نتایج جستجو برای: distinguisher

تعداد نتایج: 399  

2007
Håkan Englund Martin Hell Thomas Johansson

Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with complexity less than exhaustive keysearch. The first attack is a distinguisher which needs keystream from only one or a few IVs to succeed. The attack is not only successful on Pomaranch Version 3 but has also less compu...

Journal: :IACR Trans. Symmetric Cryptol. 2017
Dhiman Saha Sukhendu Kuila Dipanwita Roy Chowdhury

In this work we show the existence of special sets of inputs for which the sum of the images under SHA3 exhibits a symmetric property. We develop an analytical framework which accounts for the existence of these sets. The framework constitutes identification of a generic property of iterated SPN based functions pertaining to the round-constant addition and combining it with the notion of m−fold...

Journal: :IACR Cryptology ePrint Archive 2017
Michael Hamburg

Bernstein et al. have proposed a new permutation, Gimli, which aims to provide simple and performant implementations on a wide variety of platforms. One of the tricks used to make Gimli performant is that it processes data mostly in 96-bit columns, only occasionally swapping 32-bit words between them. Here we show that this trick is dangerous by presenting a distinguisher for reduced-round Giml...

2018
Ueli Maurer Christian Badertscher Fabio Banfi

b) Let RDDH be the system that (when interacting with a distinguisher) outputs a triple (ga, gb, gab) for uniformly distributed a, b ∈ Zq, SDDH the system that outputs (ga, gb, gc) for uniformly distributed a, b, c ∈ Zq, and S ind the system implementing the IND-CPA game for the ElGamal encryption scheme. From a distinguisher D for the bit-guessing problem (S ind, β), we construct a distinguish...

Journal: :IACR Cryptology ePrint Archive 2011
Carolyn Whitnall Elisabeth Oswald

The resistance of cryptographic implementations to side channel analysis is matter of considerable interest to those concerned with information security. It is particularly desirable to identify the attack methodology (e.g. di erential power analysis using correlation or distance-of-means as the distinguisher) able to produce the best results. Attempts to answer this question are complicated by...

2010
Charles Bouillaguet Pierre-Alain Fouque Gaëtan Leurent

In this paper we study the security of the SHA-3 candidate SIMD. We first show a new free-start distinguisher based on symmetry relations. It allows to distinguish the compression function of SIMD from a random function with a single evaluation. However, we also show that this property is very hard to exploit to mount any attack on the hash function because of the mode of operation of the compr...

2008
Benedikt Gierlichs Lejla Batina Pim Tuyls Bart Preneel

We propose a generic information-theoretic distinguisher for differential side-channel analysis. Our model of side-channel leakage is a refinement of the one given by Standaert et al. An embedded device containing a secret key is modeled as a black box with a leakage function whose output is captured by an adversary through the noisy measurement of a physical observable. Although quite general,...

Journal: :IACR Cryptology ePrint Archive 2015
Mridul Nandi

Ristenpart and Rogaway proposed XLS in 2007 which is a generic method to encrypt messages with incomplete last blocks. Later Andreeva et al., in 2013 proposed an authenticated encryption COPA which uses XLS while processing incomplete message blocks. Following the design of COPA, several other CAESAR candidates used the similar approach. Surprisingly in 2014, Nandi showed a three-query distingu...

2017
Lorenzo Grassi Christian Rechberger

Known-key distinguishers have been introduced by Knudsen and Rijmen in 2007 to better understand the security of block ciphers in situations where the key can not be considered to be secret, i.e. the “thing between secret-key model and hash function use-cases”. AES is often considered as a target of such analyses, simply because AES or its building blocks are used in many settings that go beyon...

Journal: :Bioinformatics 2005
Bhaskar DasGupta Kishori M. Konwar Ion I. Mandoiu Alexander A. Shvartsman

DNA-BAR is a software package for selecting DNA probes (henceforth referred to as distinguishers) that can be used in genomic-based identification of microorganisms. Given the genomic sequences of the microorganisms, DNA-BAR finds a near-minimum number of distinguishers yielding a distinct hybridization pattern for each microorganism. Selected distinguishers satisfy user specified bounds on len...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید