Search Results 1-20 of 202

  • Higher Order Differential Property of BIG Block Cipher  [in Japanese]

    芝山 直喜 , 五十嵐 保隆 , 金子 敏信

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 119(47), 61-66, 2019-05-23

  • New Classes of Efficient MDS Transformations

    LI Yubo , LI Kangquan , QU Longjiang , LI Chao

    … <p>MDS transformation plays an important role in resisting against differential cryptanalysis (DC) and linear cryptanalysis (LC). …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A(11), 1504-1511, 2019

    J-STAGE 

  • Cryptanalysis of Reduced Kreyvium

    WATANABE Yuhei , ISOBE Takanori , MORII Masakatu

    … Designers have evaluated the security of Kreyvium and concluded that the resistance of Kreyvium to the conditional differential cryptanalysis is at least the resistance of Trivium, and even better. … This paper shows the conditional differential cryptanalysis for Kreyvium, and we propose distinguishing and key recovery attacks. … We show how to arrange differences and conditions to obtain good higher-order conditional differential characteristics. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A(9), 1548-1556, 2018

    J-STAGE 

  • Related-Key Differential Attack on Round-Reduced Bel-T-256

    ABDELKHALEK Ahmed , TOLBA Mohamed , YOUSSEF Amr M.

    … In this work, we use a Mixed Integer Linear Programming (MILP) approach to find a a related-key differential characteristic that extends for 4 rounds and 5 S-box layers ($4 \frac{5}{7}$ rounds) with probability higher than 2<sup>-128</sup>. … The identified differential characteristic is used to mount a key recovery attack on 5 rounds and 6 S-box layers ($5 \frac{6}{7}$ out of 8 rounds) of Bel-T-256 with 2<sup>123.28</sup> …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A(5), 859-862, 2018

    J-STAGE 

  • Impossible Differential Cryptanalysis of Fantomas and Robin

    SHEN Xuan , LIU Guoqiang , LI Chao , QU Longjiang

    … Furthermore, with the 4-round impossible differentials, we propose impossible differential attacks on Fantomas and Robin reduced to 6 rounds (out of the full 12/16 rounds). …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A(5), 863-866, 2018

    J-STAGE 

  • Impossible Differential Attack on Reduced Round SPARX-128/256

    ELSHEIKH Muhammad , TOLBA Mohamed , M. YOUSSEF Amr

    … SPARX has been developed using ARX-based S-boxes with the aim of achieving provable security against single-trail differential and linear cryptanalysis. … In this letter, we propose 20-round impossible differential distinguishers for SPARX-128. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A(4), 731-733, 2018

    J-STAGE 

  • Higher Order Differential Property of Few  [in Japanese]

    芝山 直喜 , 五十嵐 保隆 , 金子 敏信

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 117(40), 37-42, 2017-05-22

  • Higher Order Differential Property of Few  [in Japanese]

    芝山 直喜 , 五十嵐 保隆 , 金子 敏信

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 117(39), 37-42, 2017-05-22

  • Improved Multiple Impossible Differential Cryptanalysis of Midori128

    TOLBA Mohamed , ABDELKHALEK Ahmed , M. YOUSSEF Amr

    … Currently, the best published impossible differential attack on Midori128 covers 10 rounds without the pre-whitening key. … By exploiting the special structure of the S-boxes and the binary linear transformation layer in Midori128, we present impossible differential distinguishers that cover 7 full rounds including the mix column operations. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A(8), 1733-1737, 2017

    J-STAGE 

  • Related-Key Attacks on Reduced-Round Hierocrypt-L1

    TAGA Bungo , MORIAI Shiho , AOKI Kazumaro

    … We present a differential attack and an impossible differential attack on 8 <i>S</i>-function layers in a related-key setting. … We first show that there exist the key scheduling differential characteristics which always hold, then we search for differential paths for the data randomizing part with the minimum active S-boxes using the above key differentials. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A(1), 126-137, 2017

    J-STAGE 

  • The Particular Third-Order Differential Characteristics of Midori64 Block Cipher(II)  [in Japanese]

    高橋 勇介 , 五十嵐 保隆 , 金子 敏信

    コンピュータセキュリティシンポジウム2016論文集 2016(2), 1253-1259, 2016-10-04

    IPSJ 

  • Accurate Estimation of the Full Differential Distribution for General Feistel Structures

    Chen Jiageng , Miyiaji Atsuko , Su Chunhua , The Je Sen

    … Statistical cryptanalysis is one of the most powerful tools to analyze symmetric key cryptographic primitives such as block ciphers. … One of these attacks, the differential attack has been demonstrated to break a wide range of block ciphers. … Block cipher proposals previously obtain a rough estimate of their security margin against differential attacks by counting the number of active S-Box along a differential path. …

    Lecture Notes in Computer Science (9589), 108-124, 2016-05-07

    IR 

  • A Meet in the Middle Attack on Reduced Round Kiasu-BC

    TOLBA Mohamed , ABDELKHALEK Ahmed , YOUSSEF Amr M.

    … In this letter, we present a MitM attack, utilizing the differential enumeration technique, on the 8-round reduced cipher. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E99.A(10), 1888-1890, 2016

    J-STAGE 

  • A Meet-in-the-Middle Attack on Reduced-Round Kalyna-<i>b</i>/2<i>b</i>

    ALTAWY Riham , ABDELKHALEK Ahmed , YOUSSEF Amr M.

    … Our attack is based on the differential enumeration approach, where we carefully deploy a four-round distinguisher in the first four rounds to bypass the effect of the carry bits resulting from the prewhitening modular key addition. …

    IEICE Transactions on Information and Systems E99.D(4), 1246-1250, 2016

    J-STAGE 

  • A Meet in the Middle Attack on Reduced Round Kuznyechik

    ALTAWY Riham , M. YOUSSEF Amr

    … Our attack is based on the differential enumeration approach. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98.A(10), 2194-2198, 2015

    J-STAGE 

  • Multiple Impossible Differential Cryptanalysis on Reduced FOX

    LI Xinran , FU Fang-Wei , GUANG Xuan

    … FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. … In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E98.A(3), 906-911, 2015

    J-STAGE 

  • New Higher Order Differential Property of Piccolo  [in Japanese]

    SHIBAYAMA Naoki , KANEKO Toshinobu

    … It has been reported that 8-/10-round Piccolo with 80-/128-bit secret key is attackable by higher order differential attack using 6-round 32-nd order differential characteristic. … This paper shows a new higher order differential property of Piccolo. … We found a new 7-round 48-th order differential characteristic, and estimates the costs of attack exploiting the characteristic. …

    Technical report of IEICE. ISEC 114(115), 247-252, 2014-07-03

  • New Higher Order Differential Property of Piccolo  [in Japanese]

    SHIBAYAMA Naoki , KANEKO Toshinobu

    … It has been reported that 8-/10-round Piccolo with 80-/128-bit secret key is attackable by higher order differential attack using 6-round 32-nd order differential characteristic. … This paper shows a new higher order differential property of Piccolo. … We found a new 7-round 48-th order differential characteristic, and estimates the costs of attack exploiting the characteristic. …

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 114(118), 247-252, 2014-07-03

  • New Higher Order Differential Property of Piccolo  [in Japanese]

    SHIBAYAMA Naoki , KANEKO Toshinobu

    … It has been reported that 8-/10-round Piccolo with 80-/128-bit secret key is attackable by higher order differential attack using 6-round 32-nd order differential characteristic. … This paper shows a new higher order differential property of Piccolo. … We found a new 7-round 48-th order differential characteristic, and estimates the costs of attack exploiting the characteristic. …

    IEICE technical report. Information and communication system security 114(117), 247-252, 2014-07-03

  • New Higher Order Differential Property of Piccolo  [in Japanese]

    SHIBAYAMA Naoki , KANEKO Toshinobu

    … It has been reported that 8-/10-round Piccolo with 80-/128-bit secret key is attackable by higher order differential attack using 6-round 32-nd order differential characteristic. … This paper shows a new higher order differential property of Piccolo. … We found a new 7-round 48-th order differential characteristic, and estimates the costs of attack exploiting the characteristic. …

    IEICE technical report. Social Implications of Technology and Information Ethics 114(116), 247-252, 2014-07-03

Page Top