Publications
Chosen filters:
Chosen filters:
Rotational Cryptanalysis on MAC Algorithm Chaskey KU Leuven
In this paper we generalize the Markov theory with respect to a relation between two plaintexts and not their difference and apply it for rotational pairs. We perform a related-key attack over Chaskey- a lightweight MAC algorithm for 32-bit micro controllers - and find a distinguisher by using rotational probabilities. Having a message m we can forge and present a valid tag for some message under a related key with probability \(2^{-57}\) for 8 ...
Linear Cryptanalysis Reduced Round of Piccolo-80 KU Leuven
Piccolo is a 64-bit lightweight block cipher suitable for constrained environments such as wireless sensor networks. In this paper we evaluate the security of Piccolo-80 against linear cryptanalysis, we present a 6-round linear approximation of Piccolo-80 with probability 1/2+2^{−29.04}. We use this approximation to attack 7-round Piccolo-80 (with whitening keys) with data complexity of 2^{61} known plaintexts and time complexity of 2^{61}. Its ...
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars KU Leuven
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over many years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received much attention besides relay attacks. In this work we fully reverse engineer a Passive Keyless Entry and Start system and perform a thorough analysis of its security. Our research reveals several security weaknesses. Specifically, we ...
On linear hulls in one round of DES. KU Leuven
Cryptanalysis of MORUS KU Leuven
MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, and recently selected as a finalist. There are three versions of MORUS: MORUS-640 with a 128-bit key, and MORUS-1280 with 128-bit or 256-bit keys. For all versions the security claim for confidentiality matches the key size. In this paper, we analyze the components of this algorithm (initialization, state update and tag generation), and report ...
A Privacy-Preserving Device Tracking System Using a Low-Power Wide-Area Network (LPWAN) KU Leuven
© Springer Nature Switzerland AG 2018. This paper presents the design and implementation of a low-power privacy-preserving device tracking system based on Internet of Things (IOT) technology. The system consists of low-power nodes and a set of dedicated beacons. Each tracking node broadcasts pseudonyms and encrypted versions of observed beacon identifiers over a Low-Power Wide-Area Network (LPWAN). Unlike most commercial systems, our solution ...
Cryptanalysis of Symmetric-key Primitives KU Leuven
The tremendous growth of online communication had also created a great need to secure it. The science of protecting computer system and securing communication is composed of several layers. Within this realm, cryptography has an important role. By employing mathematical tools, cryptographers develop the building blocks later used by the players in the ecosystem. The development of these building blocks is composed of two tasks: design and ...