rotation and XOR operations and do not rely on …

Improved rectangle attacks on SKINNY and CRAFT

H Hadipour, N Bagheri, L Song - IACR Transactions on Symmetric …, 2021 - tches.iacr.org
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …

Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck …

H Hadipour, P Derbez, M Eichlseder - Annual International Cryptology …, 2024 - Springer
Abstract In 1994, Langford and Hellman introduced differential-linear (DL) cryptanalysis,
with the idea of decomposing the block cipher E into two parts, E u and E ℓ, such that E u …

Proposing an milp-based method for the experimental verification of difference-based trails: application to speck, SIMECK

S Sadeghi, V Rijmen, N Bagheri - Designs, Codes and Cryptography, 2021 - Springer
Searching for the right pairs of inputs in difference-based distinguishers is an important task
for the experimental verification of the distinguishers in symmetric-key ciphers. In this paper …

Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)

A Ranea, V Rijmen - IET Information Security, 2022 - Wiley Online Library
Automated search methods based on Satisfiability Modulo Theory (SMT) problems are
being widely used to evaluate the security of block ciphers against distinguishing attacks …

Differential attacks on CRAFT exploiting the involutory s-boxes and tweak additions

H Guo, S Sun, D Shi, L Sun, Y Sun, L Hu… - Cryptology ePrint …, 2020 - eprint.iacr.org
CRAFT is a lightweight tweakable block cipher proposed at FSE 2019, which allows
countermeasures against Differential Fault Attacks to be integrated into the cipher at the …

A novel lightweight block cipher-based mutual authentication protocol for constrained environments

C Trinh, B Huynh, J Lansky, S Mildeova… - IEEE …, 2020 - ieeexplore.ieee.org
The communication security of constrained objects such as radio frequency identification
(RFID) tags and wireless sensor network (WSN) is very challenging because it is not always …

Automatic generation of declarative models for differential cryptanalysis

L Libralesso, F Delobel, P Lafourcade… - CP 2021-27th …, 2021 - hal.science
When designing a new symmetric block cipher, it is necessary to evaluate its robustness
against differential attacks. This is done by computing Truncated Differential Characteristics …

Related-Key Differential Cryptanalysis of Full Round CRAFT

M ElSheikh, AM Youssef - … Conference on Security, Privacy, and Applied …, 2019 - Springer
CRAFT is a lightweight tweakable block cipher introduced in FSE 2019. One of the main
design criteria of CRAFT is the efficient protection of its implementations against differential …