2022
DOI: 10.1049/ise2.12077
|View full text |Cite
|
Sign up to set email alerts
|

Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)

Abstract: Automated search methods based on Satisfiability Modulo Theory (SMT) problems are being widely used to evaluate the security of block ciphers against distinguishing attacks. While these methods provide a systematic and generic methodology, most of their software implementations are limited to a small set of ciphers and attacks, and extending these implementations requires significant effort and expertise. In this work, the authors present cryptographic algorithms for distinguishing attacks (CASCADA), an open-s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 67 publications
(100 reference statements)
0
1
0
Order By: Relevance
“…The idea of a simple tool to perform differential analysis is interesting, and other recent works are also working in this direction [26,2]. Moreover, we think that a unified cipher format would help the comparison and development of these tools.…”
Section: Future Workmentioning
confidence: 98%
“…The idea of a simple tool to perform differential analysis is interesting, and other recent works are also working in this direction [26,2]. Moreover, we think that a unified cipher format would help the comparison and development of these tools.…”
Section: Future Workmentioning
confidence: 98%
“…Declarative approaches (MILP, SAT, SMT, CP...) have since then become the de facto standard for differential cryptanalysis. More recently, open-source cryptographic libraries such as Tagada [LDLS21], Cascada [RR22] or CLAASP [BGG + 23] have made the process fully automated: from the description of a cipher, these libraries build and solve the declarative models for the search of optimal differential characteristics, without human intervention. A similar slow automation process was followed for other techniques, such as linear or impossible differential cryptanalysis, which are implemented within these libraries as well.…”
Section: Introductionmentioning
confidence: 99%