首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Nonlinear Invariant Attack Practical Attack on Full SCREAM, iSCREAM, and Midori64
【24h】

Nonlinear Invariant Attack Practical Attack on Full SCREAM, iSCREAM, and Midori64

机译:非线性不变攻击实际攻击完整尖叫,iscream和midori64

获取原文

摘要

In this paper we introduce a new type of attack, called nonlinear invariant attack. As application examples, we present new attacks that are able to distinguish the full versions of the (tweakable) block ciphers Scream, iScream and Midori64 in a weak-key setting. Those attacks require only a handful of plaintext-ciphertext pairs and have minimal computational costs. Moreover, the nonlinear invariant attack on the underlying (tweakable) block cipher can be extended to a ciphertext-only attack in well-known modes of operation such as CBC or CTR. The plaintext of the authenticated encryption schemes SCREAM and iSCREAM can be practically recovered only from the ciphertexts in the nonce-respecting setting. This is the first result breaking a security claim of SCREAM. Moreover, the plaintext in Midori64 with well-known modes of operation can practically be recovered. All of our attacks are experimentally verified.
机译:在本文中,我们介绍了一种新型的攻击,称为非线性不变攻击。作为应用示例,我们呈现了能够区分(可调节)块Ciphers,Iscream和Midori64的完整版本的新攻击。这些攻击只需要少数普照文本 - 密文对并且具有最小的计算成本。此外,对底层(可调节)块密码的非线性不变攻击可以扩展到仅众所周知的操作模式(如CBC或CTR)的密封攻击。验证的加密方案的明文呼声声和Iscream只能从非扩展设置中的密文中恢复。这是第一个结果突破尖叫的安全主张。此外,实际上可以恢复具有众所周知的操作模式的Midori64中的明文。我们所有的攻击都是通过实验验证的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号