Improved search for integral, impossible differential and zero-correlation attacks: Application to ascon, forkskinny, skinny, mantis, present and qarmav2
H Hadipour, S Gerhalter… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most
important attacks on block ciphers. However, manually finding these attacks can be a …
important attacks on block ciphers. However, manually finding these attacks can be a …
Key guessing strategies for linear key-schedule algorithms in rectangle attacks
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
find the right quartets which may suggest key candidates have to satisfy some nonlinear …
Truncated boomerang attacks and application to AES-based ciphers
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …
instead of using a single long differential. It has been applied to many primitives, and results …
Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
In differential-like attacks, the process typically involves extending a distinguisher forward
and backward with probability 1 for some rounds and recovering the key involved in the …
and backward with probability 1 for some rounds and recovering the key involved in the …
[KNYGA][B] Status report on the final round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …
standardization process to select one or more schemes that provide Authenticated …
A generic algorithm for efficient key recovery in differential attacks–and its associated tool
Differential cryptanalysis is an old and powerful attack against block ciphers. While different
techniques have been introduced throughout the years to improve the complexity of this …
techniques have been introduced throughout the years to improve the complexity of this …
Optimizing rectangle and boomerang attacks: A unified and generic framework for key recovery
The rectangle attack has shown to be a very powerful form of cryptanalysis against block
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …
Optimizing rectangle attacks: a unified and generic framework for key recovery
The rectangle attack has shown to be a very powerful form of cryptanalysis against block
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …
ciphers. Given a rectangle distinguisher, one expects to mount key recovery attacks as …
Throwing boomerangs into Feistel structures: Application to CLEFIA, WARP, LBlock, LBlock-s and TWINE
Automatic tools to search for boomerang distinguishers have seen significant advances over
the past few years. However, most previous work has focused on ciphers based on a …
the past few years. However, most previous work has focused on ciphers based on a …
Revisiting related-key boomerang attacks on AES using computer-aided tool
In recent years, several MILP models were introduced to search automatically for
boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …
boomerang distinguishers and boomerang attacks on block ciphers. However, they can only …