February 2016 M T W T F S S « Oct 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Category Archives: Tools
Extension of the Toolkit for Counting Active S-boxes using Mixed-Integer Linear Programming (MILP) Author: Laura Winnen Download: http://www.ecrypt.eu.org/tools/uploads/sage_sbox_milp.zip This toolkit can be used to prove the security of cryptographic ciphers against linear and differential cryptanalysis. The toolkit generates a Mixed-Integer … Continue reading
A set of documented C++ classes to help analyze Keccak-f Authors: Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche Download: http://keccak.noekeon.org/KeccakTools-3.3.zip Documentation: http://keccak.noekeon.org/KeccakTools-doc/ KeccakTools is a set of C++ classes aimed at helping analyze the sponge function family Keccak. … Continue reading
Toolkit for Counting Active S-boxes using Mixed-Integer Linear Programming (MILP) Author: Nicky Mouha Download: http://www.ecrypt.eu.org/tools/uploads/sbox-milp.zip Documentation: http://www.cosic.esat.kuleuven.be/publications/article-2080.pdf This toolkit can be used to prove the security of cryptographic ciphers against linear and differential cryptanalysis. The toolkit generates a Mixed-Integer Linear … Continue reading
Framework for MD5 & SHA-1 Differential Path Construction and Chosen-Prefix Collisions for MD5 Author: Marc Stevens Website: http://code.google.com/p/hashclash/ This framework contains tools for the constructions of differential paths for MD5 and SHA-1, including chosen-prefix collisions for MD5.
The ARX toolkit is a set of tools to study ARX ciphers and hash functions Author: Gaëtan Leurent Website: http://www.di.ens.fr/~leurent/arxtools.html The ARX toolkit was presented at the SHA-3 conference in March 2012 in Washington, DC.
Toolkit for the differential cryptanalysis of S-functions Authors: Nicky Mouha, Vesselin Velichkov, Christophe De Cannière, Bart Preneel Download: http://www.ecrypt.eu.org/tools/uploads/s-function_toolkit_v2.zip Documentation: http://www.cosic.esat.kuleuven.be/publications/article-1473.pdf Note: v2 fixes a bug in the probability calculation. This bug does not affect the matrices that are output … Continue reading
Toolkit for SAT-based attacks on cryptographic primitives Authors: Paweł Morawiecki, Marian Srebrny, and Mateusz Srebrny Website: http://www.pawelmorawiecki.pl/cryptlogver CryptLogVer is a toolkit that can be used to mount SAT-based attacks on cryptographic primitives (block ciphers, stream ciphers, hash functions). The main … Continue reading
A tool to compute linear hulls for PRESENT Author: Bingsheng Zhang Download: http://www.ecrypt.eu.org/tools/uploads/present-linear-hull.zip Documentation: http://dx.doi.org/10.1007/978-3-642-10433-6_5 This tool computes linear hulls for the original PRESENT cipher. It confirms and even improves on the predicted bias (and the corresponding attack complexities) of … Continue reading
A simple tool for the automatic algebraic cryptanalysis of a large array of stream- and block ciphers Author: Paul Stankovski Website: http://www.eit.lth.se/index.php?id=260&uhpuid=dhs.pas&hpuid=584&L=1 A simple tool for the automatic algebraic cryptanalysis of a large array of stream- and block ciphers. Three … Continue reading
Deterministic Differential Properties of the BMW Compression Function Authors: Jian Guo and Søren S. Thomsen Website: http://www2.mat.dtu.dk/people/S.Thomsen/bmw/ This tool can be used to demonstrate non-randomness in the Blue Midnight Wish compression function. The implementation of the compression function is taken … Continue reading