Collision Attacks against CAESAR Candidates : Forgery and Key-Recovery against AEZ and Marble

Conference object English OPEN
Fuhr, Thomas; Leurent, Gaëtan; Suder, Valentin;
(2015)
  • Publisher: HAL CCSD
  • Related identifiers: doi: 10.1007/978-3-662-48800-3_21
  • Subject: [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] | Marble | forgery | key-recovery | authenticated encryption | AEZ | cryptanalysis | [ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR] | PMAC | CAESAR competition

International audience; In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to turn a block cipher into a tweakable block cipher, following the XE... View more
  • References (17)
    17 references, page 1 of 2

    1. Andreeva, E., Bogdanov, A., Luykx, A., Mennink, B., Tischhauser, E., Yasuda, K.: Parallelizable and authenticated online ciphers. In: Sako, K., Sarkar, P. (eds.) Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I. Lecture Notes in Computer Science, vol. 8269, pp. 424{443. Springer (2013)

    2. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard. Information Security and Cryptography, Springer (2002)

    3. Ferguson, N.: Collision attacks on OCB. Comments to NIST (2002), available from http://csrc.nist.gov/groups/ST/toolkit/BCM/documents/comments/General_ Comments/papers/Ferguson.pdf

    4. Gilbert, H., Peyrin, T.: Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. In: Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. pp. 365{383 (2010)

    5. Guo, J.: Marble Speci cation Version 1.0. Submission to the CAESAR competition (March 2014)

    6. Guo, J.: Marble Speci cation version 1.2 (January 2015), posted on the cryptocompetition mailing list

    7. Hoang, V.T., Krovetz, T., Rogaway, P.: AEZ v3: Authenticated-Encryption by Enciphering. In: DIAC 2014: Directions in Authenticated Ciphers, Santa Barbara (August 2014)

    8. Hoang, V.T., Krovetz, T., Rogaway, P.: Robust authenticated-encryption AEZ and the problem that it solves. In: Oswald, E., Fischlin, M. (eds.) Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, So a, Bulgaria, April 26-30, 2015, Proceedings, Part I. Lecture Notes in Computer Science, vol. 9056, pp. 15{44. Springer (2015)

    9. Keliher, L., Sui, J.: Exact maximum expected di erential and linear probability for two-round advanced encryption standard. IET Information Security 1(2), 53{ 57 (2007)

    10. Knight, K.: Mathematical Statistics. Chapman & Hall (1999)

  • Metrics
Share - Bookmark