Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers

From MaRDI portal
Publication:2938843

DOI10.1007/978-3-662-45611-8_9zbMath1306.94093OpenAlexW197228877MaRDI QIDQ2938843

Lei Hu, Siwei Sun, Xiaoshuang Ma, Peng Wang, Ling Song, Kexin Qiao

Publication date: 16 January 2015

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-45611-8_9




Related Items (70)

Zero-correlation linear cryptanalysis with equal treatment for plaintexts and tweakeysWARP: revisiting GFN for lightweight 128-bit block cipherDual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like CiphersRelated-Key Cryptanalysis of MidoriSurvey of information securityDifferential-linear cryptanalysis of the lightweight crytographic algorithm KNOTMore accurate division property propagations based on optimized implementations of linear layersCounting active S-boxes is not enoughIntegral attacks on Pyjamask-96 and round-reduced Pyjamask-128MILP based differential attack on round reduced WARPA bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysisKey guessing strategies for linear key-schedule algorithms in rectangle attacksA greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysisImproved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128Security analysis of SIMECK block cipher against related-key impossible differentialImproved Top-Down Techniques in Differential CryptanalysisAutomatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECKMILP-aided cube-attack-like cryptanalysis on Keccak keyed modesMeet-in-the-middle attack with splice-and-cut technique and a general automatic frameworkNew method for combining Matsui's bounding conditions with sequential encoding methodFully automated differential-linear attacks against ARX ciphersAnalysis of RIPEMD-160: new collision attacks and finding characteristics with MILPEfficient MIP techniques for computing the relaxation complexitySuperposition meet-in-the-middle attacks: updates on fundamental security of AES-like hashingImproved differential attack on round-reduced LEASpeeding up MILP Aided Differential Characteristic Search with Matsui’s StrategyAutomatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILPModeling large S-box in MILP and a (related-key) differential attack on full round PIPO-64/128Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block CiphersExploring the optimality of byte-wise permutations of a piccolo-type block CipherNew automatic search tool for searching for impossible differentials using undisturbed bitsClustering effect of iterative differential and linear trailsOptimizing rectangle attacks: a unified and generic framework for key recoveryMassive superpoly recovery with nested monomial predictionsDEFAULT: cipher level resistance against differential fault attackSeveral MILP-Aided Attacks Against SNOW 2.0Stretching cube attacks: improved methods to recover massive superpoliesNew differential bounds and division property of Lilliput: block cipher with extended generalized Feistel networkA bit-vector differential model for the modular addition by a constantMind the propagation of states. New automatic search tool for impossible differentials and impossible polytopic transitionsAn algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sumsQuantum collision attacks on AES-like hashing with low quantum random access memoriesLombardi Drawings of Knots and LinksThe MILP-aided conditional differential attack and its application to TriviumImproved Cryptanalysis on SipHashMILP-Based Automatic Search Algorithms for Differential and Linear Trails for SpeckAutomatic Search for the Best Trails in ARX: Application to Block Cipher SpeckEfficient Design Strategies Based on the AES Round FunctionBit-Based Division Property and Application to Simon FamilyImproved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing TechniquesRelated-Key Almost Universal Hash Functions: Definitions, Constructions and ApplicationsProposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECKTruncated differential based known-key attacks on round-reduced SIMONAn observation on NORX, BLAKE2, and ChaChaCryptanalysis of MORUSNonlinear diffusion layersComputing AES related-key differential characteristics with constraint programmingSecurity analysis of subterranean 2.0Differential Forgery Attack Against LACThe \texttt{Deoxys} AEAD familyAutomatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEAAutomatic search of meet-in-the-middle preimage attacks on AES-like hashingAutomatic Search of Linear Trails in ARX with Applications to SPECK and ChaskeyOn the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon VariantsPen and Paper Arguments for SIMON and SIMON-like DesignsSAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluationsMore accurate results on the provable security of AES against impossible differential cryptanalysisAutomatic verification of differential characteristics: application to reduced GimliCryptanalysis of stream cipher LIZARD using division property and MILP based cube attackNew Impossible Differential Search Tool from Design and Cryptanalysis Aspects


Uses Software



This page was built for publication: Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers