MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca

نویسندگان

چکیده

In this paper, the security of Advanced Encryption Standard-based authenticated encryption schemes, including AEGIS family, Tiaoxin-346, and Rocca by mixed integer linear programming tools is examined. Specifically, for initialisation phase AEGIS, Rocca, against differential attacks integral evaluated estimating lower bounds number active S-boxes utilising division property, respectively. addition to estimations phases, phases distinguishing on keystream exploiting properties. As a result, authors show that AEGIS-128/128L/256, are secure after 4/3/6, 5, 6 rounds, Regarding attacks, distinguisher found 6/6/7, 15, 7 rounds in Additionally, presented 2/2/4, 4, 4 far as it known, study’s results first without relying weak keys.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Recent Development in Information Technology Security Evaluation - The Need for Evaluation Criteria for Multilateral Security

More and more the security of information technology becomes subject to evaluations by neutral third parties beside manufacturers and procurers. The basis of these evaluations are information technology security evaluation criteria. This contribution reports and analyses the recent development of national and harmonised criteria and the development in the international standardisation, especial...

متن کامل

Integrated Repository of Security Information for Network Security Evaluation

Security evaluation systems usually use various information sources to estimate computer network security. One of the important tasks in these systems is integration and storage of information from various sources. The paper is devoted to investigation and development of models and methods to integrate open security databases into one repository. The model of integration proposed in the paper h...

متن کامل

Security Evaluation supported by Information Security Mechanisms

Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...

متن کامل

A New Evaluation Model for Security Protocols

Till today, the study of performance of security protocols of WLAN has been one of research focuses. Whereas, owing to enormous complexity and low efficiency of modeling security protocols, there has been by now no uniform method or technology that can be used generally to simulate and evaluate security protocols, and no simulation system available that can well support research on performance ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iet Information Security

سال: 2023

ISSN: ['1751-8709', '1751-8717']

DOI: https://doi.org/10.1049/ise2.12109