Search
Search Results
-
Cube Attacks on Round-Reduced Grain-128AEAD
Lightweight cryptography aims to design secure and efficient cryptographic algorithms for resource-constrained devices. Traditional cryptographic... -
Superpoly Recovery of Grain-128AEAD Using Division Property
The cube attack is a powerful cryptanalytic technique against stream ciphers. Cube attacks exploit the algebraic properties of symmetric ciphers by... -
Key Filtering in Cube Attacks from the Implementation Aspect
In cube attacks, key filtering is a basic step of identifying the correct key candidates by referring to the truth tables of superpolies. When terms... -
Massive Superpoly Recovery with a Meet-in-the-Middle Framework
The cube attack extracts the information of secret key bits by recovering the coefficient called superpoly in the output bit with respect to a subset... -
Massive Superpoly Recovery with Nested Monomial Predictions
Determining the exact algebraic structure or some partial information of the superpoly for a given cube is a necessary step in the cube attack – a... -
Stretching Cube Attacks: Improved Methods to Recover Massive Superpolies
Cube attacks exploit the algebraic properties of symmetric ciphers by recovering a special polynomial, the superpoly, and subsequently the secret... -
Efficient Hardware Implementations of Grain-128AEAD
We implement the Grain-128AEAD stream cipher in hardware, using a 65 nm library. By exploring different optimization techniques, both at RTL level... -
Grain-128AEADv2: Strengthening the Initialization Against Key Reconstruction
Properties of the Grain-128AEAD key re-introduction, as part of the cipher initialization, are analyzed and discussed. We consider and analyze... -
Modeling for Three-Subset Division Property without Unknown Subset
A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the...
-
Algebraic Attacks on Grain-Like Keystream Generators
This paper analyses the resistance of certain keystream generators against algebraic attacks, namely generators consisting of a nonlinear feedback... -
Resource-Aware Cryptography: An Analysis of Lightweight Cryptographic Primitives
With the increased use of highly constrained interconnected devices in various areas like healthcare, sensor networks, the internet of things (IoT),...
-
Lightweight encryption scheme based on a new NLFSR
This paper presents a new nonlinear feedback shift register (NLFSR) in the Galois configuration to generate the pseudorandom number sequences (PRNS)...
-
Modeling for Three-Subset Division Property Without Unknown Subset
A division property is a generic tool to search for integral distinguishers, and automatic tools such as MILP or SAT/SMT allow us to evaluate the... -
An AEAD Variant of the Grain Stream Cipher
A new Grain stream cipher, denoted Grain-128AEAD is presented, with support for authenticated encryption with associated data. The cipher takes a... -
Analyzing the Leakage Resistance of the NIST’s Lightweight Crypto Competition’s Finalists
We investigate the security of the NIST Lightweight Crypto Competition’s Finalists against side-channel attacks. We start with a mode-level analysis... -
Discussion on a new paradigm of endogenous security towards 6G networks
The sixth-generation mobile communication (6G) networks will face more complex endogenous security problems, and it is urgent to propose new...
-
Improved Graph-Based Model for Recovering Superpoly on Trivium
Recovering superpoly for a given cube is the key step in cube attacks - an algebraic cryptanalysis method for symmetric ciphers. Since 2015, division... -
Arithmetic Circuit Implementations of S-boxes for SKINNY and PHOTON in MPC
Secure multi-party computation (MPC) enables multiple distrusting parties to compute a function while kee** their respective inputs private. In a... -
Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output
This paper presents an investigation into the resistance of linearly filtered nonlinear feedback shift registers (LF-NFSRs) against distinguishing... -
An overview of cryptographic primitives for possible use in 5G and beyond
This survey overviews the potential use of cryptographic primitives in the fifth-generation mobile communications system (aka 5G) and beyond. It...