Cryptanalysis

How to Abuse and Fix Authenticated Encryption Without Key Commitment

Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for which it was not originally designed. Recent research tries to understand what …

avatar
Stefan Kölbl
Haraka featured image

Haraka

A short-input hash function optimized for high performance on platforms supporting [AES-NI](https://en.wikipedia.org/wiki/AES_instruction_set). Used in …

CryptoSMT featured image

CryptoSMT

A tool for automating differential cryptanalysis for cryptographic primitives.

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis featured image

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single …

ralph-ankele

Tools for Cryptanalysis

avatar
Stefan Kölbl
A Brief Comparison of Simon and Simeck featured image

A Brief Comparison of Simon and Simeck

Simeck is a new lightweight block cipher design based on combining the design principles of the Simon and Speck block cipher. While the design allows a smaller and more efficient …

avatar
Stefan Kölbl

State-recovery analysis of Spritz

RC4 suffered from a range of plaintext-recovery attacks using statistical biases, which use substantial, albeit close-to-practical, amounts of known keystream in applications such …

ralph-ankele
Observations on the SIMON block cipher family featured image

Observations on the SIMON block cipher family

In this paper we analyse the general class of functions underlying the Simon block cipher. In particular, we derive efficiently computable and easily implementable expressions for …

avatar
Stefan Kölbl
Security of AES with a Secret S-box featured image

Security of AES with a Secret S-box

How does the security of the AES change when the S-box is replaced by a secret S-box, about which the adversary has no knowledge? Would it be safe to reduce the number of …

tyge-tiessen