Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon

C Boura, M Naya-Plasencia, V Suder - … on the Theory and Application of …, 2014 - Springer
Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis
against block ciphers. These attacks, even if extensively used, remain not fully understood …

Improved search for integral, impossible differential and zero-correlation attacks: Application to ascon, forkskinny, skinny, mantis, present and qarmav2

H Hadipour, S Gerhalter… - IACR Transactions …, 2024 - ojs.ub.ruhr-uni-bochum.de
Integral, impossible-differential (ID), and zero-correlation (ZC) attacks are three of the most
important attacks on block ciphers. However, manually finding these attacks can be a …

Finding the impossible: Automated search for full impossible-differential, zero-correlation, and integral attacks

H Hadipour, S Sadeghi, M Eichlseder - … on the Theory and Applications of …, 2023 - Springer
Abstract Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of
important attacks on block ciphers. For example, the impossible differential attack was the …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …

Improved impossible differential cryptanalysis of 7-round AES-128

H Mala, M Dakhilalian, V Rijmen… - Progress in Cryptology …, 2010 - Springer
Using a new 4-round impossible differential in AES that allows us to exploit the redundancy
in the key schedule of AES-128 in a way more effective than previous work, we present a …

Zero correlation linear cryptanalysis with reduced data complexity

A Bogdanov, M Wang - International Workshop on Fast Software …, 2012 - Springer
Zero correlation linear cryptanalysis is a novel key recovery technique for block ciphers
proposed in [5]. It is based on linear approximations with probability of exactly 1/2 (which …

Automatic search for related-key differential characteristics in byte-oriented block ciphers: Application to AES, Camellia, Khazad and others

A Biryukov, I Nikolić - Annual International Conference on the Theory and …, 2010 - Springer
While differential behavior of modern ciphers in a single secret key scenario is relatively well
understood, and simple techniques for computation of security lower bounds are readily …

Security analysis of SKINNY under related-tweakey settings

G Liu, M Ghosh, L Song - Cryptology ePrint Archive, 2016 - eprint.iacr.org
In CRYPTO'16, a new family of tweakable lightweight block ciphers-SKINNY was introduced.
Denoting the variants of SKINNY as SKINNY-$ n $-$ t $, where $ n $ represents the block …

A generic algorithm for efficient key recovery in differential attacks–and its associated tool

C Boura, N David, P Derbez, R Heim Boissier… - … Conference on the …, 2024 - Springer
Differential cryptanalysis is an old and powerful attack against block ciphers. While different
techniques have been introduced throughout the years to improve the complexity of this …

Cryptanalysis of round-reduced simon32 based on deep learning

Z Hou, J Ren, S Chen - Cryptology ePrint Archive, 2021 - eprint.iacr.org
Deep learning has played an important role in many fields. It shows significant potential to
cryptanalysis. Differential cryptanalysis is an important method in the field of block cipher …