Pawel Morawiecki
Polish Academy of Sciences
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Pawel Morawiecki.
Information Processing Letters | 2013
Pawel Morawiecki; Marian Srebrny
Abstract In this paper, we present a preimage attack on reduced versions of Keccak hash functions. We use our recently developed toolkit CryptLogVer for generating the conjunctive normal form, CNF, which is passed to the SAT solver PrecoSAT. We found preimages for some reduced versions of the function and showed that full Keccak function has a comfortable security margin against this kind of attack.
international conference on security and cryptography | 2017
Ashutosh Dhar Dwivedi; Pawel Morawiecki; Sebastian Wójtowicz
In this paper we investigate the security margin of MORUS — an authenticated cipher taking part in the CAESAR competition. We propose a new key recovery approach, which can be seen as an accelerated exhaustive search. We also verify the resistance of MORUS against internal differential and rotational cryptanalysis. Our analysis reveals that the cipher has a solid security margin and a lack of round constants does not bring any weakness. Our work helps to reliably evaluate this new, high-performance algorithm, which is particularly important in the context of the ongoing CAESAR competition.
international conference on security and cryptography | 2017
Ashutosh Dhar Dwivedi; Pawel Morawiecki; Sebastian Wójtowicz
In this work we focus on the tweakable block cipher Scream, We have analysed Scream with the techniques, which previously have not been applied to this algorithm, that is differential-linear and impossible differential cryptanalysis. This is work in progress towards a comprehensive evaluation of Scream. We think it is essential to analyse these new, promising algorithms with a possibly wide range of cryptanalytic tools and techniques. Our work helps to realize this goal.
Information Processing Letters | 2018
Ashutosh Dhar Dwivedi; Pawel Morawiecki; Rajani Singh; Shalini Dhar
Abstract We have analysed tweakable block cipher Scream which is used by cipher SCREAM, with the techniques linear cryptanalysis, differential cryptanalysis and related key cryptanalysis. Tweakable block cipher Scream is already analysed with linear, differential-linear and impossible differential cryptanalysis in our previous paper. In this paper we extend our work by adding related key attack along with the differential-linear attack.
IACR Cryptology ePrint Archive | 2010
Pawel Morawiecki; Marian Srebrny
Science & Engineering Faculty | 2014
Pawel Morawiecki; Kris Gaj; Ekawat Homsirikamol; Krystian Matusiewicz; Josef Pieprzyk; Marcin Rogawski; Marian Srebrny; Marcin Wójcik
IACR Cryptology ePrint Archive | 2015
Pawel Morawiecki; Josef Pieprzyk; Michal Straus; Marian Srebrny
IACR Cryptology ePrint Archive | 2014
Itai Dinur; Pawel Morawiecki; Josef Pieprzyk; Marian Srebrny; Michal Straus
International Journal of Electronics and Telecommunications | 2018
Ashutosh Dhar Dwivedi; Pawel Morawiecki; Sebastian Wójtowicz
IACR Cryptology ePrint Archive | 2016
Ashutosh Dhar Dwivedi; Milos Kloucek; Pawel Morawiecki; Ivica Nikolić; Josef Pieprzyk; Sebastian Wójtowicz