Abstract. We propose a tool 1 for automatic search for differential trails in ARX ciphers. By introducing the concept of a partial difference distribution table (pDDT) we extend Matsui’s algorithm, originally proposed for DES-like ciphers, to the class of ARX ciphers. To the best of our knowledge this is the first application of Matsui’s algorithm to ciphers that do not have S-boxes. The tool is applied to the block ciphers TEA, XTEA, SPECK and RAIDEN. For RAIDEN we find an iterative characteristic on all 32 rounds that can be used to break the full cipher using standard differential cryptanalysis. This is the first cryptanalysis of the cipher in a non-related key setting. Differential trails on 9, 10 and 13 rounds are found for SPECK32, SP...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
© Springer International Publishing Switzerland 2016. In this paper, we study linear cryptanalysis o...
We propose a tool for automatic search for differential trails in ARX ciphers. By introducing the co...
peer reviewedWe propose a tool for automatic search for differential trails in ARX ciphers. By intro...
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear t...
peer reviewedWe propose the first adaptation of Matsui's algorithm for finding the best differential...
peer reviewedWe propose the first adaptation of Matsui's algorithm for finding the best differential...
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential trails in ...
Abstract. In this paper we continue the previous line of research on the analysis of the differentia...
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential trails in ...
peer reviewedWe propose a tool for automated truncation of differential trails in ciphers using modu...
We propose a tool for automated truncation of differential trails in ciphers using modular addition,...
We propose a tool for automated truncation of differential trails in ciphers using modular addition,...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
© Springer International Publishing Switzerland 2016. In this paper, we study linear cryptanalysis o...
We propose a tool for automatic search for differential trails in ARX ciphers. By introducing the co...
peer reviewedWe propose a tool for automatic search for differential trails in ARX ciphers. By intro...
We propose the first adaptation of Matsui's algorithm for finding the best differential and linear t...
peer reviewedWe propose the first adaptation of Matsui's algorithm for finding the best differential...
peer reviewedWe propose the first adaptation of Matsui's algorithm for finding the best differential...
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential trails in ...
Abstract. In this paper we continue the previous line of research on the analysis of the differentia...
We propose the adaptation of Nested Monte-Carlo Search algorithm for finding differential trails in ...
peer reviewedWe propose a tool for automated truncation of differential trails in ciphers using modu...
We propose a tool for automated truncation of differential trails in ciphers using modular addition,...
We propose a tool for automated truncation of differential trails in ciphers using modular addition,...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
peer reviewedIn this paper we continue the previous line of research on the analysis of the differen...
© Springer International Publishing Switzerland 2016. In this paper, we study linear cryptanalysis o...