Learn More
Sosemanuk is a new synchronous software-oriented stream cipher, corresponding to Profile 1 of the ECRYPT call for stream cipher primitives. Its key length is variable between 128 and 256 bits. It accommodates a 128-bit initial value. Any key length is claimed to achieve 128-bit security. The Sosemanuk cipher uses both some basic design principles from the(More)
Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton round function to mount stocha-stic attacks on round-reduced versions of Crypton. Though more efficient than the best differential and linear attacks, our attacks do not endanger the practical(More)
Sflash is a fast multivariate signature scheme. Though the first version Sflash v1 was flawed, a second version, Sflash v2 was selected by the Nessie Consortium and was recommended for implementation of low-end smart cards. Very recently, due to the security concern, the designer of Sflash recommended that Sflash v2 should not be used, instead a new version(More)
Introduction The aim of this paper is to present some benchmarks of stream ciphers on a dedicated sensor (as previously done for block ciphers in [Law et al. 2006]) Why use stream ciphers in WSNs ? they could reach important flows for limited costs They do not propagate errors in communication channels (one time pad) Usually used in wireless communications(More)
In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various levels of the MISTY block-cipher which allows to derive a 2n-bit permutation from several n-bit permutations, and a slightly different construction named the R-scheme. We obtain(More)
Knudsen and Rijmen introduced the notion of known-key distinguishers in an effort to view block cipher security from an alternative perspective e.g. a block cipher viewed as a primitive underlying some other cryptographic construction such as a hash function; and applied this new concept to construct a 7-round distinguisher for the AES and a 7-round Feistel(More)
Wireless sensor networks (WSNs) have many potential applications. In many scenarios WSNs are of interest to adversaries and they become susceptible to some types of attacks since they are deployed in open environments and have limited resources. Many attacks are known against WSNs. Protections exist against some of them but for the others IDS (Intrusion(More)
This report deals with security in wireless sensor networks (WSNs), especially in network layer. Multiple secure routing protocols have been proposed in the literature. However, they often use the cryptography to secure routing functionalities. The cryptography alone is not enough to defend against multiple attacks due to the node compromise. Therefore, we(More)