首页> 外文会议>International conference on information security practice and experience >Collision Attacks on CAESAR Second-Round Candidate: ELmD
【24h】

Collision Attacks on CAESAR Second-Round Candidate: ELmD

机译:对CAESAR第二回合候选人的碰撞攻击:ELmD

获取原文

摘要

In this paper, we study the security of the algorithm ELmD, which is a second-round candidate of the ongoing CAESAR competition for authenticated encryption. ELmD is a well designed algorithm providing misuse resistance and full parallelism with security up to birthday bound O(2~(n/2)). Our work gives some attacks with complexity around birthday bound, which do not violate the provable security, but is still meaningful for academic interest and comprehensive understanding of the security of the algorithm. In our work, we first show how to recover the secret masking values with birthday bound complexity when the length of associated data is either variable or fixed, and then present a plaintext recovery attack after knowing the masks, which breaks the security claim of the designers for 128-bit security against plaintext recovery attack. Furthermore, we give an existential forgery attack by constructing two colliding associated data and present an almost universal forgery attack when two consecutive ciphertext blocks are equal. Finally, since 4-round AES is always used as the underlying primitives for provable security with at least 25 active S-boxes, we concern about the security of ELmD(4,4) by providing a differential attack using a differential trail with high probability, to recover the key with time complexity between 2~(106) and 2~(109). Although the key recovery attack is largely constrained by the data limitation, it shows some security property of the reduced-round algorithm.
机译:在本文中,我们研究了算法ELmD的安全性,该算法是正在进行的CAESAR竞争经过身份验证的加密的第二轮候选者。 ELmD是一种经过精心设计的算法,可提供耐滥用性和完全并行性,并具有高达生日限制O(2〜(n / 2))的安全性。我们的工作提出了一些在生日前后复杂的攻击,这些攻击没有违反可证明的安全性,但是对于学术兴趣和对算法安全性的全面理解仍然有意义。在我们的工作中,我们首先展示如何在关联数据的长度为可变或固定的情况下,以生日限制的复杂度来恢复秘密掩码值,然后在知道掩码之后提出明文恢复攻击,这打破了设计者的安全性主张。用于针对明文恢复攻击的128位安全性。此外,我们通过构造两个冲突的关联数据来进行存在的伪造攻击,并在两个连续的密文块相等时提出几乎通用的伪造攻击。最后,由于4轮AES始终被用作具有至少25个活动S-box的可证明安全性的基础原语,因此我们通过使用具有高概率的差分路径提供差分攻击来关注ELmD(4,4)的安全性,以恢复密钥,其时间复杂度在2〜(106)和2〜(109)之间。尽管密钥恢复攻击在很大程度上受数据限制的约束,但它显示了缩减轮算法的某些安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号