首页> 外文会议>International Conference on Information Security Practice and Experience >Collision Attacks on CAESAR Second-Round Candidate: ELmD
【24h】

Collision Attacks on CAESAR Second-Round Candidate: ELmD

机译:Caesar第二轮候选人的碰撞攻击:ELMD

获取原文

摘要

In this paper, we study the security of the algorithm ELmD, which is a second-round candidate of the ongoing CAESAR competition for authenticated encryption. ELmD is a well designed algorithm providing misuse resistance and full parallelism with security up to birthday bound O(2~(n/2)). Our work gives some attacks with complexity around birthday bound, which do not violate the provable security, but is still meaningful for academic interest and comprehensive understanding of the security of the algorithm. In our work, we first show how to recover the secret masking values with birthday bound complexity when the length of associated data is either variable or fixed, and then present a plaintext recovery attack after knowing the masks, which breaks the security claim of the designers for 128-bit security against plaintext recovery attack. Furthermore, we give an existential forgery attack by constructing two colliding associated data and present an almost universal forgery attack when two consecutive ciphertext blocks are equal. Finally, since 4-round AES is always used as the underlying primitives for provable security with at least 25 active S-boxes, we concern about the security of ELmD(4,4) by providing a differential attack using a differential trail with high probability, to recover the key with time complexity between 2~(106) and 2~(109). Although the key recovery attack is largely constrained by the data limitation, it shows some security property of the reduced-round algorithm.
机译:在本文中,我们研究了eLMD算法的安全性,这是持续的凯撒竞争的第二轮候选者,用于经过身份验证的加密。 ELMD是一种设计精心设计的算法,提供滥用阻力和完全并行性,其安全到生日绑定O(2〜(n / 2))。我们的工作围绕生日界定的复杂性攻击,不会违反可提供的安全性,但对学术兴趣和对算法安全的全面了解仍然有意义。在我们的工作中,我们首先展示如何使用生日绑定复杂度恢复秘密掩蔽值,当相关数据的长度是可变的或固定的时,然后在知道掩码后呈现明文恢复攻击,这违反了设计人员的安全索赔对于针对明文恢复攻击的128位安全性。此外,我们通过构建两个碰撞相关数据并在两个连续的密文块相等时提供一个碰撞相关数据并呈现几乎通用的伪造攻击。最后,由于4轮AES始终用作可提供的可提供安全性的底层基元,并且至少有25个活动的S盒,我们通过使用具有高概率的差异迹线提供差异攻击来关注ELMD(4,4)的安全性,在2〜(106)和2〜(109)之间的时间复杂度恢复键。虽然密钥恢复攻击在很大程度上受到数据限制的限制,但它显示了缩小算法的一些安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号