Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
From MaRDI portal
Publication:2958142
DOI10.1007/978-3-662-53887-6_24zbMath1404.94120OpenAlexW2949078646MaRDI QIDQ2958142
Zhenzhen Bao, Wentao Zhang, Zejun Xiang, Dong-Dai Lin
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-53887-6_24
Related Items (55)
Improving Division Property Based Cube Attacks by Removing Invalid Monomials ⋮ Improved Integral Attack on Generalized Feistel Cipher ⋮ PRINCEv2. More security for (almost) no overhead ⋮ WARP: revisiting GFN for lightweight 128-bit block cipher ⋮ Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers ⋮ Automatic search for bit-based division property ⋮ More accurate division property propagations based on optimized implementations of linear layers ⋮ Integral attacks on Pyjamask-96 and round-reduced Pyjamask-128 ⋮ A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis ⋮ Security analysis of SIMECK block cipher against related-key impossible differential ⋮ Automatic Key Recovery of Feistel Ciphers: Application to SIMON and SIMECK ⋮ Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation ⋮ MILP-aided cube-attack-like cryptanalysis on Keccak keyed modes ⋮ Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework ⋮ Rotational-XOR differential rectangle cryptanalysis on \textsc{Simon}-like ciphers ⋮ New method for combining Matsui's bounding conditions with sequential encoding method ⋮ Improved graph-based model for recovering superpoly on Trivium ⋮ Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks ⋮ Coefficient grouping: breaking Chaghri and more ⋮ FUTURE: a lightweight block cipher using an optimal diffusion matrix ⋮ Cryptanalysis of reduced round SPEEDY ⋮ Improved division property for ciphers with complex linear layers ⋮ Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy ⋮ Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP ⋮ Light but tight: lightweight composition of serialized S-boxes with diffusion layers for strong ciphers ⋮ Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher ⋮ RAMus- a new lightweight block cipher for RAM encryption ⋮ On the field-based division property: applications to MiMC, Feistel MiMC and GMiMC ⋮ A practical key-recovery attack on 805-round Trivium ⋮ Convexity of division property transitions: theory, algorithms and compact models ⋮ Strong and tight security guarantees against integral distinguishers ⋮ Massive superpoly recovery with nested monomial predictions ⋮ Several MILP-Aided Attacks Against SNOW 2.0 ⋮ Mathematical aspects of division property ⋮ Finding three-subset division property for ciphers with complex linear layers ⋮ Stretching cube attacks: improved methods to recover massive superpolies ⋮ A polynomial system for bit-based division property solving by quantum algorithm ⋮ An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums ⋮ Lower bounds on the degree of block ciphers ⋮ Lombardi Drawings of Knots and Links ⋮ Experimental Evaluation of Book Drawing Algorithms ⋮ Integral attacks on round-reduced Bel-T-256 ⋮ Finding integral distinguishers with ease ⋮ The MILP-aided conditional differential attack and its application to Trivium ⋮ sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives ⋮ Linearly equivalent s-boxes and the division property ⋮ Cryptanalysis of MORUS ⋮ The Oribatida v1.3 family of lightweight authenticated encryption schemes ⋮ Modeling for three-subset division property without unknown subset ⋮ Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD ⋮ Automatic search of meet-in-the-middle preimage attacks on AES-like hashing ⋮ SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations ⋮ Automatic verification of differential characteristics: application to reduced Gimli ⋮ Alzette: a 64-bit ARX-boxes (feat. CRAX and TRAX) ⋮ Cryptanalysis of stream cipher LIZARD using division property and MILP based cube attack
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- The \textsf{Simeck} family of lightweight block ciphers
- On the division property of \textsc{Simon}48 and \textsc{Simon}64
- Integral Attack Against Bit-Oriented Block Ciphers
- Another View of the Division Property
- Extending Higher-Order Integral: An Efficient Unified Algorithm of Constructing Integral Distinguishers for Block Ciphers
- Integral Attacks on Reduced-Round PRESENT
- Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers
- Cryptanalysis of Reduced-Round SIMON32 and SIMON48
- The Simon and Speck Block Ciphers on AVR 8-Bit Microcontrollers
- Structural Evaluation by Generalized Integral Property
- LBlock: A Lightweight Block Cipher
- The Saturation Attack — A Bait for Twofish
- Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks
- $\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
- Observations on the SIMON Block Cipher Family
- Integral Cryptanalysis on Full MISTY1
- Structural Evaluation for Generalized Feistel Structures and Applications to LBlock and TWINE
- PRESENT: An Ultra-Lightweight Block Cipher
- The block cipher Square
- Bit-Based Division Property and Application to Simon Family
- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming
This page was built for publication: Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers