Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2018, Article ID 3780407, 11 pages
https://doi.org/10.1155/2018/3780407
Research Article

Differential Cryptanalysis on Block Cipher Skinny with MILP Program

1School of Information Science and Engineering, Shandong Normal University, Jinan, Shandong 250358, China
2Cyberspace Security Lab, Jinan, Shandong 250358, China

Correspondence should be addressed to Wenying Zhang; moc.uhos@hzgniynew

Received 27 July 2018; Revised 11 September 2018; Accepted 16 September 2018; Published 4 October 2018

Guest Editor: Zhaoqing Pan

Copyright © 2018 Pei Zhang and Wenying Zhang. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. S. Melro and L. R. Jensen, “Influence of functionalization on the structural and mechanical properties of graphene,” Computers, Materials and Continua, vol. 53, no. 2, pp. 111–131, 2017. View at Google Scholar · View at Scopus
  2. Z. Pan, J. Lei, Y. Zhang, and F. L. Wang, “Adaptive fractional-Pixel motion estimation skipped algorithm for efficient HEVC motion estimation,” ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), vol. 14, no. 1, pp. 1–19, 2018. View at Google Scholar · View at Scopus
  3. E. Biham and A. Shamir, “Differential cryptanalysis of DES-like cryptosystems,” Journal of Cryptology, vol. 4, no. 1, pp. 3–72, 1991. View at Publisher · View at Google Scholar · View at Scopus
  4. J. Daemen and V. Rijmen, The Design of Rijndael: AES-The Advanced Encryption Standard, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  5. G. Cheng, C. Yang, X. Yao et al., “When Deep Learning Meets Metric Learning: Remote Sensing Image Scene Classification via Learning Discriminative CNNs,” IEEE Transactions on Geoscience & Remote Sensing, vol. 99, pp. 1–11, 2018. View at Google Scholar
  6. M. H. Faghihi Sereshgi, M. Dakhilalian, and M. Shakiba, “Biclique cryptanalysis of MIBS-80 and PRESENT-80 block ciphers,” Security and Communication Networks, vol. 9, no. 1, pp. 27–33, 2016. View at Publisher · View at Google Scholar · View at Scopus
  7. J. Borghoff, A. Canteaut, T. Güneysu et al., “PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications,” in Advances in Cryptology – ASIACRYPT 2012, vol. 7658 of Lecture Notes in Computer Science, pp. 208–225, Springer Berlin Heidelberg, Heidelberg, Germany, 2012. View at Publisher · View at Google Scholar
  8. S. Banik, A. Bogdanov, T. Isobe et al., “Midori: a block cipher for low energy,” in Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Lecture Notes in Comput. Sci., pp. 411–436, Springer Berlin, 2014.
  9. C. Beierle, J. Jean, Moradi A. et al., “The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS,” in Proceedings of the Part II, of the 36th Annual International Cryptology Conference on Advances in Cryptology-CRYPTO, vol. 9815, pp. 123–153, Springer-Verlag, 2016. View at MathSciNet
  10. M. Tolba, A. Abdelkhalek, and A. M. Youssef, “Impossible Differential Cryptanalysis of Reduced-Round SKINNY,” 2017.
  11. G. Han and W. Zhang, “Improved biclique cryptanalysis of the lightweight block cipher piccolo,” Security and Communication Networks, vol. 2017, 2017. View at Google Scholar · View at Scopus
  12. Y. Zheng, B. Jeon, and L. Sun, “Student’s t-Hidden Markov Model for Unsupervised Learning Using Localized Feature Selection,” IEEE Transactions on Circuits & Systems for Video Technology, vol. 99, no. 1-1, 2017. View at Google Scholar
  13. R. Ankele, S. Banik, A. Chakraborti et al., “Related-key impossible-differential attack on reduced-round Skinny,” in Applied Cryptography and Network Security, vol. 10355 of Lecture Notes in Comput. Sci., pp. 208–228, Springer, Cham, 2017. View at Publisher · View at Google Scholar · View at MathSciNet
  14. N. Mouha, Q. Wang, D. Gu, and B. Preneel, “Differential and linear cryptanalysis using mixed-integer linear programming,” in Information Security and Cryptology, pp. 57–76, Springer, 2012. View at Google Scholar
  15. S. Sun, L. Hu, P. Wang et al., “Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES (L) and Other Bit-Oriented Block Ciphers, ASIACRYPT,” 2014.
  16. L. Sun, W. Wang, R. Liu, and M. Wang, “MILP-aided bit-based division property for ARX ciphers,” Science China Information Sciences, vol. 61, no. 11, Article ID 118102, 2018. View at Google Scholar · View at MathSciNet
  17. R. A. Mezei, An Introduction to SAGE Programming: With Applications to SAGE Interacts for Numerical Methods, Inc, 2015.
  18. “Division C.: Using the CPLEX Callable Library,” 1997.