Improved search for integral, impossible differential and zero-correlation attacks: Application to ascon, forkskinny, skinny, mantis, present and qarmav2

H Hadipour, S Gerhalter… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most
important attacks on block ciphers. However, manually finding these attacks can be a …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …

Truncated boomerang attacks and application to AES-based ciphers

A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …

Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond

L Song, Q Yang, Y Chen, L Hu, J Weng - Annual International Conference …, 2024 - Springer
In differential-like attacks, the process typically involves extending a distinguisher forward
and backward with probability 1 for some rounds and recovering the key involved in the …

[KNYGA][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

A generic algorithm for efficient key recovery in differential attacks–and its associated tool

C Boura, N David, P Derbez, R Heim Boissier… - … Conference on the …, 2024 - Springer
Differential cryptanalysis is an old and powerful attack against block ciphers. While different
techniques have been introduced throughout the years to improve the complexity of this …

Optimizing rectangle and boomerang attacks: A unified and generic framework for key recovery

Q Yang, L Song, N Zhang, D Shi, L Wang, J Zhao… - Journal of …, 2024 - Springer
The rectangle attack has shown to be a very powerful form of cryptanalysis against block
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …

Optimizing rectangle attacks: a unified and generic framework for key recovery

L Song, N Zhang, Q Yang, D Shi, J Zhao, L Hu… - … Conference on the …, 2022 - Springer
The rectangle attack has shown to be a very powerful form of cryptanalysis against block
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …

Throwing boomerangs into Feistel structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE

H Hadipour, M Nageler… - IACR Transactions …, 2022 - moving-the-social.ub.rub.de
Automatic tools to search for boomerang distinguishers have seen significant advances over
the past few years. However, most previous work has focused on ciphers based on a …

Revisiting related-key boomerang attacks on AES using computer-aided tool

P Derbez, M Euler, PA Fouque, PH Nguyen - International Conference on …, 2022 - Springer
In recent years, several MILP models were introduced to search automatically for
boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …