Publicaties
Gekozen filters:
Gekozen filters:
Rotational Cryptanalysis on MAC Algorithm Chaskey KU Leuven
In this paper we generalize the Markov theory with respect to a relation between two plaintexts and not their difference and apply it for rotational pairs. We perform a related-key attack over Chaskey- a lightweight MAC algorithm for 32-bit micro controllers - and find a distinguisher by using rotational probabilities. Having a message m we can forge and present a valid tag for some message under a related key with probability \(2^{-57}\) for 8 ...
Linear Cryptanalysis Reduced Round of Piccolo-80 KU Leuven
Piccolo is a 64-bit lightweight block cipher suitable for constrained environments such as wireless sensor networks. In this paper we evaluate the security of Piccolo-80 against linear cryptanalysis, we present a 6-round linear approximation of Piccolo-80 with probability 1/2+2^{−29.04}. We use this approximation to attack 7-round Piccolo-80 (with whitening keys) with data complexity of 2^{61} known plaintexts and time complexity of 2^{61}. Its ...
Fast, Furious and Insecure: Passive Keyless Entry and Start Systems in Modern Supercars KU Leuven
The security of immobiliser and Remote Keyless Entry systems has been extensively studied over many years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received much attention besides relay attacks. In this work we fully reverse engineer a Passive Keyless Entry and Start system and perform a thorough analysis of its security. Our research reveals several security weaknesses. Specifically, we ...