Javascript must be enabled to continue!
Template attack based on uBlock cipher algorithm
View through CrossRef
The uBlock cipher algorithm is a family of lightweight block cipher algorithms, which was proposed by Wu Wenling, Zhang Lei and others in 2019. Its block length and key length support 128 and 256 bits. It has certain flexibility in different environments to meet the application of algorithms in different software and hardware conditions. At present, the research of side channel attack against uBlock cipher algorithm is mainly differential fault analysis. In order to explore the application of template attack against uBlock cipher algorithm analysis attack, a template attack method against uBlock cipher algorithm is proposed. When constructing the template, the S-box output of uBlock cipher algorithm is selected as the attack point of energy analysis, and the Hamming weight is used as the analysis model to build the template about S-box output.
Title: Template attack based on uBlock cipher algorithm
Description:
The uBlock cipher algorithm is a family of lightweight block cipher algorithms, which was proposed by Wu Wenling, Zhang Lei and others in 2019.
Its block length and key length support 128 and 256 bits.
It has certain flexibility in different environments to meet the application of algorithms in different software and hardware conditions.
At present, the research of side channel attack against uBlock cipher algorithm is mainly differential fault analysis.
In order to explore the application of template attack against uBlock cipher algorithm analysis attack, a template attack method against uBlock cipher algorithm is proposed.
When constructing the template, the S-box output of uBlock cipher algorithm is selected as the attack point of energy analysis, and the Hamming weight is used as the analysis model to build the template about S-box output.
Related Results
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...
Transformer object tracking algorithm based on spatiotemporal template focal attention
Transformer object tracking algorithm based on spatiotemporal template focal attention
Existing visual object tracking methods only use the target area of the first frame as a template, which makes it easy to fail in fast-changing and complex backgrounds. To solve th...
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
An Enhancement of Text Encryption Algorithm with Hybrid Two-Square Cipher and Columnar Transposition Cipher
Purpose–Enhance the Two-Square Cipher's effectiveness by developinganalgorithmto address vulnerabilities in plaintext variations, character set limitations and encryption...
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Penelitian ini bertujuan untuk mengatasi kebutuhan pengamanan informasi teks digital melalui kriptografi, dengan fokus pada implementasi Vigenère Cipher. Dibandingkan dengan Caesar...
Real‐time markerless lung tumor tracking in fluoroscopic video: Handling overlapping of projected structures
Real‐time markerless lung tumor tracking in fluoroscopic video: Handling overlapping of projected structures
Purpose:Fluoroscopic imaging is a well‐suited technique for online visualization of tumor motion in the thoracic region. Template‐based approaches for tumor tracking in such images...
Mitigating Adversarial Attacks Uncertainty Through Interval Analysis
Mitigating Adversarial Attacks Uncertainty Through Interval Analysis
Abstract
The adversarial attack is characterized by a high attack success rate and a fast generation of examples. It is widely used in neural network robustness evaluation ...
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
Fast Algorithm for Cyber-Attack Estimation and Attack Path Extraction Using Attack Graphs with AND/OR Nodes
This paper studies the security issues for cyber–physical systems, aimed at countering potential malicious cyber-attacks. The main focus is on solving the problem of extracting the...


