Search
Search Results
-
Correlation Cube Attack Revisited
In this paper, we improve the cube attack by exploiting low-degree factors of the superpoly w.r.t. certain “special” index set of cube (ISoC). This... -
A New Correlation Cube Attack Based on Division Property
Correlation cube attacks were proposed by Liu et al. at EUROCRYPT 2018, which targeted a modern symmetric-key cryptosystem based on nonlinear... -
Cube attack on stream cipher E0: revisited
To investigate the process of cube attack in the world of wireless networks, Nikolaos Petrakos modeled E0 encryption function and implemented cube...
-
Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak
Since the announcement of the NIST call for a new lightweight cryptographic standard, a lot of schemes have been proposed in response. Xoodyak is one... -
Security Analysis of WAGE Against Division Property Based Cube Attack
In recent years, as more Internet of Things (IoT) devices are connected to the internet, lightweight cryptography has become more and more important.... -
Fourteen years of cube attacks
Algebraic Cryptanalysis is a widely used technique that tackles the problem of breaking ciphers mainly relying on the ability to express a...
-
Batch medical image encryption using 3D Latin cube-based simultaneous permutation and diffusion
Nowadays, numerous encryption schemes have been proposed in response to the growing concerns regarding the security of individuals’ health...
-
Cube Attacks on Round-Reduced Grain-128AEAD
Lightweight cryptography aims to design secure and efficient cryptographic algorithms for resource-constrained devices. Traditional cryptographic... -
Multiple remote sensing image encryption scheme based on saliency extraction and magic cube circular motion
To improve the salient region security and transmission efficiency of remote sensing images, a multiple remote sensing image (MRSIs) encryption...
-
Key Filtering in Cube Attacks from the Implementation Aspect
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms... -
RISE: Rubik’s cube and image segmentation based secure medical images encryption
Despite the ease of digital image distribution, storage, and replication, averting identity theft, privacy breaches, and ownership issues can be...
-
More Balanced Polynomials: Cube Attacks on 810- And 825-Round Trivium with Practical Complexities
The key step of the cube attack is to recover the special polynomial, the superpoly, of the target cipher. In particular, the balanced superpoly, in... -
Equitable [[2, 10], [6, 6]]-partitions of the 12-cube
We describe the computer-aided classification of equitable partitions of the 12-cube with quotient matrix [[2, 10], [6, 6]], or, equivalently, simple...
-
An Experimentally Verified Attack on 820-Round Trivium
The cube attack is one of the most important cryptanalytic techniques against Trivium. As the method of recovering superpolies becomes more and more... -
Piecewise symmetric magic cube: application to text cryptography
This article propounds a Piecewise Symmetric Magic Cube (PSMC), the properties of which have reinvigorated its application to text encryption. A...
-
Strengthening wavelet based image steganography using Rubik’s cube segmentation and secret image scrambling
Image steganography is an extremely rich and significant exploration region that gives productive answers to some genuine and modern issues. This...
-
Fast image encryption based on new cascade chaotic system and Rubik’s cube strategy
The strength and effectiveness of a chaotic image cryptosystem are closely related to the complexity of the used chaotic maps. This paper first...
-
A lightweight image encryption algorithm based on patterns in Rubik’s revenge cube
Typical security confirmation for a cryptographic protocol correlates its resilience to a specific attack to assure the hardness of some mathematical...
-
Conditional Cube Attacks on Full Members of KNOT-AEAD Family
KNOT is a family of permutation-based lightweight AEAD and hashing algorithms, which is submitted to the NIST Lightweight Cryptography...