CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

Boomerang connectivity table: A new cryptanalysis tool

C Cid, T Huang, T Peyrin, Y Sasaki, L Song - … , Tel Aviv, Israel, April 29-May …, 2018 - Springer
A boomerang attack is a cryptanalysis framework that regards a block cipher E as the
composition of two sub-ciphers E_1 ∘ E_0 E 1∘ E 0 and builds a particular characteristic for …

[PDF][PDF] Status report on the second round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, C Calik… - 2021 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more Authenticated Encryption with Associated …

Finding the impossible: Automated search for full impossible-differential, zero-correlation, and integral attacks

H Hadipour, S Sadeghi, M Eichlseder - … on the Theory and Applications of …, 2023 - Springer
Abstract Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of
important attacks on block ciphers. For example, the impossible differential attack was the …

Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis

R Ankele, S Kölbl - International Conference on Selected Areas in …, 2018 - Springer
Resistance against differential cryptanalysis is an important design criteria for any modern
block cipher and most designs rely on finding some upper bound on probability of single …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …

Forkcipher: a new primitive for authenticated encryption of very short messages

E Andreeva, V Lallemand, A Purnal… - … Conference on the …, 2019 - Springer
Highly efficient encryption and authentication of short messages is an essential requirement
for enabling security in constrained scenarios such as the CAN FD in automotive systems …

Improved rectangle attacks on SKINNY and CRAFT

H Hadipour, N Bagheri, L Song - IACR Transactions on Symmetric …, 2021 - tches.iacr.org
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E1∘ E0, to construct a …

Analysis of AES, SKINNY, and others with constraint programming

S Sun, D Gerault, P Lafourcade, Q Yang… - IACR transactions on …, 2017 - hal.science
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis.
In this work, we employ the constraint programming (CP) technique to tackle such problems …

Catching the fastest boomerangs: Application to SKINNY

S Delaune, P Derbez, M Vavrille - IACR Transactions on Symmetric …, 2020 - tosc.iacr.org
In this paper we describe a new tool to search for boomerang distinguishers. One limitation
of the MILP model of Liu et al. is that it handles only one round for the middle part while …