DEFAULT: Cipher-level resistance against differential fault attack
A Baksi, A Baksi - Classical and Physical Security of Symmetric Key …, 2022 - Springer
Abstract Differential Fault Analysis (DFA) is a well-known cryptanalytic technique that
exploits faulty outputs of an encryption device. Despite its popularity and similarity with the …
exploits faulty outputs of an encryption device. Despite its popularity and similarity with the …
New differential cryptanalysis results for the lightweight block cipher BORON
BORON is a 64-bit lightweight block cipher based on the substitution–permutation network
that supports an 80-bit (BORON-80) and 128-bit (BORON-128) secret key. In this paper, we …
that supports an 80-bit (BORON-80) and 128-bit (BORON-128) secret key. In this paper, we …
[图书][B] Status report on the final round of the NIST lightweight cryptography standardization process
Abstract The National Institute of Standards and Technology (NIST) initiated a public
standardization process to select one or more schemes that provide Authenticated …
standardization process to select one or more schemes that provide Authenticated …
Classical and physical security of symmetric key cryptographic algorithms
A Baksi - 2021 IFIP/IEEE 29th International Conference on Very …, 2021 - ieeexplore.ieee.org
Symmetric key cryptography is one of the cornerstones of security in the modern era of
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
electronic communication. The symmetric key algorithms, known as the ciphers, are to …
Strong and tight security guarantees against integral distinguishers
Integral attacks belong to the classical attack vectors against any given block ciphers.
However, providing arguments that a given cipher is resistant against those attacks is …
However, providing arguments that a given cipher is resistant against those attacks is …
New results on machine learning-based distinguishers
Machine Learning (ML) is almost ubiquitously used in multiple disciplines nowadays.
Recently, we have seen its usage in the realm of differential distinguishers for symmetric key …
Recently, we have seen its usage in the realm of differential distinguishers for symmetric key …
Baksheesh: similar yet different from gift
We propose a lightweight block cipher named BAKSHEESH, which follows up on the
popular cipher GIFT-128 (CHES'17). BAKSHEESH runs for 35 rounds, which is 12.50 …
popular cipher GIFT-128 (CHES'17). BAKSHEESH runs for 35 rounds, which is 12.50 …
The problem of half round key xor
A Baksi - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In the design of GIFT, half round key XOR is used. This leads to the undesired consequence
that the security against the differential/linear attacks are overestimated. This comes from the …
that the security against the differential/linear attacks are overestimated. This comes from the …
Finding desirable substitution box with SASQUATCH
Abstract This paper presents``SASQUATCH'', an open-source tool, that aids in finding an
unknown substitution box (SBox) given its properties. The inspiration of our work can be …
unknown substitution box (SBox) given its properties. The inspiration of our work can be …
New insights on differential and linear bounds using mixed integer linear programming
A Baksi - … Security Solutions for Information Technology and …, 2021 - Springer
Abstract Mixed Integer Linear Programming (MILP) is a very common method of modelling
differential and linear bounds. The Convex Hull (CH) modelling, introduced by Sun et …
differential and linear bounds. The Convex Hull (CH) modelling, introduced by Sun et …