We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2... more We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area. The wider tweak input caters to both specific use cases and the design of modes of operation with higher security bounds. This is achieved through new key and tweak schedules, revised S-Box and linear layer choices, and a more comprehensive security analysis. QARMAv2 offers competitive latency and area in fully unrolled hardware implementations.Some of our results may be of independent interest. These include: new MILP models of certain classes of diffusion matrices; the comparative analysis of a full reflection cipher against an iterative half-cipher; our boomerang attack framework; and an improved approach to doubling the width of a block cipher.
Der Beitrag stellt die Ergebnisse einer bundesweiten Umfrage zum Thema Internet-Awareness – Risik... more Der Beitrag stellt die Ergebnisse einer bundesweiten Umfrage zum Thema Internet-Awareness – Risikokompetenz und Risikowahrnehmung im Umgang mit neuen Technologien – vor. Im Versuch der Einordnung werden drei Cluster identifiziert: der Mischtyp Sorglos- & Benefit-Nutzer (Typ C), der eher Kontrollgläubige-Nutzer (Typ B) und der Awareness-Nutzer (Typ A). Der große Teil der befragten Web-2.0-Nutzer, mehr als 82 %, scheint sich der mit dem Internet verbundenen Risiken bewusst und gibt an, sich dementsprechend verantwortungsvoll zu verhalten (Mensch 3.0). Jedoch stellt sich die Frage: Handeln wir tatsächlich so verantwortungsbewusst? Muss Internet-Awareness verstärkt auf den Lehrplan? (DIPF/Orig.)
Physical attacks have been subject of extensive research since more than twenty years. Neverthele... more Physical attacks have been subject of extensive research since more than twenty years. Nevertheless, several problems still have to be solved. This paper, after recalling the most popular physical attacks, introduces three (of the many) possible research directions in the area: the methodological study of the interaction between countermeasures against one type of attack and the resistance against another attack, the development of automated techniques for applying and verifying the correct application of countermeasures, and the study of physical attacks in the novel and changed scenario of cyber-physical systems.
One very important concern in the implementation of curve-based cryptographic systems, as well as... more One very important concern in the implementation of curve-based cryptographic systems, as well as computer algebra systems, is the choice of algorithms with respect to performance. Cryptographic systems are often chosen according to their speed at a given security level, and the ...
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2... more We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA (from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping similar latency and area. The wider tweak input caters to both specific use cases and the design of modes of operation with higher security bounds. This is achieved through new key and tweak schedules, revised S-Box and linear layer choices, and a more comprehensive security analysis. QARMAv2 offers competitive latency and area in fully unrolled hardware implementations.Some of our results may be of independent interest. These include: new MILP models of certain classes of diffusion matrices; the comparative analysis of a full reflection cipher against an iterative half-cipher; our boomerang attack framework; and an improved approach to doubling the width of a block cipher.
Der Beitrag stellt die Ergebnisse einer bundesweiten Umfrage zum Thema Internet-Awareness – Risik... more Der Beitrag stellt die Ergebnisse einer bundesweiten Umfrage zum Thema Internet-Awareness – Risikokompetenz und Risikowahrnehmung im Umgang mit neuen Technologien – vor. Im Versuch der Einordnung werden drei Cluster identifiziert: der Mischtyp Sorglos- & Benefit-Nutzer (Typ C), der eher Kontrollgläubige-Nutzer (Typ B) und der Awareness-Nutzer (Typ A). Der große Teil der befragten Web-2.0-Nutzer, mehr als 82 %, scheint sich der mit dem Internet verbundenen Risiken bewusst und gibt an, sich dementsprechend verantwortungsvoll zu verhalten (Mensch 3.0). Jedoch stellt sich die Frage: Handeln wir tatsächlich so verantwortungsbewusst? Muss Internet-Awareness verstärkt auf den Lehrplan? (DIPF/Orig.)
Physical attacks have been subject of extensive research since more than twenty years. Neverthele... more Physical attacks have been subject of extensive research since more than twenty years. Nevertheless, several problems still have to be solved. This paper, after recalling the most popular physical attacks, introduces three (of the many) possible research directions in the area: the methodological study of the interaction between countermeasures against one type of attack and the resistance against another attack, the development of automated techniques for applying and verifying the correct application of countermeasures, and the study of physical attacks in the novel and changed scenario of cyber-physical systems.
One very important concern in the implementation of curve-based cryptographic systems, as well as... more One very important concern in the implementation of curve-based cryptographic systems, as well as computer algebra systems, is the choice of algorithms with respect to performance. Cryptographic systems are often chosen according to their speed at a given security level, and the ...
Uploads
Papers by Roberto Avanzi