Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Impossible Differential Cryptanalysis of Lightweight Block Cipher WARP

View through CrossRef
Abstract WARP is a lightweight block cipher with 128-bit key size and block size, which can be used as a lightweight replacement of AES-128 without changing the mode of operation. In this paper, we proposed an automatic search algorithm for impossible differentials of WARP with SAT method and searched for impossible differentials of WARP up to 21 rounds. Using one impossible differential of 21-round WARP, we present an impossible differential cryptanalysis of 33-round WARP by appending six rounds before and after the distinguisher, which covers the same round as the best zero-correlation linear attack on WARP in the single-key setting.
Title: Impossible Differential Cryptanalysis of Lightweight Block Cipher WARP
Description:
Abstract WARP is a lightweight block cipher with 128-bit key size and block size, which can be used as a lightweight replacement of AES-128 without changing the mode of operation.
In this paper, we proposed an automatic search algorithm for impossible differentials of WARP with SAT method and searched for impossible differentials of WARP up to 21 rounds.
Using one impossible differential of 21-round WARP, we present an impossible differential cryptanalysis of 33-round WARP by appending six rounds before and after the distinguisher, which covers the same round as the best zero-correlation linear attack on WARP in the single-key setting.

Related Results

Vævning over gruber
Vævning over gruber
Pits, Looms, and Loom Pits? In the archaeological quarterly Skalk (1959, no 2), Mogens Ørsnes described "The Problem of the Hundred Holes," pits "large and small, shallow and deep"...
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. A...
Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we ...
Selecting Rotation Constants on SIMON-Type Ciphers
Selecting Rotation Constants on SIMON-Type Ciphers
In 2013, a lightweight block cipher SIMON is proposed by NSA. This paper tries to investigate this design criterion in terms of resisting against impossible differential cryptanaly...
Security Analysis of Lightweight Cryptographic Primitives
Security Analysis of Lightweight Cryptographic Primitives
Symmetric key cryptographic primitives are essential to encrypt data and protect communication between parties. Due to resource constraints, some modern devices are not capable of ...
An optimized novel lightweight block cipher for image encryption
An optimized novel lightweight block cipher for image encryption
Abstract In the era of pervasive multimedia communication, image data has become a dominant form of information exchange across embedded, mobile, and IoT platforms. This ...
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Block cipher merupakan salah satu teknik dalam kriptografi modern yang digunakan untuk melakukan enkripsi/dekripsi pada data digital dengan membagi pesan menjadi blok-blok data dan...

Back to Top