Truncated boomerang attacks and application to AES-based ciphers

A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …

TNT: how to tweak a block cipher

Z Bao, C Guo, J Guo, L Song - … International Conference on the Theory and …, 2020 - Springer
In this paper, we propose Tweak-aNd-Tweak (TNT TNT for short) mode, which builds a
tweakable block cipher from three independent block ciphers. TNT TNT handles the tweak …

New key-recovery attack on reduced-round AES

NG Bardeh, V Rijmen - Cryptology ePrint Archive, 2022 - eprint.iacr.org
A new fundamental 4-round property of AES, called the zero-difference property, was
introduced by R {\o} njom, Bardeh and Helleseth at Asiacrypt 2017. Our work characterizes it …

Pholkos–efficient large-state tweakable block ciphers from the AES round function

J Bossert, E List, S Lucks, S Schmitz - Cryptographers' Track at the RSA …, 2022 - Springer
This paper proposes Pholkos, a family of heavyweight tweakable block ciphers with state
and key sizes of≥ 256 and tweaks of either 128 or 256 bits. When encrypting large chunks …

Extended truncated-differential distinguishers on round-reduced AES

Z Bao, J Guo, E List - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Distinguishers on round-reduced AES have attracted considerable attention in the recent
years. While the number of rounds covered in key-recovery attacks did not increase …

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security

M Nakahashi, R Shiba, R Anand, M Rahman… - … on Information Security …, 2023 - Springer
In this paper we propose a new family of highly efficient and quantum secure AES-based
block cipher dubbed Ghidle, which supports a key size of 256 bits and a state size of 256 or …

CTET+: A beyond-birthday-bound secure tweakable enciphering scheme using a single pseudorandom permutation

B Cogliati, J Ethan, V Lallemand, B Lee… - IACR Transactions on …, 2021 - tosc.iacr.org
In this work, we propose a construction of 2-round tweakable substitutionpermutation
networks using a single secret S-box. This construction is based on non-linear permutation …

Cryptanalysis on Reduced-Round 3D and Saturnin

L Zhang, W Wu, YF Zheng, B Wang - The Computer Journal, 2023 - academic.oup.com
Abstract 3D is an Advanced Encryption Standard (AES)-like cipher employed 3D structure
proposed in 2008. The main innovation of 3D is the multi-dimensional state, generalizing the …

Cryptanalysis of Symmetric Key Schemes using Classical and Quantum Techniques

M Rahman - 2022 - library.isical.ac.in
Symmetric key cryptography refers to the encryption methods in which the same key is used
by both the sender and the receiver. Cryptanalysis is a process of finding vulnerabilities in …

Design, Analysis, and Implementation of Symmetric-key (Authenticated) Ciphers

E List - 2021 - e-pub.uni-weimar.de
Modern cryptography has become an often ubiquitous but essential part of our daily lives.
Protocols for secure authentication and encryption protect our communication with various …