Publicaties
Generalized Matsui Algorithm 1 with Application for the Full DES. KU Leuven
In this paper we introduce the strictly zero-correlation attack. We extend the work of Ashur and Posteuca in BalkanCryptSec 2018 and build a 0-correlation key-dependent linear trail covering the full DES. We show how this approximation can be used for a key recovery attack and empirically verify our claims through a series of experiments. To the best of our knowledge, this paper is the first to use this kind of property to leverage a meaningful ...
Design Time Evaluation for Side-Channel Attack Resistant Cryptographic Implementations KU Leuven
Traditionally, most cryptographic algorithms were executed on server computers with high computational power; stored in physically secure locations. Improvements in technology have brought omnipresent embedded devices, which encompass our daily lives. Secure communication using such devices is additionally hindered from two additional aspects. Firstly, the majority of cryptographic algorithms were made for computers with significant processing ...
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. KU Leuven
Rotational-XOR cryptanalysis is a cryptanalytic method aimed at finding distinguishable statistical properties in ARX-C ciphers, i.e., ciphers that can be described only using modular addition, cyclic rotation, XOR, and the injection of constants. In this paper we extend RX-cryptanalysis to AND-RX ciphers, a similar design paradigm where the modular addition is replaced by vectorial bitwise AND; such ciphers include the block cipher families ...