The main difference compared to PRESENT, which turns out to induce severe weaknesses of SAT_Jo algorithm, is its different choice of substitution boxes (S-boxes) and the bit-permutation layer for the reasons of making the cipher highly resource-efficient. Even though the designers provided a ...
In the case of a low signal-to-noise ratio (realistic practical condition), we derive the conditions on the cipher's substitution boxes (sboxes) to minimize the success metric (hence the success rate). This result supersedes a previous characterization on sboxes known as transparency order, ...
This class of attacks is interesting mostly for hash functions, because they require the attacker to be able to know and to control the internal state of the primitive, which is not possible if a secret is involved, for example in a block cipher. Yet, another application is the study of ...
In symmetric-key cryptanalysis, one usually starts by identifying a distinguisher on the reduced-round target cipher and then proceeds with the key-recovery attack for more rounds. Besides the key recovery, the distinguishing property of some cryptographic schemes itself has been more and more importa...