[HTML][HTML] Security analysis of lightweight IoT cipher: Chaskey

AD Dwivedi - Cryptography, 2020 - mdpi.com
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree
search based heuristic approach. ARX algorithms are suitable for resource-constrained …

Differential cryptanalysis of round-reduced LEA

AD Dwivedi, G Srivastava - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we focus on the differential cryptanalysis dedicated to a particular class of
cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the …

Differential cryptanalysis of round-reduced speck suitable for internet of things devices

AD Dwivedi, P Morawiecki, G Srivastava - IEEE Access, 2019 - ieeexplore.ieee.org
In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These
ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation …

Differential analysis of ARX block ciphers based on an improved genetic algorithm

M Kang, Y Li, L Jiao, M Wang - Chinese Journal of Electronics, 2023 - ieeexplore.ieee.org
Differential cryptanalysis is one of the most critical analysis methods to evaluate the security
strength of cryptographic algorithms. This paper first applies the genetic algorithm to search …

[HTML][HTML] Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK

AD Dwivedi, G Srivastava - Internet of Things, 2023 - Elsevier
This paper presents the differential cryptanalysis of two lightweight ciphers, namely, SIMON
and SIMECK. The first cipher SIMON was presented by the US National Security Agency in …

[PDF][PDF] Finding differential paths in arx ciphers through nested monte-carlo search

DA Dhar, P Morawiecki, S Wójtowicz - International Journal of …, 2018 - journals.pan.pl
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential
trails in the class of ARX ciphers. The practical application of the algorithm is demonstrated …

Differential-linear approximation semi-unconstrained searching and partition tree: Application to lea and speck

Y Chen, Z Bao, H Yu - International Conference on the Theory and …, 2023 - Springer
The differential-linear attack is one of the most effective attacks against ARX ciphers.
However, two technical problems are preventing it from being more effective and having …

Automatic search for differential trails in ARX ciphers

A Biryukov, V Velichkov - Topics in Cryptology–CT-RSA 2014: The …, 2014 - Springer
We propose a tool for automatic search for differential trails in ARX ciphers. By introducing
the concept of a partial difference distribution table (pDDT) we extend Matsui's algorithm …

Automatic differential analysis of ARX block ciphers with application to SPECK and LEA

L Song, Z Huang, Q Yang - Australasian Conference on Information …, 2016 - Springer
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with
respect to XOR-difference, and develop Mouha et al.'s framework for finding differential …

Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck

A Biryukov, V Velichkov, Y Le Corre - Fast Software Encryption: 23rd …, 2016 - Springer
We propose the first adaptation of Matsui's algorithm for finding the best differential and
linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy …