Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
From MaRDI portal
Publication:2938843
DOI10.1007/978-3-662-45611-8_9zbMath1306.94093OpenAlexW197228877MaRDI QIDQ2938843
Lei Hu, Siwei Sun, Xiaoshuang Ma, Peng Wang, Ling Song, Kexin Qiao
Publication date: 16 January 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_9
Related Items (70)
Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeys ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ Related-Key Cryptanalysis of Midori ⋮ Survey of information security ⋮ Differential-linear cryptanalysis of the lightweight crytographic algorithm KNOT ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Counting active S-boxes is not enough ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ MILP based differential attack on round reduced WARP ⋮ A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128 ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Improved Top-Down Techniques in Differential Cryptanalysis ⋮ Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ New method for combining Matsui's bounding conditions with sequential encoding method ⋮ Fully automated differential-linear attacks against ARX ciphers ⋮ Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP ⋮ Efficient MIP techniques for computing the relaxation complexity ⋮ Superposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashing ⋮ Improved differential attack on round-reduced LEA ⋮ Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy ⋮ Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP ⋮ Modeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128 ⋮ Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers ⋮ Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher ⋮ New automatic search tool for searching for impossible differentials using undisturbed bits ⋮ Clustering effect of iterative differential and linear trails ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Massive superpoly recovery with nested monomial predictions ⋮ DEFAULT: cipher level resistance against differential fault attack ⋮ Several MILP-Aided Attacks Against SNOW 2.0 ⋮ Stretching cube attacks: improved methods to recover massive superpolies ⋮ New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network ⋮ A bit-vector differential model for the modular addition by a constant ⋮ Mind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitions ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ Quantum collision attacks on AES-like hashing with low quantum random access memories ⋮ Lombardi Drawings of Knots and Links ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ Improved Cryptanalysis on SipHash ⋮ MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck ⋮ Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck ⋮ Efficient Design Strategies Based on the AES Round Function ⋮ Bit-Based Division Property and Application to Simon Family ⋮ Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques ⋮ Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications ⋮ Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK ⋮ Truncated differential based known-key attacks on round-reduced SIMON ⋮ An observation on NORX, BLAKE2, and ChaCha ⋮ Cryptanalysis of MORUS ⋮ Nonlinear diffusion layers ⋮ Computing AES related-key differential characteristics with constraint programming ⋮ Security analysis of subterranean 2.0 ⋮ Differential Forgery Attack Against LAC ⋮ The \texttt{Deoxys} AEAD family ⋮ Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey ⋮ On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants ⋮ Pen and Paper Arguments for SIMON and SIMON-like Designs ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ More accurate results on the provable security of AES against impossible differential cryptanalysis ⋮ Automatic verification of differential characteristics: application to reduced Gimli ⋮ Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack ⋮ New Impossible Differential Search Tool from Design and Cryptanalysis Aspects
Uses Software
This page was built for publication: Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers