Message Extension Attack against Authenticated Encryptions: Application to PANDA

作者: Yu Sasaki , Lei Wang

DOI: 10.1007/978-3-319-12280-9_6

关键词:

摘要: In this paper, a new cryptanalysis approach for class of authenticated encryption schemes is presented, which inspired by the previous length extension attack against hash function based MACs. The called message attack. target that initialize internal state with nonce and key, update associated data message, extract key stream from state, finally generate tag updated state. A forgery can be mounted in nonce-repeating model chosen-plaintext scenario when to shared processing generating tag. then applied PANDA , dedicated design submitted CAESAR. An existential 25 chosen plaintexts, 264 computations, negligible memory, breaks claimed 128-bit security model. This first result claim .

参考文章(17)
Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, Wenling Wu, Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE international cryptology conference. pp. 377- 404 ,(2013) , 10.1007/978-3-642-42033-7_20
Jérémy Jean, Ivica Nikolić, Yu Sasaki, Lei Wang, Practical Cryptanalysis of PAES selected areas in cryptography. pp. 228- 242 ,(2014) , 10.1007/978-3-319-13051-4_14
Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser, ALE: AES-Based Lightweight Authenticated Encryption Fast Software Encryption. pp. 447- 466 ,(2014) , 10.1007/978-3-662-43933-3_23
Oriol Farràs, Torben Hansen, Tarik Kaced, Carles Padró, Optimal Non-perfect Uniform Secret Sharing Schemes Advances in Cryptology – CRYPTO 2014. ,vol. 2014, pp. 217- 234 ,(2014) , 10.1007/978-3-662-44381-1_13
Dmitry Khovratovich, Christian Rechberger, The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE selected areas in cryptography. ,vol. 2013, pp. 174- 184 ,(2013) , 10.1007/978-3-662-43414-7_9
Guido Bertoni, Joan Daemen, Michaël Peeters, Gilles Van Assche, Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications Selected Areas in Cryptography. pp. 320- 337 ,(2012) , 10.1007/978-3-642-28496-0_19
Aggelos Kiayias, Moti Yung, Polynomial reconstruction based cryptography selected areas in cryptography. pp. 129- 133 ,(2001) , 10.1007/3-540-45537-X_10
Luke Mather, Elisabeth Oswald, Joe Bandenburg, Marcin Wójcik, Does My Device Leak Information? An a priori Statistical Power Analysis of Leakage Detection Tests international cryptology conference. pp. 486- 505 ,(2013) , 10.1007/978-3-642-42033-7_25
Begül Bilgin, Andrey Bogdanov, Miroslav Knežević, Florian Mendel, Qingju Wang, Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware Cryptographic Hardware and Embedded Systems - CHES 2013. ,vol. 2015, pp. 142- 158 ,(2013) , 10.1007/978-3-642-40349-1_9
Itai Dinur, Jérémy Jean, Cryptanalysis of FIDES Fast Software Encryption. pp. 224- 240 ,(2015) , 10.1007/978-3-662-46706-0_12