Search
Search Results
-
An efficient permutation approach for SbPN-based symmetric block ciphers
It is challenging to devise lightweight cryptographic primitives efficient in both hardware and software that can provide an optimum level of...
-
A practical-quantum differential attack on block ciphers
Differential attack is a basic cryptanalysis method for block ciphers that exploits the high probability relations between the input and output...
-
Quantum resource estimation of PRINCE and Midori Block Ciphers
With the continuous advancement of quantum technologies, the estimation of quantum resources necessary for quantum tasks becomes extremely important...
-
On improved security bounds of one block ciphers mode of operation for protection of block-oriented system storage devices
In the end of 2022 in Russian Federation recommendations for standardization were adopted defining a block ciphers mode of operation for...
-
Continuously non-malleable codes from block ciphers in split-state model
Non-malleable code is an encoding scheme that is useful in situations where traditional error correction or detection is impossible to achieve. It...
-
Enabling power attack on traces of FPGA based block ciphers not acquired with start of encryption
This paper describes a new technique to enable Correlation Power Analysis (CPA) attack on block ciphers executing on Field Programmable Gate Array...
-
SCARE and power attack on AES-like block ciphers with secret S-box
Despite Kerckhoff’s principle, there are secret ciphers with unknown components for diplomatic or military usages. The side-channel analysis of...
-
Improved Integral Cryptanalysis of Block Ciphers BORON and Khudra
Integral cryptanalysis is one of the frequently-used cryptanalytic methods of symmetric-key primitives. With the help of division property and the... -
Towards accurate keyspace analysis of chaos-based image ciphers
In recent years, there has been a surge in new chaos-based cryptographic algorithms, many of which claim to have unusually large keyspaces. Although...
-
Structural evaluation of AES-like ciphers against mixture differential cryptanalysis
At ASIACRYPT 2017, Rønjom et al. analyzed AES with the yoyo attack. Similar to their 4-round AES distinguisher, Grassi proposed the 4-round mixture...
-
Deep Learning-Based Rotational-XOR Distinguishers for AND-RX Block Ciphers: Evaluations on Simeck and Simon
The use of deep learning techniques in cryptanalysis has garnered considerable interest following Gohr’s seminal work in 2019. Subsequent studies... -
Bounding the length of impossible differentials for SPN block ciphers
Evaluating the security of a block cipher against impossible differential cryptanalysis, is an important aspect during the design process. The...
-
Block Ciphers Classification Based on Randomness Test Statistic Value via LightGBM
Cryptographic algorithms classification, which can detect the underlying encryption algorithm on sufficient large ciphertexts, is essential to... -
Full round impossible differentials for Feistel ciphers
In this paper a family of l round balanced Feistel ciphers with non-bijective functions F is being considered. For any such algorithm, the existence...
-
Output Prediction Attacks on Block Ciphers Using Deep Learning
In this paper, we propose deep learning-based output prediction attacks in a blackbox setting. As preliminary experiments, we first focus on two toy... -
SAT-Aided Differential Cryptanalysis of Lightweight Block Ciphers Midori, MANTIS and QARMA
Lightweight primitives have already received a lot of attention with the growth of resource-constrained devices, and many lightweight block ciphers... -
Feistel Ciphers Based on a Single Primitive
We consider Feistel ciphers instantiated with tweakable block ciphers (TBCs) and ideal ciphers (ICs). The indistinguishability security of the... -
Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
For block ciphers, Bogdanov et al. found that there are some linear approximations satisfying that their biases are deterministically invariant under...
-
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
In this paper, we study the security of the Key-Alternating Feistel (KAF) ciphers, a class of key alternating ciphers with the Feistel structure,...
-
Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
Cryptanalysis of modern symmetric ciphers may be done by using linear equation systems with multiple right hand sides, which describe the encryption...