Truncated boomerang attacks and application to AES-based ciphers
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …
instead of using a single long differential. It has been applied to many primitives, and results …
TNT: how to tweak a block cipher
In this paper, we propose Tweak-aNd-Tweak (TNT TNT for short) mode, which builds a
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …
New key-recovery attack on reduced-round AES
A new fundamental 4-round property of AES, called the zero-difference property, was
introduced by R {\o} njom, Bardeh and Helleseth at Asiacrypt 2017. Our work characterizes it …
introduced by R {\o} njom, Bardeh and Helleseth at Asiacrypt 2017. Our work characterizes it …
Pholkos–efficient large-state tweakable block ciphers from the AES round function
J Bossert, E List, S Lucks, S Schmitz - Cryptographers' Track at the RSA …, 2022 - Springer
This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state
and key sizes of≥ 256 and tweaks of either 128 or 256 bits. When encrypting large chunks …
and key sizes of≥ 256 and tweaks of either 128 or 256 bits. When encrypting large chunks …
Extended truncated-differential distinguishers on round-reduced AES
Distinguishers on round-reduced AES have attracted considerable attention in the recent
years. While the number of rounds covered in key-recovery attacks did not increase …
years. While the number of rounds covered in key-recovery attacks did not increase …
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security
In this paper we propose a new family of highly efficient and quantum secure AES-based
block cipher dubbed Ghidle, which supports a key size of 256 bits and a state size of 256 or …
block cipher dubbed Ghidle, which supports a key size of 256 bits and a state size of 256 or …
CTET+: A beyond-birthday-bound secure tweakable enciphering scheme using a single pseudorandom permutation
B Cogliati, J Ethan, V Lallemand, B Lee… - IACR Transactions on …, 2021 - tosc.iacr.org
In this work, we propose a construction of 2-round tweakable substitutionpermutation
networks using a single secret S-box. This construction is based on non-linear permutation …
networks using a single secret S-box. This construction is based on non-linear permutation …
Cryptanalysis on Reduced-Round 3D and Saturnin
L Zhang, W Wu, YF Zheng, B Wang - The Computer Journal, 2023 - academic.oup.com
Abstract 3D is an Advanced Encryption Standard (AES)-like cipher employed 3D structure
proposed in 2008. The main innovation of 3D is the multi-dimensional state, generalizing the …
proposed in 2008. The main innovation of 3D is the multi-dimensional state, generalizing the …
Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques
M Rahman - 2022 - library.isical.ac.in
Symmetric key cryptography refers to the encryption methods in which the same key is used
by both the sender and the receiver. Cryptanalysis is a process of finding vulnerabilities in …
by both the sender and the receiver. Cryptanalysis is a process of finding vulnerabilities in …
Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers
E List - 2021 - e-pub.uni-weimar.de
Modern cryptography has become an often ubiquitous but essential part of our daily lives.
Protocols for secure authentication and encryption protect our communication with various …
Protocols for secure authentication and encryption protect our communication with various …