MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca
نویسندگان
چکیده
In this paper, the security of Advanced Encryption Standard-based authenticated encryption schemes, including AEGIS family, Tiaoxin-346, and Rocca by mixed integer linear programming tools is examined. Specifically, for initialisation phase AEGIS, Rocca, against differential attacks integral evaluated estimating lower bounds number active S-boxes utilising division property, respectively. addition to estimations phases, phases distinguishing on keystream exploiting properties. As a result, authors show that AEGIS-128/128L/256, are secure after 4/3/6, 5, 6 rounds, Regarding attacks, distinguisher found 6/6/7, 15, 7 rounds in Additionally, presented 2/2/4, 4, 4 far as it known, study’s results first without relying weak keys.
منابع مشابه
Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for Multilateral Security
More and more the security of information technology becomes subject to evaluations by neutral third parties beside manufacturers and procurers. The basis of these evaluations are information technology security evaluation criteria. This contribution reports and analyses the recent development of national and harmonised criteria and the development in the international standardisation, especial...
متن کاملIntegrated Repository of Security Information for Network Security Evaluation
Security evaluation systems usually use various information sources to estimate computer network security. One of the important tasks in these systems is integration and storage of information from various sources. The paper is devoted to investigation and development of models and methods to integrate open security databases into one repository. The model of integration proposed in the paper h...
متن کاملNATO in Afghanistan Evaluation of its Challeneges for Establishing the Security in an Islamic Country
متن کامل
Security Evaluation supported by Information Security Mechanisms
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
متن کاملA New Evaluation Model for Security Protocols
Till today, the study of performance of security protocols of WLAN has been one of research focuses. Whereas, owing to enormous complexity and low efficiency of modeling security protocols, there has been by now no uniform method or technology that can be used generally to simulate and evaluate security protocols, and no simulation system available that can well support research on performance ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Iet Information Security
سال: 2023
ISSN: ['1751-8709', '1751-8717']
DOI: https://doi.org/10.1049/ise2.12109