### DIFFERENTIAL CRYPTANALYSIS OF THE LIGHTWEIGHT BLOCK CIPHER CYPRESS-256

#### Abstract

#### Keywords

#### Full Text:

PDF#### References

R. Oliynykov et al., “A new encryption standard of Ukraine: The Kalyna block cipher,” IACR Cryptology ePrint Archive, 2015, 650.

Pub, NIST FIPS. “197: Advanced encryption standard (AES),” Federal Information Processing Standards Publication, 197.441: 0311, 2001.

I. Gorbenko, A. Kuznetsov, M. Lutsenko and D. Ivanenko, “The research of modern stream ciphers,” Proceedings of the 2017 4th IEEE International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2017, pp. 207-210.

O. Kuznetsov, M. Lutsenko and D. Ivanenko, “Strumok stream cipher: Specification and basic properties,” Proceedings of the 2016 Third IEEE International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkov, 2016, pp. 59-62.

N. Mouha, “The design space of lightweight cryptography,” Proceedings of the NIST Lightweight Cryptography Workshop, 2015, pp. 1-19.

A. Kuznetsov, Y. Gorbenko, A. Andrushkevych and I. Belozersev, “Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2,” Proceedings of the 2017 4th IEEE International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 203-206.

Lightweight Cryptography. Project Overview [Online]. Available at: https://csrc.nist.gov/projects/lightweight-cryptography

A. Andrushkevych, Y. Gorbenko, O. Kuznetsov, R. Oliynykov, M. Rodinko, “A prospective lightweight block cipher for green IT engineering,” in: Kharchenko V., Kondratenko Y., Kacprzyk J. (eds) Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control, Springer, Cham, vol 171, 2019, pp. 95-112. DOI: 10.1007/978-3-030-00253-4_5

R. Beaulieu et al., “The SIMON and SPECK lightweight block ciphers,” Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 2015, pp. 1-6.

D. J. Wheeler and R. M. Needham, “TEA, a Tiny Encryption Algorithm,” Proceedings of the International Workshop on Fast Software Encryption, Springer, Heidelberg, 1995, pp. 363–366.

D. Hong, et al., “LEA: A 128-bit block cipher for fast encryption on common processors,” Proceedings of the International Workshop on Information Security Applications, Springer, Cham, 2013, pp. 3-27.

A. Kuznetsov, R. Serhiienko, D. Prokopovych-Tkachenko, and Yu. Tarasenko, “Evaluation of algebraic immunity of modern block ciphers,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018, pp. 288-293.

M. Rodinko, R. Oliynykov, Yu. Gorbenko, “Optimization of the high nonlinear S-boxes generation method,” Tatra Mountains Mathematical Publications, vol. 70, no. 1, pp. 93-105, 2017.

M. Rodinko, R. Oliynykov and R. Eliseev, “Search for one-round differential characteristics of lighweight block cipher Cypress-256,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018, pp. 312-315.

A. Biryukov, V. Velichkov, “Automatic search for differential trails in ARX ciphers,” CT-RSA, vol. 8366, pp. 227-250, 2014.

X. Lai, J. L. Massey and S. Murphy, “Markov ciphers and differential cryptanalysis,” Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Berlin, Heidelberg, 1991, pp. 17-38.

N. Mouha,, and B. Preneel, “Towards finding optimal differential characteristics for ARX: Application to Salsa20,” Cryptology ePrint Archive, Report 2013/328, 2013.

D. Dinu et al., “SPARX: A family of ARX-based lightweight block ciphers provably secure against linear and differential attacks,” Proceedings of the ASIACRYPT'16, pp. 1-21, 2016.

J. P. Aumasson et al., “New features of Latin dances: analysis of Salsa ChaCha and Rumba,” Lecture Notes in Computer Science, vol. 5086, 2008, pp. 470-488.

H. Lipmaa, J. Wallén, and P. Dumas, “On the additive differential probability of exclusive-or,” in: Roy, B.K., Meier, W. (eds.) Proceedings of the International Workshop on Fast Software Encryption, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, vol. 3017, 2004, pp. 317-331.

H. Lipmaa and S. Moriai, “Efficient algorithms for computing differential properties of addition,” Proceedings of the International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 2001, pp. 336-350.

B. Liu, L. Li, R. Wu, M. Xie and Q. P. Li, “Loong: A family of involutional lightweight block cipher based on SPN structure,” IEEE Access, vol. 7, pp. 136023-136035, 2019.

D. Sehrawat, N. S. Gill and M. Devi, “Comparative analysis of lightweight block ciphers in IoT-enabled smart environment,” Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 2019, pp. 915-920.

I. Khairullin and V. Bobrov, “On cryptographic properties of some lightweight algorithms and its application to the construction of S-boxes,” Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg and Moscow, Russia, 2019, pp. 1807-1810.

E. Marsola do Nascimento and J. A. Moreira Xexeo, “A flexible authenticated lightweight cipher using Even-Mansour construction,” Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, 2017, pp. 1-6.

R. S. Mahantesh and S. Mohapatra, “Design of secured block ciphers PRESENT and HIGHT algorithms and its FPGA implementation,” Proceedings of the 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2018, pp. 1113-1118.

S. Kotel, F. Sbiaa, M. Zeghid, M. Machhout, A. Baganne and R. Tourki, “Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices,” Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, 2016, pp. 1-7.

O. Kara and M. F. Esgin, “On analysis of lightweight stream ciphers with Keyed update,” IEEE Transactions on Computers, vol. 68, issue 1, pp. 99-110, Jan. 2019.

M. Yoshikawa, Y. Nozaki and K. Asahi, “Vulnerability evaluation accelerator for lightweight ciphers,” Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, 2016, pp. 377-381.

M. A. Philip and Vaithiyanathan, “A survey on lightweight ciphers for IoT devices,” Proceedings of the 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy), Kollam, 2017, pp. 1-4.

C. A. Lara-Niño, M. Morales-Sandoval and A. Díaz-Pérez, “An evaluation of AES and present ciphers for lightweight cryptography on smartphones,” Proceedings of the 2016 International Conference on Electronics, Communications and Computers (CONIELECOMP), Cholula, 2016, pp. 87-93.

B. J. Mohd and T. Hayajneh, “Lightweight block ciphers for IoT: Energy optimization and survivability techniques,” IEEE Access, vol. 6, pp. 35966-35978, 2018.

C. Zhao, Y. Yan and W. Li, “An efficient ASIC Implementation of QARMA lightweight algorithm,” Proceedings of the 2019 IEEE 13th International Conference on ASIC (ASICON), Chongqing, China, 2019, pp. 1-4.

C. A. Lara-Nino, M. Morales-Sandoval and A. Diaz-Perez, “Novel FPGA-based low-cost hardware architecture for the PRESENT block cipher,” Proceedings of the 2016 Euromicro Conference on Digital System Design (DSD), Limassol, 2016, pp. 646-650.

K. Runovski, H.-J. Schmeisser, “On the convergence of fourier means and interpolation means,” Journal of Computational Analysis and Applications, vol. 6, issue 3, pp. 211-227, 2004.

B. P. Tkach, & L. B. Urmancheva, “Numerical-analytic method for finding solutions of systems with distributed parameters and integral condition,” Nonlinear Oscillations, vol. 12, issue 1, pp. 113-122, 2009. doi:10.1007/s11072-009-0064-6

R.K. Chornei, V.M. Hans Daduna, P.S. Knopov, P. “Controlled Markov fields with finite state space on graphs,” Stochastic Models, vol. 21, issue 4, pp. 847-874, 2005. doi:10.1080/15326340500294520

L. Dalmasso, F. Bruguier, P. Benoit and L. Torres, “Evaluation of SPN-based lightweight crypto-ciphers,” IEEE Access, vol. 7, pp. 10559-10567, 2019.

I. K. Dutta, B. Ghosh and M. Bayoumi, “Lightweight cryptography for Internet of insecure things: A survey,” Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0475-0481.

A. Heuser, S. Picek, S. Guilley and N. Mentens, “Lightweight ciphers and their side-channel resilience,” IEEE Transactions on Computers, pp. 1-20, 2020.

N. A. Gunathilake, W. J. Buchanan and R. Asif, “Next generation lightweight cryptography for smart IoT devices: Implementation, challenges and applications,” Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 2019, pp. 707-710.

### Refbacks

- There are currently no refbacks.