نتایج جستجو برای: differential attack

تعداد نتایج: 363211  

2012
CAO Guang-hui Hu Kai Yang He E Xu

Criterion for choosing chaos map to drive image bit permutation based on chaos permutation information entropy is proposed. An algorithm for image bit permutation is designed based on the fact that the output trajectory of chaotic system is very unpredictable. Image smallest granularity scrambling, namely, bit space maximum scrambling is implemented by applying the chaos that has been selected....

Journal: :IACR Cryptology ePrint Archive 2010
Shengbao Wu Mingsheng Wang Zheng Yuan

An distinguisher was constructed by utilizing a 2-round collision differential path of ALPHA-MAC, with about 2 chosen messages and 2 queries. Then, this distinguisher was used to recover the internal state([1],[2]). However, a flaw is found in the internal state recovery attack. The complexity of recovering the internal state is up to 2 exhaustive search. And the complexity of the whole attack ...

Journal: :IACR Cryptology ePrint Archive 2004
Vincent Carlier Hervé Chabanne Emmanuelle Dottax Hervé Pelletier

We show how to attack an FPGA implementation of AES where all bytes are processed in parallel using differential electromagnetic analysis. We first focus on exploiting local side channels to isolate the behaviour of our targeted byte. Then, generalizing the Square attack, we describe a new way of retrieving information, mixing algebraic properties and physical observations.

2016
Nasour Bagheri Tao Huang Keting Jia Florian Mendel Yu Sasaki

NORX is a second round candidate of the ongoing CAESAR competition for authenticated encryption. It is a nonce based authenticated encryption scheme based on the sponge construction. Its two variants denoted by NORX32 and NORX64 provide a security level of 128 and 256 bits, respectively. In this paper, we present a state/key recovery attack for both variants with the number of rounds of the cor...

2004
Raphael C.-W. Phan

In this paper, we present related-key slide attacks on 2-key and 3-key triple DES, and related-key differential and slide attacks on two variants of DESX. First, we show that 2-key and 3-key triple-DES are susceptible to related-key slide attacks. The only previously known such attacks are related-key differential attacks on 3-key triple-DES. Second, we present a related-key differential attack...

Journal: :IACR Cryptology ePrint Archive 2013
Pawel Morawiecki Josef Pieprzyk Marian Srebrny Michal Straus

In this paper we use differential cryptanalysis to attack the winner of the SHA-3 competition, namely Keccak hash function. Despite more than 6 years of intensive cryptanalysis there have been known only two preimage attacks which reach 3 (or slightly more) rounds. Our 3-round preimage attack improves the complexity of those two existing attacks and it is obtained with a different technique. We...

2013
Farzaneh Abed Eik List Stefan Lucks Jakob Wenzel

This paper presents differential attacks of round-reduced versions of Simon with up to 18/32, 19/36, 25/44, 35/54, and 46/72 rounds for the 32-, 48-, 64-, 96-, and 128-bit versions, respectively. Furthermore, we consider in brief related-key rectangle, impossible-differential, and also linear attacks. While all our attacks are completely academic, they demonstrate the drawback of the intensive ...

2006
Jiqiang Lu Changhoon Lee Jongsung Kim

Cobra-F64a and Cobra-F64b, designed for firmware-oriented applications, are 64-bit Data-dependent Permutation based block ciphers with 128 key bits, which consist of 16 and 20 rounds, respectively. In this paper, we investigate their security against related-key attacks. Our investigation shows that the full 16-round Cobra-F64a can be broken by our related-key rectangle attack and that the full...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید