Towards non-independence of modular additions in searching differential trails of ARX ciphers: new automatic methods with application to SPECK and Chaskey

H Qin, B Wu - arXiv preprint arXiv:2203.09741, 2022 - arxiv.org
Chaskey, designed by Mouha et al. [19], is a very efficient MAC algorithm for microcontrollers
… The internal permutation π of Chaskey has totally 12 rounds, and one of them is depicted in …

[PDF][PDF] Lizard Cipher for IoT Security on Constrained Devices

A Kusyanti, R Primananda, KJ Saputro - International Journal of …, 2019 - academia.edu
Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In A. Joux and AM Youssef,
editors, Selected Areas in Cryptography — SAC 2014, volume 8781 of Lecture Notes in …

A new method for searching optimal differential and linear trails in ARX ciphers

Z Liu, Y Li, L Jiao, M Wang - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
… round-reduced versions of SPECK and Chaskey. Biryukov et al.’s … To improve the efficiency
of our search algorithm, we … and β = 2 if the block size is 32-bit and α = 8 and β = 3 otherwise. …

Improved differential-linear attack with application to round-reduced Speck32/64

F Wang, G Wang - International Conference on Applied Cryptography and …, 2022 - Springer
… differential, we can construct effective distinguishers on 9-… bits can be naturally found, while
Chaskey is dependent on the … Thus we use the Algorithm 1 directly and set the bound to be …

Intra-Optimised Lightweight Enciphering Algorithm based on MQTT Protocol for Internet of Things Secure Application

R Chiwariro, S Rajendran - Australian Journal of Wireless …, 2019 - ausjournal.com
… Some examples of lightweight MAC algorithms are Chaskey [20], TuLP [21], and … algorithm
within the IoT constrained environment. Furthermore, the efficiency of lightweight algorithms

Securing Automotive Ethernet: Design and Implementation of Security Data Link Solutions

M De Vincenzi, C Bodei… - 2023 20th ACS/IEEE …, 2023 - ieeexplore.ieee.org
… 4b) between Speck and Chaskey, we can find a value of 0.54, which cannot be considered
… Verbauwhede, “Chaskey: An efficient MAC algorithm for 32-bit microcontrollers,” in Selected …

A secure and efficient cloud-connected body sensor network platform

M Keller, B Olney, R Karam - IFIP International Internet of Things …, 2021 - Springer
… of the microcontrollers comprising our BSN platform create a need for algorithms that can …
Traditional block ciphers often have elaborate key schedules designed to work on 32-bit or …

Protecting IoT Devices through a Hardware-driven Memory Verification

TÇ Köylü, H Okkerman… - 2021 24th Euromicro …, 2021 - ieeexplore.ieee.org
… more efficient than the popular HMAC [28]. • Chaskey is developed as a MAC algorithm [29].
It … designed to provide fast results for software implementations that run on a microcontroller. …

Practical cross-layer radio frequency-based authentication scheme for internet of things

A Haenel, Y Haddad, M Laurent, Z Zhang - Sensors, 2021 - mdpi.com
algorithm like SHA256, we adopted the Chaskey keyed-hash … To evaluate the energy efficiency
of our authentication … ultra-low-power microcontroller MSP430G2x and the sub-1 GHz RF …

Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security

H Kim, D Kim, O Yi, J Kim - Multimedia Tools and Applications, 2019 - Springer
… SEM or Chaskey cipher, our method is not effectively applied … plaintext difference in SEM
and Chaskey cipher) is not … key recovery attacks on blockcipher-based MAC algorithms. …