CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks

C Beierle, G Leander, A Moradi… - IACR Transactions on …, 2019 - orbilu.uni.lu
Traditionally, countermeasures against physical attacks are integrated into the
implementation of cryptographic primitives after the algorithms have been designed for …

Mind the gap-A closer look at the security of block ciphers against differential cryptanalysis

R Ankele, S Kölbl - International Conference on Selected Areas in …, 2018 - Springer
Resistance against differential cryptanalysis is an important design criteria for any modern
block cipher and most designs rely on finding some upper bound on probability of single …

Improved rectangle attacks on SKINNY and CRAFT

H Hadipour, N Bagheri, L Song - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard
the target cipher E as a composition of two sub-ciphers, ie, E= E 1∘ E 0, to construct a …

Analysis of AES, SKINNY, and others with constraint programming

S Sun, D Gerault, P Lafourcade, Q Yang… - IACR transactions on …, 2017 - hal.science
Search for different types of distinguishers are common tasks in symmetric-key cryptanalysis.
In this work, we employ the constraint programming (CP) technique to tackle such problems …

Forkcipher: a new primitive for authenticated encryption of very short messages

E Andreeva, V Lallemand, A Purnal… - … Conference on the …, 2019 - Springer
Highly efficient encryption and authentication of short messages is an essential requirement
for enabling security in constrained scenarios such as the CAN FD in automotive systems …

Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny

L Qin, X Dong, X Wang, K Jia, Y Liu - IACR Transactions on Symmetric …, 2021 - tosc.iacr.org
Automatic modelling to search distinguishers with high probability covering as many rounds
as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis …

Key guessing strategies for linear key-schedule algorithms in rectangle attacks

X Dong, L Qin, S Sun, X Wang - … on the Theory and Applications of …, 2022 - Springer
When generating quartets for the rectangle attacks on ciphers with linear key-schedule, we
find the right quartets which may suggest key candidates have to satisfy some nonlinear …

Security analysis of SKINNY under related-tweakey settings

G Liu, M Ghosh, L Song - Cryptology ePrint Archive, 2016 - eprint.iacr.org
In CRYPTO'16, a new family of tweakable lightweight block ciphers-SKINNY was introduced.
Denoting the variants of SKINNY as SKINNY-$ n $-$ t $, where $ n $ represents the block …

Cryptanalysis of reduced round SKINNY block cipher

S Sadeghi, T Mohammadi, N Bagheri - IACR Transactions on …, 2018 - tosc.iacr.org
SKINNY is a family of lightweight tweakable block ciphers designed to have the smallest
hardware footprint. In this paper, we present zero-correlation linear approximations and the …

Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT

B Zhao, X Dong, W Meier, K Jia, G Wang - Designs, Codes and …, 2020 - Springer
This paper gives a new generalized key-recovery model of related-key rectangle attacks on
block ciphers with linear key schedules. The model is quite optimized and applicable to …