IAD Index of Academic Documents
  • Home Page
  • About
    • About Izmir Academy Association
    • About IAD Index
    • IAD Team
    • IAD Logos and Links
    • Policies
    • Contact
  • Submit A Journal
  • Submit A Conference
  • Submit Paper/Book
    • Submit a Preprint
    • Submit a Book
  • Contact
  • International Journal of Information Security Science
  • Volume:9 Issue:3
  • Analysis of Ascon, DryGASCON, and Shamash Permutations

Analysis of Ascon, DryGASCON, and Shamash Permutations

Authors : Cihangir TEZCAN
Pages : 172-187
View : 38 | Download : 14
Publication Date : 2020-09-01
Article Type : Research Paper
Abstract :Ascon, DryGASCON, and Shamash are submissions to NIST`s lightweight cryptography standardization process and have similar designs. We analyze these algorithms against subspace trails, truncated differentials, and differential-linear distinguishers. We provide probability one 4-round subspace trails for DryGASCON-256, 3-round subspace trails for \DryGASCON-128, and 2-round subspace trails for \Shamash permutations. Moreover, we provide the first 3.5-round truncated differential and 5-round differential-linear distinguisher for DryGASCON-128. Finally, we improve the data and time complexity of the 4 and 5-round differential-linear attacks on Ascon.
Keywords : Lightweight cryptography, Authenticated encryption, Cryptanalysis

ORIGINAL ARTICLE URL

* There may have been changes in the journal, article,conference, book, preprint etc. informations. Therefore, it would be appropriate to follow the information on the official page of the source. The information here is shared for informational purposes. IAD is not responsible for incorrect or missing information.


Index of Academic Documents
İzmir Academy Association
CopyRight © 2023-2026