Differential-linear cryptanalysis of ascon and drygascon

Civek, Aslı Başak
Due to rapidly developing technology, devices have become smaller along with their performance capacity and memory. If possible, existing NIST-approved encryption standards should be used on these resource-constrained devices. When an acceptable performance cannot be achieved in this way, there is a need for more lightweight algorithms. Since taking individual measures leads to simplistic designs when designing lightweight algorithms, ciphers can become more vulnerable to cryptographic attacks. Hence some regulation is necessary. To satisfy this need, NIST has decided to start a lightweight cryptography competition to select one or more lightweight algorithms. In this study, we examined Second Round NIST Lightweight Cryptography Standardization Competition candidates to contribute to the course of the competition. Then we focused on two different but structurally very similar cipher suites Ascon and Drygascon to compare their security. We observed 2, 3, 3.5-round truncated differential and 5-round differential-linear distinguishers that were given for Drygascon are erroneous. We present the corrected results and provide the longest practical differential-linear distinguisher of Drygascon. After that, we compared the security of Ascon and Drygascon. We observed that the practical data complexity of the two is very close. However, since Ascon has more rounds than Drygascon, we concluded that Ascon might be more resistant against differential-linear cryptanalysis.


Fuzzy Decision Fusion for Single Target Classification in Wireless Sensor Networks
Gok, Sercan; Yazıcı, Adnan; Coşar, Ahmet; George, Roy (2010-07-23)
With the advances in technology, low cost and low footprint sensors are being used more and more commonly. Especially for military applications wireless sensor networks (WSN) have become an attractive solution as they have great use for avoiding deadly danger in combat. For military applications, classification of a target in a battlefield plays an important role. A wireless sensor node has the ability to sense the raw signal data in battlefield, extract the feature vectors from sensed signal and produce a ...
Impossible and improbable differential cryptanalysis of Spook algorithm
Bolel, Onur; Tezcan, Cihangir; Department of Cybersecurity (2021-6-14)
In recent years, the number of IoT devices increased considerably and the security of IoT devices became an important issue. Furthermore, most IoT devices have constrained resources in terms of memory, area and power. Therefore, cryptographic algorithms that provide their security should be suitable for the implementation on the constrained devices. In 2013, NIST initiated a lightweight cryptography project to define the standards of lightweight cryptography. In 2018, the lightweight cryptography project tu...
AKSOY, Yagiz; Alatan, Abdullah Aydın (2014-10-30)
Most of the mobile applications require efficient and precise computation of the device pose, and almost every mobile device has inertial sensors already equipped together with a camera. This fact makes sensor fusion quite attractive for increasing efficiency during pose tracking. However, the state-of-the-art fusion algorithms have a major shortcoming: lack of well-defined uncertainty introduced to the system during the prediction stage of the fusion filters. Such a drawback results in determining covarian...
Wireless Communication Aspects in the Internet of Things: An Overview
ULUŞAR, ÜMİT DENİZ; Celik, Gurkan; Al-Turjman, Fadi (2017-10-12)
Recent advances in technology propelled the development of resource constrained tiny devices and the concept of Internet of Things (IoT). Potential applications spanning various fields of science from environmental to medical have been emerged. Different architectures, routing protocols, performance issues and goals have been suggested. In this work, we review fundamental concepts, recent developments and critical design factors under IoT-specific constraints and objectives such as energy efficiency and env...
Optimization of Advanced Encryption Standard on Graphics Processing Units
Tezcan, Cihangir (2021-01-01)
Graphics processing units (GPUs) are specially designed for parallel applications and perform parallel operations much faster than central processing units (CPUs). In this work, we focus on the performance of the Advanced Encryption Standard (AES) on GPUs. We present optimizations which remove bank conflicts in shared memory accesses and provide 878.6 Gbps throughput for AES-128 encryption on an RTX 2070 Super, which is equivalent to 4.1 Gbps per Watt. Our optimizations provide more than 2.56x speed-up agai...
Citation Formats
A. B. Civek, “Differential-linear cryptanalysis of ascon and drygascon,” M.S. - Master of Science, Middle East Technical University, 2021.