Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
From MaRDI portal
Publication:2182076
DOI10.1007/s10623-020-00730-1zbMath1448.94236OpenAlexW3005554792WikidataQ121613750 ScholiaQ121613750MaRDI QIDQ2182076
Willi Meier, Keting Jia, Gaoli Wang, Xiaoyang Dong, Boxin Zhao
Publication date: 21 May 2020
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-020-00730-1
Related Items (7)
Investigation for 8-bit \textsc{SKINNY}-like S-boxes, analysis and applications ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ Related-tweakey impossible differential attack on reduced-round \texttt{SKINNY-AEAD} M1/M3 ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Automatic boomerang attacks search on Rijndael
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Boomerang Connectivity Table: a new cryptanalysis tool
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
- Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT
- Related-key boomerang attacks on GIFT with automated trail search including BCT effect
- MILP-based differential attack on round-reduced GIFT
- On probability of success in linear and differential cryptanalysis
- Midori: A Block Cipher for Low Energy
- The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
- Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Pushing the Limits: A Very Compact and a Threshold Implementation of AES
- The Software Performance of Authenticated-Encryption Modes
- The LED Block Cipher
- PRESENT: An Ultra-Lightweight Block Cipher
- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Impossible Differential Cryptanalysis of Reduced-Round SKINNY
- GIFT: A Small Present
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
- The Return of the Cryptographic Boomerang
- Related-Key Boomerang and Rectangle Attacks
- A Related-Key Rectangle Attack on the Full KASUMI
This page was built for publication: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT