[HTML][HTML] Security analysis of lightweight IoT cipher: Chaskey
AD Dwivedi - Cryptography, 2020 - mdpi.com
This paper presents the differential cryptanalysis of ARX based cipher Chaskey using tree
search based heuristic approach. ARX algorithms are suitable for resource-constrained …
search based heuristic approach. ARX algorithms are suitable for resource-constrained …
Differential cryptanalysis of round-reduced LEA
AD Dwivedi, G Srivastava - IEEE Access, 2018 - ieeexplore.ieee.org
In this paper, we focus on the differential cryptanalysis dedicated to a particular class of
cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the …
cryptographic algorithms, namely ARX ciphers. We propose a new algorithm inspired by the …
Differential cryptanalysis of round-reduced speck suitable for internet of things devices
In this paper, we focus on differential cryptanalysis of a lightweight ARX cipher. These
ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation …
ciphers use three simple arithmetic operations, namely, modular addition, bitwise rotation …
Differential analysis of ARX block ciphers based on an improved genetic algorithm
M Kang, Y Li, L Jiao, M Wang - Chinese Journal of Electronics, 2023 - ieeexplore.ieee.org
Differential cryptanalysis is one of the most critical analysis methods to evaluate the security
strength of cryptographic algorithms. This paper first applies the genetic algorithm to search …
strength of cryptographic algorithms. This paper first applies the genetic algorithm to search …
[HTML][HTML] Security analysis of lightweight IoT encryption algorithms: SIMON and SIMECK
AD Dwivedi, G Srivastava - Internet of Things, 2023 - Elsevier
This paper presents the differential cryptanalysis of two lightweight ciphers, namely, SIMON
and SIMECK. The first cipher SIMON was presented by the US National Security Agency in …
and SIMECK. The first cipher SIMON was presented by the US National Security Agency in …
[PDF][PDF] Finding differential paths in arx ciphers through nested monte-carlo search
DA Dhar, P Morawiecki, S Wójtowicz - International Journal of …, 2018 - journals.pan.pl
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential
trails in the class of ARX ciphers. The practical application of the algorithm is demonstrated …
trails in the class of ARX ciphers. The practical application of the algorithm is demonstrated …
Differential-linear approximation semi-unconstrained searching and partition tree: Application to lea and speck
Y Chen, Z Bao, H Yu - International Conference on the Theory and …, 2023 - Springer
The differential-linear attack is one of the most effective attacks against ARX ciphers.
However, two technical problems are preventing it from being more effective and having …
However, two technical problems are preventing it from being more effective and having …
Automatic search for differential trails in ARX ciphers
A Biryukov, V Velichkov - Topics in Cryptology–CT-RSA 2014: The …, 2014 - Springer
We propose a tool for automatic search for differential trails in ARX ciphers. By introducing
the concept of a partial difference distribution table (pDDT) we extend Matsui's algorithm …
the concept of a partial difference distribution table (pDDT) we extend Matsui's algorithm …
Automatic differential analysis of ARX block ciphers with application to SPECK and LEA
In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with
respect to XOR-difference, and develop Mouha et al.'s framework for finding differential …
respect to XOR-difference, and develop Mouha et al.'s framework for finding differential …
Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck
A Biryukov, V Velichkov, Y Le Corre - Fast Software Encryption: 23rd …, 2016 - Springer
We propose the first adaptation of Matsui's algorithm for finding the best differential and
linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy …
linear trails to the class of ARX ciphers. It is based on a branch-and-bound search strategy …