2017 4th International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T) 2017
DOI: 10.1109/infocommst.2017.8246385
|View full text |Cite
|
Sign up to set email alerts
|

Open problems of proving security of ARX-based ciphers to differential cryptanalysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…In [22,27], combinatorial properties of non-linear knots in the context of the security evaluation of various encryption modes and key schedules were investigated. In [22,[30][31][32][33][34][35][36], the influence of Sblocks on avalanche effects, differential and linear properties of block ciphers is investigated. The papers [35,37] are dedicated to the study of the properties of nonlinear replacement nodes in modern stream ciphers in comparison with the "Strumok" algorithm proposed as a new standard of stream encryption in Ukraine [37].…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In [22,27], combinatorial properties of non-linear knots in the context of the security evaluation of various encryption modes and key schedules were investigated. In [22,[30][31][32][33][34][35][36], the influence of Sblocks on avalanche effects, differential and linear properties of block ciphers is investigated. The papers [35,37] are dedicated to the study of the properties of nonlinear replacement nodes in modern stream ciphers in comparison with the "Strumok" algorithm proposed as a new standard of stream encryption in Ukraine [37].…”
Section: Discussionmentioning
confidence: 99%
“…The presented and not presented results allow us to characterize the state of modern technologies of designing the BSS (focusing on the most progressive of them by the following basic provisions [1,[26][27][28][29][30][31][32][33][34][35].…”
Section: Related Workmentioning
confidence: 99%
“…Problems existing in ARX lightweight algorithms in the field of IoT security ARX algorithm itself has a fast operation speed, a small amount of calculation, and the mathematical theory is safe, but the resistance to physical attacks is weak [28]. ARX algorithms are different from the block ciphers with S-box, and their masking strategy needs to be aimed at the whole algorithm rather than the S-box part, which will lead to the cost of masking strategy being too high [10].…”
Section: Status Quo Of Arx Lightweight Algorithms In Iot Applicationsmentioning
confidence: 99%