2013
DOI: 10.1007/978-3-642-37682-5_26
|View full text |Cite
|
Sign up to set email alerts
|

Estimating the Probabilities of Low-Weight Differential and Linear Approximations on PRESENT-Like Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 20 publications
0
9
0
Order By: Relevance
“…There are several algorithms which permit the estimation of the ELP of a linear approximation. In our attacks on PRESENT we used the sparse correlation matrix method in a similar manner to [1].…”
Section: Linear Hullsmentioning
confidence: 99%
See 1 more Smart Citation
“…There are several algorithms which permit the estimation of the ELP of a linear approximation. In our attacks on PRESENT we used the sparse correlation matrix method in a similar manner to [1].…”
Section: Linear Hullsmentioning
confidence: 99%
“…Then, the element-wise square of this matrix can be elevated to the number of rounds r to obtain an approximation of the ELP of all the linear approximations whose input and output masks are in this family. A similar approach is detailed in [1].…”
Section: Linear Distinguishers For Presentmentioning
confidence: 99%
“…Linear and differential attacks are the most powerful attacks in the MD analysis of hash functions. Compared to PHOTON, ARMADILLO and SPONGENT-256 also offer signature features, but both are vulnerable to attacks, where ARMIDLLO2 has been attacked by local linearization (practical semi-free-start collision attack) [47] and SPONGENT has been attacked by linear distinguishers (23 rounds) [48] and (13 rounds) [49] for all SPONGENT versions; and additionally, they need the most computations (3281 GE and 8653 GE) compared PHOTON-256 (2177 GE). PHOTON is a reliable algorithm against linear and differential attacks [41].…”
Section: Overview Of Techniquesmentioning
confidence: 99%
“…As most of the embedded applications do not necessarily provide full second-preimage security, the most compact variants provide lower protection to enhance performance in the most constrained environments. Linear distinguisher attacks on reduced versions of SPONGENT are reported in [96]. In this paper, we use the most constrained variant of SPONGENT-80-8-88.…”
Section: Network Application Network Application Network Application Network Applicationmentioning
confidence: 99%
“…It performs well in software and hardware. It supports several sizes for key (64,72,96,128,144,192,256) and block (32,48,64,96,128) and round numbers (32,36,42,44,52,54,68,69,72). Independent cryptanalysis efforts on SIMON [289] present a series of observations on the cipher's construction and attacks on reduced round versions.…”
Section: Feistel Ciphersmentioning
confidence: 99%