Truncated boomerang attacks and application to AES-based ciphers
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …
instead of using a single long differential. It has been applied to many primitives, and results …
The qarmav2 family of tweakable block ciphers
R Avanzi, S Banik, O Dunkelman… - Cryptology ePrint …, 2023 - eprint.iacr.org
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping …
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping …
Orthros: a low-latency PRF
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …
Tight security of TNT and beyond: Attacks, proofs and possibilities for the cascaded LRW paradigm
Abstract Liskov, Rivest and Wagner laid the theoretical foundations for tweakable block
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …
Partial sums meet FFT: Improved attack on 6-round AES
The partial sums cryptanalytic technique was introduced in 2000 by Ferguson et al., who
used it to break 6-round AES with time complexity of 2 52 S-box computations–a record that …
used it to break 6-round AES with time complexity of 2 52 S-box computations–a record that …
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
Z Zhang, Z Qin, C Guo - Designs, Codes and Cryptography, 2023 - Springer
Recent work of Bao et al.(in: Canteaut and Ishai (eds) EUROCRYPT 2020, Part II. LNCS.
Springer, Heidelberg 2020) repopularized tweakable blockciphers minimizing the overhead …
Springer, Heidelberg 2020) repopularized tweakable blockciphers minimizing the overhead …
CLRW1 is not Secure Beyond the Birthday Bound: Breaking TNT with queries
M Khairallah - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we present a new distinguisher for the Tweak-aNd-Tweak (TNT) tweakable
block cipher with $ O (2^{n/2}) $ complexity. The distinguisher is an adaptive chosen …
block cipher with $ O (2^{n/2}) $ complexity. The distinguisher is an adaptive chosen …
Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack
In a recent paper, Khairallah demonstrated a birthday-bound attack on TNT, thereby
invalidating its (beyond-the-birthday-bound) CCA security claims. In this short note, we …
invalidating its (beyond-the-birthday-bound) CCA security claims. In this short note, we …
Tweakable SM4: How to tweak SM4 into tweakable block ciphers?
Z Guo, G Wang, O Dunkelman, Y Pan, S Liu - Journal of Information …, 2023 - Elsevier
SM4 is China's commercial block cipher standard and an ISO/IEC international standard.
While SM4 withstood a great deal of analysis, its non-tweakable structure makes it inflexible …
While SM4 withstood a great deal of analysis, its non-tweakable structure makes it inflexible …
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher
with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary …
with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary …