Experimenting with Shuffle Block Cipher and SMT Solvers
نویسنده
چکیده
We experiment with the block cipher proposed by Hoang, Morris, and Rogaway [3], even though the cipher is insecure [8]. The cipher is based on swap-or-not shu e, and we call it the Shu e Block Cipher. We show how the cipher can be translated into SMT-LIB v2 format, suitable for automated solving by SMT solvers. We compare performance of various SMT solvers on the encryption and known plaintext attack problems.
منابع مشابه
Observations on the SIMON Block Cipher Family
In this paper we analyse the general class of functions underlying the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for the exact differential and linear behaviour of Simon-like round functions. Following up on this, we use those expressions for a computer aided approach based on SAT/SMT solvers to find both optimal differential and li...
متن کاملLecture 2 / 11 : Satisfiability Modulo Theories , Part I
Satisfiability modulo theories (SMT) is the study of the satisfiability of logical formulas (typically in first-order logic) with respect to (combinations of) background theories. The roots of SMT go back to work on automatic theorem proving and decision procedures for such logics performed in the 1970s and 80s. The defining characteristic of SMT solvers is their mode of operation: a satisfiabi...
متن کاملTWINE: A Lightweight Block Cipher for Multiple Platforms
This paper presents a 64-bit lightweight block cipher TWINE supporting 80 and 128bit keys. TWINE realizes quite small hardware implementation similar to the previous lightweight block cipher proposals, yet enables efficient software implementations on various platforms, from micro-controller to high-end CPU. This characteristic is obtained by the use of generalized Feistel structure combined wi...
متن کامل$\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms
This paper presents a 64-bit lightweight block cipher TWINE supporting 80 and 128bit keys. TWINE realizes quite small hardware implementation similar to the previous lightweight block cipher proposals, yet enables efficient software implementations on various platforms, from micro-controller to high-end CPU. This characteristic is obtained by the use of generalized Feistel structure combined wi...
متن کاملSecure and Fast Implementations of Two Involution Ciphers
Anubis and Khazad are closely related involution block ciphers. Building on two recent AES software results, this work presents a number of constant-time software implementations of Anubis and Khazad for processors with a byte-vector shuffle instruction, such as those that support SSSE3. For Anubis, the first is serial in the sense that it employs only one cipher instance and is compatible with...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2014 شماره
صفحات -
تاریخ انتشار 2014