Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 20
Page No. 8439 - 8447

Analysis of Security Attacks on Lightweight Block Ciphers and their Countermeasures

Authors : Deepti Sehrawat and Nasib Singh Gill

References

Abdelkhalek, A., M. Tolba and A.M. Youssef, 2017. Impossible Differential Attack on Reduced Round SPARX-64/128. In: Cryptology in Africa, Joye M. and A. Nitaj (Eds.) Springer, Cham, Switzerland, ISBN:978-3-319-57338-0, pp: 135-146.

Beierle, C., A. Canteaut, G. Leander and Y. Rotella, 2017. Proving resistance against invariant attacks: Properties of the linear layer. Proceedings of the Conference on Early Symmetric Crypto (ESC’17), January 16-20, 2017, Mercure Kikuoka Golf Club Hotel, Canach, Luxembourg, pp: 1-5.

Biham, E. and A. Shamir, 1991. Differential cryptanalysis of DES-like cryptosystems. J. Cryptol., 4: 3-72.
CrossRef  |  

Biryukov, A. and D. Wagner, 1999. Slide Attacks. In: Fast Software Encryption, Knudsen, L. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-66226-6, pp: 245-259.

Biryukov, A. and D. Wagner, 2000. Advanced Slide Attacks. In: Theory and Applications of Cryptographic Techniques, Preneel, B. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-67517-4, pp: 589-606.

Bogdanov, A. and C. Rechberger, 2010. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. In: Selected Areas in Cryptography, Biryukov, A., G. Gong and D.R. Stinson (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-19573-0, pp: 229-240.

Bogdanov, A. and M. Wang, 2012. Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. In: Fast Software Encryption, Canteaut, A. (Ed.). Springer, Berlin, Germany, ISBN:978-3-642-34046-8, pp: 29-48.

Bogdanov, A., D. Khovratovich and C. Rechberger, 2011. Biclique Cryptanalysis of the Full AES. In: Theory and Application of Cryptology and Information Security, Lee, D.H. and X. Wang (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-25384-3, pp: 344-371.

Botta, A., W.D. Donato, V. Persico and A. Pescape, 2014. On the integration of cloud computing and internet of things. Proceedings of the 2014 International Conference on Future Internet of Things and Cloud (FiCloud’14), August 27-29, 2014, IEEE, Barcelona, Spain, ISBN:978-1-4799-4357-9, pp: 23-30.

Botta, A., W.D. Donato, V. Persico and A. Pescape, 2016. Integration of cloud computing and internet of things: A survey. Future Generation Comput. Syst., 56: 684-700.
CrossRef  |  Direct Link  |  

Canniere, D.C., O. Dunkelman and M. Knezevic, 2009. KATAN and KTANTAN: A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Cryptographic Hardware and Embedded Systems-CHES, Clavier, C. and ‎K. Gaj (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-04137-2, pp: 272-288.

Chen, J., M. Wang and B. Preneel, 2012. Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT. In: Cryptology in Africa, Mitrokotsa, A. and S. Vaudenay (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-31409-4, pp: 117-137.

Demirci, H. and A.A. Selcuk, 2008. A meet-in-the-middle attack on 8-round AES. In: Fast Software Encryption, Nyberg, K. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-71038-7, pp: 116-126.

Dinur, I. and A. Shamir, 2009. Cube Attacks on Tweakable Black Box Polynomials. In: Advances in Cryptology-EUROCRYPT, Joux, A. (Ed.). Springer, Berlin, Germany, ISBN:978-3-642-01000-2, pp: 278-299.

Dmitry, K., C. Rechberger and A. Savelieva, 2012. Bicliques for preimages: Attacks on skein-512 and the SHA-2 family. Proceedings of the 19th FSE International Workshop on Fast Software Encryption, March 19-21 2012, Springer, Washington, DC, USA., ISBN:978-3-642-34046-8, pp: 244-263.

Dobraunig, C., M. Eichlseder, D. Kales and F. Mendel, 2017. Practical key-recovery attack on MANTIS5. IACR. Trans. Symmetric Cryptology, 2016: 248-260.
CrossRef  |  Direct Link  |  

Engels, D., M.J.O. Saarinen, P. Schweitzer and E.M. Smith, 2011. The Hummingbird-2 Lightweight Authenticated Encryption Algorithm. In: Radio Frequency Identification: Security and Privacy Issues, Juels, A. and C. Paar (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-25285-3, pp: 19-31.

Gubbia, J., R. Buyya, S. Marusic and M. Palaniswami, 2013. Internet of things (IoT): A vision, architectural elements and future directions. Future Generat. Comput. Syst., 29: 1645-1660.
CrossRef  |  Direct Link  |  

Hosseinzadeh, J. and M. Hosseinzadeh, 2016. A comprehensive survey on evaluation of lightweight symmetric ciphers: Hardware and software implementation. Adv. Comput. Sci. Intl. J., 5: 31-41.
Direct Link  |  

Jakobsen, T. and L.R. Knudsen, 1997. The Interpolation Attack on Block Ciphers. In: Fast Software Encryption, Biham, E. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-63247-4, pp: 28-40.

Jeong, K., H. Kang, C. Lee, J. Sung and S. Hong et al., 2015. Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis. Peer Networking Appl., 8: 716-732.
CrossRef  |  Direct Link  |  

John, P. and G. Shpantzer, 2014. Securing the internet of things survey. SANS Institute, North Bethesda, Maryland. http://cybersec.orglearn.com/wp-content/uploads/2014/02/SecuringtheInternetofThingsSurvey.pdf

Karakoc, F., H. Demirci and A.E. Harmanci, 2015. AKF: A key alternating Feistel scheme for lightweight cipher designs. Inf. Process. Lett., 115: 359-367.
CrossRef  |  Direct Link  |  

Khovratovich, D. and I. Nikolic, 2010. Rotational Cryptanalysis of ARX. In: Fast Software Encryption, Hong, S. and T. Iwata (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-13857-7, pp: 333-346.

Knudsen, L. and D. Wagner, 2002. Integral cryptanalysis. Proceedings of the 9th FSE International Workshop on Fast Software Encryption, February 4-6, 2002, Springer, Leuven, Belgium, ISBN:978-3-540-44009-3, pp: 112-127.

Knudsen, L.R., 1994. Truncated and higher order differentials. Proceedings of the Second FSE International Workshop on Fast Software Encryption, December 14-16, 1994, Springer, Washington, DC, USA., ISBNl:978-3-540-60590-4, pp: 196-211.

Manifavas, C., G. Hatzivasilis, K. Fysarakis and K. Rantos, 2014. Lightweight Cryptography for Embedded Systems: A Comparative Analysis. In: Data Privacy Management and Autonomous Spontaneous Security, Garcia-Alfaro, J., G. Lioudakis, N. Cuppens-Boulahia, S. Foley and W. Fitzgerald (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-54567-2, pp: 333-349.

Matsui, M., 1993. Linear Cryptanalysis Method for DES Cipher. In: Theory and Application of Cryptographic Techniques, Helleseth, T. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-57600-6, pp: 386-397.

Meier, W., E. Pasalic and C. Carlet, 2004. Algebraic attacks and decomposition of Boolean functions. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, May 2-6, 2004, Interlaken, pp: 474-491.

Mihir, B. and T. Kohno, 2003. A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs and Applications. In: Theory and Applications of Cryptographic Techniques, Biham, E. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-14039-9, pp: 491-506.

Minier, M. and M. Naya-Plasencia, 2012. A related key impossible differential attack against 22 rounds of the lightweight block cipher LBlock. Inf. Process. Lett., 112: 624-629.
CrossRef  |  Direct Link  |  

Nandhini, P. and D.V. Vanitha, 2017. A study of lightweight cryptographic algorithms for IoT. Intl. J. Innov. Adv. Comput. Sci., 6: 26-35.
Direct Link  |  

Okello, W.J., Q. Liu, F.A. Siddiqui and C. Zhang, 2017. A survey of the current state of lightweight cryptography for the internet of things. Proceedings of the 2017 International Conference on Computer, Information and Telecommunication Systems (CITS’17), July 21-23, 2017, IEEE, Dalian, China, ISBN:978-1-5090-5958-4, pp: 292-296.

Ozen, O., K. Varici, C. Tezcan and C. Kocair, 2009. Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. In: Information Security and Privacy, Boyd, C. and J.G. Nieto (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-02619-5, pp: 90-107.

Qianqian, Y., L. Hu, S. Sun and L. Song, 2016. Truncated differential analysis of round-reduced roadrunner block cipher. IACR. Cryptology ePrint Arch., 1: 1-11.
Direct Link  |  

Ranea, A., Y. Liu and T. Ashur, 2017. An easy-to-use tool for rotational-XOR cryptanalysis of ARX block ciphers. Proc. Romanian Acad. Ser. A., 18: 307-316.
Direct Link  |  

Saarinen, M.J.O., 2011. Cryptanalysis of Hummingbird-1. In: Fast Software Encryption, Joux, A. (Ed.). Springer, Berlin, Germany, ISBN:978-3-642-21701-2, pp: 328-341.

Sadegh, S., T. Mohammadi and N. Bagheri, 2016. Cryptanalysis of reduced round SKINNY block cipher. IACR. Cryptology ePrint Arch., 1: 1-11.
Direct Link  |  

Shibutani, K., T. Isobe, H. Hiwatari, A. Mitsuda and T. Akishita et al., 2011. Piccolo: An Ultra-Lightweight Block Cipher. In: Cryptographic Hardware and Embedded Systems, Preneel, B. and T. Takagi (Eds.). Springer, Berlin, Germany, ISBN:978-3-642-23950-2, pp: 342-357.

Sicari, S., A. Rizzardi, L.A. Grieco and P.A. Coen, 2015. Security, privacy and trust in internet of things: The road ahead. Comput. Networks, 76: 146-164.
Direct Link  |  

Standaert, F.X., G. Piret and J.J. Quisquater, 2003. Cryptanalysis of block ciphers: A survey. Master Thesis, Universite Catholique de Louvain, Ottignies-Louvain-la-Neuve, Belgium.

Wagner, D., 1999. The Boomerang Attack. In: Fast Software Encryption, Knudsen, L. (Ed.). Springer, Berlin, Germany, ISBN:978-3-540-66226-6, pp: 156-170.

Zhang, W., Z. Bao, D. Lin, V. Rijmen and B. Yang et al., 2015. RECTANGLE: A bit-slice lightweight block cipher suitable for multiple platforms. China Inf. Sci., 58: 1-15.
CrossRef  |  Direct Link  |  

Zissis, D. and D. Lekkas, 2012. Addressing cloud computing security issues. Future Gener. Comput. Syst., 28: 583-592.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved