Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qingju Wang is active.

Publication


Featured researches published by Qingju Wang.


international conference on information security and cryptology | 2011

Differential and linear cryptanalysis using mixed-integer linear programming

Nicky Mouha; Qingju Wang; Dawu Gu; Bart Preneel

Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-key primitives. For modern ciphers, resistance against these attacks is therefore a mandatory design criterion. In this paper, we propose a novel technique to prove security bounds against both differential and linear cryptanalysis. We use mixed-integer linear programming (MILP), a method that is frequently used in business and economics to solve optimization problems. Our technique significantly reduces the workload of designers and cryptanalysts, because it only involves writing out simple equations that are input into an MILP solver. As very little programming is required, both the time spent on cryptanalysis and the possibility of human errors are greatly reduced. Our method is used to analyze Enocoro-128v2, a stream cipher that consists of 96 rounds. We prove that 38 rounds are sufficient for security against differential cryptanalysis, and 61 rounds for security against linear cryptanalysis. We also illustrate our technique by calculating the number of active S-boxes for AES.


international conference on cryptology in india | 2014

Cryptanalysis of Reduced-Round SIMON32 and SIMON48

Qingju Wang; Zhiqiang Liu; Kerem Varici; Yu Sasaki; Vincent Rijmen; Yosuke Todo

SIMON family is one of the recent lightweight block cipher designs introduced by NSA. So far there have been several cryptanalytic results on this cipher by means of differential, linear and impossible differential cryptanalysis. In this paper, we study the security of SIMON32, SIMON48/72 and SIMON48/96 by using integral, zero-correlation linear and impossible differential cryptanalysis. Firstly, we present a novel experimental approach to construct the best known integral distinguishers of SIMON32. The small block size, 32 bits, of SIMON32 enables us to experimentally find a 15-round integral distinguisher, based on which we present a key recovery attack on 21-round SIMON32, while previous best results only achieved 19 rounds. Moreover, we attack 20-round SIMON32, 20-round SIMON48/72 and 21-round SIMON48/96 based on 11 and 12-round zero-correlation linear hulls of SIMON32 and SIMON48 respectively. Finally, we propose new impossible differential attacks which improve the previous impossible differential attacks. Our analysis shows that SIMON maintains enough security margin.


cryptographic hardware and embedded systems | 2013

FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware

Begül Bilgin; Andrey Bogdanov; Miroslav Knežević; Florian Mendel; Qingju Wang

In this paper, we present a novel lightweight authenticated cipher optimized for hardware implementations called Fides. It is an online nonce-based authenticated encryption scheme with authenticated data whose area requirements are as low as 793 GE and 1001 GE for 80-bit and 96-bit security, respectively. This is at least two times smaller than its closest competitors Hummingbird-2 and Grain-128a. While being extremely compact, Fides is both throughput and latency efficient, even in its most serial implementations. This is attained by our novel sponge-like design approach. Moreover, cryptographically optimal 5-bit and 6-bit S-boxes are used as basic nonlinear components while paying a special attention on the simplicity of providing first order side-channel resistance with threshold implementation.


international cryptology conference | 2015

Links among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis

Bing Sun; Zhiqiang Liu; Vincent Rijmen; Ruilin Li; Lei Cheng; Qingju Wang; Hoda A. Alkhzaimi; Chao Li

As two important cryptanalytic methods, impossible differential and integral cryptanalysis have attracted much attention in recent years. Although relations among other cryptanalytic approaches have been investigated, the link between these two methods has been missing. The motivation in this paper is to fix this gap and establish links between impossible differential cryptanalysis and integral cryptanalysis.


international cryptology conference | 2015

Optimized Interpolation Attacks on LowMC

Itai Dinur; Yunwen Liu; Willi Meier; Qingju Wang

LowMC is a collection of block cipher families introduced at Eurocrypt 2015 by Albrecht et al. Its design is optimized for instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. A unique feature of LowMC is that its internal affine layers are chosen at random, and thus each block cipher family contains a huge number of instances. The Eurocrypt paper proposed two specific block cipher families of LowMC, having 80-bit and 128-bit keys. In this paper, we mount interpolation attacks algebraic attacks introduced by Jakobsen and Knudsen on LowMC, and show that a practically significant fraction of


international conference on information security and cryptology | 2012

Improved impossible differential attacks on large-block rijndael

Qingju Wang; Dawu Gu; Vincent Rijmen; Ya Liu; Jiazhe Chen; Andrey Bogdanov


applied cryptography and network security | 2016

Automatic Search of Linear Trails in ARX with Applications to SPECK and Chaskey

Yunwen Liu; Qingju Wang; Vincent Rijmen

2^{-38}


International Journal of Computational Intelligence Systems | 2012

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network

Wei Li; Dawu Gu; Xiaoling Xia; Chen Zhao; Zhiqiang Liu; Ya Liu; Qingju Wang


international cryptology conference | 2018

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly

Qingju Wang; Yonglin Hao; Yosuke Todo; Chaoyun Li; Takanori Isobe; Willi Meier

of its 80-bit key instances could be broken


Security and Communication Networks | 2015

Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers

Zhiqiang Liu; Ya Liu; Qingju Wang; Dawu Gu; Wei Li

Collaboration


Dive into the Qingju Wang's collaboration.

Top Co-Authors

Avatar

Vincent Rijmen

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Dawu Gu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Zhiqiang Liu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Ya Liu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Kerem Varici

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Andrey Bogdanov

Technical University of Denmark

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chaoyun Li

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Yunwen Liu

Katholieke Universiteit Leuven

View shared research outputs
Researchain Logo
Decentralizing Knowledge