Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Electrical and Computer Engineering

PDF

2024

Cryptanalysis

Articles 1 - 2 of 2

Full-Text Articles in Computer Engineering

Lower Data Attacks On Advanced Encryption Standard, Orhun Kara Mar 2024

Lower Data Attacks On Advanced Encryption Standard, Orhun Kara

Turkish Journal of Electrical Engineering and Computer Sciences

The Advanced Encryption Standard (AES) is one of the most commonly used and analyzed encryption algorithms. In this work, we present new combinations of some prominent attacks on AES, achieving new records in data requirements among attacks, utilizing only 2 4 and 2 16 chosen plaintexts (CP) for 6-round and 7-round AES 192/256, respectively. One of our attacks is a combination of a meet-in-the-middle (MiTM) attack with a square attack mounted on 6-round AES-192/256 while another attack combines an MiTM attack and an integral attack, utilizing key space partitioning technique, on 7-round AES-192/256. Moreover, we illustrate that impossible differential (ID) …


Milp Modeling Of Matrix Multiplication: Cryptanalysis Of Klein And Prince, Murat Burhan İlter, Ali Aydın Selçuk Feb 2024

Milp Modeling Of Matrix Multiplication: Cryptanalysis Of Klein And Prince, Murat Burhan İlter, Ali Aydın Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Mixed-integer linear programming (MILP) techniques are widely used in cryptanalysis, aiding in the discovery of optimal linear and differential characteristics. This paper delves into the analysis of block ciphers KLEIN and PRINCE using MILP, specifically calculating the best linear and differential characteristics for reduced-round versions. Both ciphers employ matrix multiplication in their diffusion layers, which we model using multiple XOR operations. To this end, we propose two novel MILP models for multiple XOR operations, which use fewer variables and constraints, proving to be more efficient than standard methods for XOR modeling. For differential cryptanalysis, we identify characteristics with a probability …