2022
DOI: 10.1016/j.jisa.2022.103379
|View full text |Cite
|
Sign up to set email alerts
|

Improved differential attacks on the reduced-round SNOW-V and SNOW-Vi stream cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Differential attacks involve obtaining information or keys in an encrypted system by analyzing the differences between various inputs [43]. Based on our experiments, a change in 1 bit of the initial key results in nearly a 50% alteration in the bits of the key in each round.…”
Section: Differential Attacksmentioning
confidence: 98%
See 1 more Smart Citation
“…Differential attacks involve obtaining information or keys in an encrypted system by analyzing the differences between various inputs [43]. Based on our experiments, a change in 1 bit of the initial key results in nearly a 50% alteration in the bits of the key in each round.…”
Section: Differential Attacksmentioning
confidence: 98%
“…Side-channel attacks exploit information leaked through non-traditional channels, such as power consumption, electromagnetic radiation, time delays, etc., to extract round keys or sensitive data [42]. The demonstrated independence and sensitivity of our algorithm imply that even if an attacker manages to obtain the round key for a specific round, calculating the round key and initial key for other rounds becomes challenging.…”
Section: Side-channel Attacksmentioning
confidence: 99%
“…A differential attack is a technique used to extract information or keys in an encrypted system by analyzing the differences between various inputs [52]. Experimental results…”
Section: Differential Attackmentioning
confidence: 99%
“…Differential attack is another commonly used method in cryptanalysis. It aims to obtain key information, such as the key or plaintext, by analyzing the output differences of cryptographic algorithms when subjected to different input differences [30]. The fundamental concept behind a differential attack is to select a pair of input plaintexts with a small difference between them and observe the resulting output difference during the algorithm's execution.…”
Section: Ability To Resist Differential Attacksmentioning
confidence: 99%