Skip to main content

Showing 1–11 of 11 results for author: Civino, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.09315  [pdf, ps, other

    math.GR cs.CR math.RA

    Binary bi-braces and applications to cryptography

    Authors: Roberto Civino, Valerio Fedele

    Abstract: In a XOR-based alternating block cipher the plaintext is masked by a sequence of layers each performing distinct actions: a highly nonlinear permutation, a linear transformation, and the bitwise key addition. When assessing resistance against classical differential attacks (where differences are computed with respect to XOR), the cryptanalysts must only take into account differential probabilities… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    MSC Class: 16T25; 08A35; 94A60

  2. arXiv:2403.20059  [pdf, other

    cs.CR math.GR

    Optimal s-boxes against alternative operations and linear propagation

    Authors: Marco Calderini, Roberto Civino, Riccardo Invernizzi

    Abstract: Civino et al.~(2019) have shown how some diffusion layers can expose a Substitution-Permutation Network to vulnerability from differential cryptanalysis when employing alternative operations coming from groups isomorphic to the translation group on the message space. In this study, we present a classification of diffusion layers that exhibit linearity in parallel alternative operations for ciphers… ▽ More

    Submitted 21 October, 2024; v1 submitted 29 March, 2024; originally announced March 2024.

    MSC Class: 20B35; 94A60; 68P25

  3. arXiv:2401.04495  [pdf, other

    cs.CR cs.IT math.GR

    Differential experiments using parallel alternative operations

    Authors: Marco Calderini, Roberto Civino, Riccardo Invernizzi

    Abstract: The use of alternative operations in differential cryptanalysis, or alternative notions of differentials, are lately receiving increasing attention. Recently, Civino et al. managed to design a block cipher which is secure w.r.t. classical differential cryptanalysis performed using XOR-differentials, but weaker with respect to the attack based on an alternative difference operation acting on the fi… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    MSC Class: 20B35; 94A60; 68P25

  4. arXiv:2112.15096  [pdf, other

    math.CO cs.DM math.NT

    Verification and generation of unrefinable partitions

    Authors: Riccardo Aragona, Lorenzo Campioni, Roberto Civino, Massimo Lauria

    Abstract: Unrefinable partitions are a subset of partitions into distinct parts which satisfy an additional unrefinability property. More precisely, being an unrefinable partition means that none of the parts can be written as the sum of smaller integers without introducing a repetition. We address the algorithmic aspects of unrefinable partitions, such as testing whether a given partition is unrefinable or… ▽ More

    Submitted 10 January, 2023; v1 submitted 30 December, 2021; originally announced December 2021.

    MSC Class: 11P81; 05A17; 05A19

  5. arXiv:2103.06169  [pdf, other

    math.GR cs.CR

    On the primitivity of the AES-128 key-schedule

    Authors: Riccardo Aragona, Roberto Civino, Francesca Dalla Volta

    Abstract: The key-scheduling algorithm in the AES is the component responsible for selecting from the master key the sequence of round keys to be xor-ed to the partially encrypted state at each iteration. We consider here the group $Γ$ generated by the action of the AES-128 key-scheduling operation, and we prove that the smallest group containing $Γ$ and all the translations of the message space is primitiv… ▽ More

    Submitted 15 February, 2022; v1 submitted 10 March, 2021; originally announced March 2021.

    MSC Class: 20B15; 20B35; 94A60

  6. On the primitivity of Lai-Massey schemes

    Authors: Riccardo Aragona, Roberto Civino

    Abstract: In symmetric cryptography, the round functions used as building blocks for iterated block ciphers are often obtained as the composition of different layers providing confusion and diffusion. The study of the conditions on such layers which make the group generated by the round functions of a block cipher a primitive group has been addressed in the past years, both in the case of Substitution Permu… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

    MSC Class: 20B15; 20B35; 94A60

    Journal ref: Mediterranean Journal of Mathematics, 2021, 18(4), 165

  7. arXiv:2006.02147  [pdf, ps, other

    cs.CR

    An Authenticated Key Scheme over Elliptic Curves for Topological Networks

    Authors: Riccardo Aragona, Roberto Civino, Norberto Gavioli, Marco Pugliese

    Abstract: Nodes of sensor networks may be resource-constrained devices, often having a limited lifetime, making sensor networks remarkably dynamic environments. Managing a cryptographic protocol on such setups may require a disproportionate effort when it comes to update the secret parameters of new nodes that enter the network in place of dismantled sensors. For this reason, the designers of schemes for se… ▽ More

    Submitted 12 June, 2020; v1 submitted 3 June, 2020; originally announced June 2020.

    MSC Class: 94A60; 94A62; 94C15

  8. Some group-theoretical results on Feistel Networks in a long-key scenario

    Authors: Riccardo Aragona, Marco Calderini, Roberto Civino

    Abstract: The study of the trapdoors that can be hidden in a block cipher is and has always been a high-interest topic in symmetric cryptography. In this paper we focus on Feistel-network-like ciphers in a classical long-key scenario and we investigate some conditions which make such a construction immune to the partition-based attack introduced recently by Bannier et al.

    Submitted 5 May, 2020; v1 submitted 13 December, 2019; originally announced December 2019.

    Comments: Accepted for publication in Advances in Mathematics of Communications

    MSC Class: Primary: 94A60; 20B05; Secondary: 20B35

    Journal ref: Advances in Mathematics of Communications, 2020, 14(4), pp. 727-743

  9. Regular subgroups with large intersection

    Authors: Riccardo Aragona, Roberto Civino, Norberto Gavioli, Carlo Maria Scoppola

    Abstract: In this paper we study the relationships between the elementary abelian regular subgroups and the Sylow $2$-subgroups of their normalisers in the symmetric group $\mathrm{Sym}(\mathbb{F}_2^n)$, in view of the interest that they have recently raised for their applications in symmetric cryptography.

    Submitted 30 November, 2018; v1 submitted 14 November, 2018; originally announced November 2018.

    MSC Class: 20B35; 20D20; 94A60

    Journal ref: Annali di Matematica Pura ed Applicata (1923 -), Vol. 198 No. 6, 2019

  10. arXiv:1708.08814  [pdf, other

    math.GR cs.CR

    Wave-Shaped Round Functions and Primitive Groups

    Authors: Riccardo Aragona, Marco Calderini, Roberto Civino, Massimiliano Sala, Ilaria Zappatore

    Abstract: Round functions used as building blocks for iterated block ciphers, both in the case of Substitution-Permutation Networks and Feistel Networks, are often obtained as the composition of different layers which provide confusion and diffusion, and key additions. The bijectivity of any encryption function, crucial in order to make the decryption possible, is guaranteed by the use of invertible layers… ▽ More

    Submitted 21 September, 2018; v1 submitted 29 August, 2017; originally announced August 2017.

    MSC Class: 20B15; 20B35; 94A60

    Journal ref: Advances in Mathematics of Communications, Vol. 13 No. 1, February 2019

  11. On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting

    Authors: Massimo Cafaro, Roberto Civino, Barbara Masucci

    Abstract: The access control problem in a hierarchy can be solved by using a hierarchical key assignment scheme, where each class is assigned an encryption key and some private information. A formal security analysis for hierarchical key assignment schemes has been traditionally considered in two different settings, i.e., the unconditionally secure and the computationally secure setting, and with respect to… ▽ More

    Submitted 15 May, 2014; v1 submitted 21 February, 2014; originally announced February 2014.

    Journal ref: IEEE Transactions on Dependable and Secure Computing, Volume 12, Issue 4 (2015), pp. 485 - 490