DEFAULT: Cipher-level resistance against differential fault attack

A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
Abstract Differential Fault Analysis (DFA) is a well-known cryptanalytic technique that
exploits faulty outputs of an encryption device. Despite its popularity and similarity with the …

New differential cryptanalysis results for the lightweight block cipher BORON

JS Teh, LJ Tham, N Jamil, WS Yap - Journal of Information Security and …, 2022 - Elsevier
BORON is a 64-bit lightweight block cipher based on the substitution–permutation network
that supports an 80-bit (BORON-80) and 128-bit (BORON-128) secret key. In this paper, we …

[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process

MS Turan, MS Turan, K McKay, D Chang, LE Bassham… - 2023 - nvlpubs.nist.gov
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …

Classical and physical security of symmetric key cryptographic algorithms

A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …

Strong and tight security guarantees against integral distinguishers

P Hebborn, B Lambin, G Leander, Y Todo - Advances in Cryptology …, 2021 - Springer
Integral attacks belong to the classical attack vectors against any given block ciphers.
However, providing arguments that a given cipher is resistant against those attacks is …

New results on machine learning-based distinguishers

A Baksi, J Breier, VA Dasu, X Hou, H Kim, H Seo - IEEE Access, 2023 - ieeexplore.ieee.org
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays.
Recently, we have seen its usage in the realm of differential distinguishers for symmetric key …

Baksheesh: similar yet different from gift

A Baksi, J Breier, A Chattopadhyay, T Gerlich… - Cryptology ePrint …, 2023 - eprint.iacr.org
We propose a lightweight block cipher named BAKSHEESH, which follows up on the
popular cipher GIFT-128 (CHES'17). BAKSHEESH runs for 35 rounds, which is 12.50 …

The problem of half round key xor

A Baksi - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In the design of GIFT, half round key XOR is used. This leads to the undesired consequence
that the security against the differential/linear attacks are overestimated. This comes from the …

Finding desirable substitution box with SASQUATCH

M Wadhwa, A Baksi, K Hu, A Chattopadhyay… - Cryptology ePrint …, 2023 - eprint.iacr.org
Abstract This paper presents``SASQUATCH'', an open-source tool, that aids in finding an
unknown substitution box (SBox) given its properties. The inspiration of our work can be …

New insights on differential and linear bounds using mixed integer linear programming

A Baksi - … Security Solutions for Information Technology and …, 2021 - Springer
Abstract Mixed Integer Linear Programming (MILP) is a very common method of modelling
differential and linear bounds. The Convex Hull (CH) modelling, introduced by Sun et …