Improved Differential and Linear Trail Bounds for ASCON

نویسندگان

چکیده

Ascon is a family of cryptographic primitives for authenticated encryption and hashing introduced in 2015. It selected as one the ten finalists NIST Lightweight Cryptography competition. Since its introduction, has been extensively cryptanalyzed, results these analyses can indicate good resistance this against known attacks, like differential linear cryptanalysis.Proving upper bounds probability trails squared correlation standard requirement to evaluate security primitives. be done analytically some AES. For other primitives, computer assistance required prove strong trails. Computer-aided tools classified into two categories: based on general-purpose solvers dedicated tools. General-purpose such SAT MILP are widely used bounds, however they seem have lower capabilities thus yield less powerful compared tools.In work, we present tool trail search Ascon. We arrange 2-round tree traverse an efficient way using number new techniques introduce. Then extend more rounds, where also use traversal technique do it efficiently. This allows us scan much larger spaces faster than previous methods solvers. As result, tight 3-rounds trails, both improve existing rounds. In particular, first time, beyond 2−128 6 rounds 2−256 12

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia

We discuss the security of the block cipher Camellia against differential attack and linear attack. The security of Camellia against these attacks has been evaluated by upper bounds of maximum differential characteristic probability (MDCP) and maximum linear characteristic probability (MLCP) calculated by the least numbers of active S-boxes which are found by a search method[2]. However, we fou...

متن کامل

Improved Bounds for 3SUM, k-SUM, and Linear Degeneracy

Given a set of n real numbers, the 3SUM problem is to decide whether there are three of them that sum to zero. Until a recent breakthrough by Grønlund and Pettie [FOCS’14], a simple Θ(n2)-time deterministic algorithm for this problem was conjectured to be optimal. Over the years many algorithmic problems have been shown to be reducible from the 3SUM problem or its variants, including the more g...

متن کامل

Truncated, Impossible, and Improbable Differential Analysis of ASCON

ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition for Authenticated Encryption: Security, Applicability, and Robustness. So far, successful differential, differential-linear, and cube-like attacks on the reduced-round ASCON are provided. In this work, we provide the inverse of ASCON’s linear layer in terms of rotations which can b...

متن کامل

Improved Lower Bounds for Tree-Like Resolution over Linear Inequalities

We continue a study initiated by Kraj́ıček of a Resolutionlike proof system working with clauses of linear inequalities, R(CP). For all proof systems of this kind Kraj́ıček proved in [1] an exponential lower bound of the form: exp(n) MO(W log2 n) , where M is the maximal absolute value of coefficients in a given proof and W is the maximal clause width. In this paper we improve this lower bound. F...

متن کامل

Improved Lower Bounds for Resolution over Linear Inequalities

We continue a study initiated by Kraj́ıček of a Resolutionlike proof system working with clauses of linear inequalities, R(CP). For all proof systems of this kind Kraj́ıček proved in [1] an exponential lower bound of the form: exp(n) MO(W log 2 n) , where M is the maximal absolute value of coefficients in a given proof and W is the maximal clause width. In this paper we improve this lower bound f...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transaction on symmetric cryptology

سال: 2022

ISSN: ['2519-173X']

DOI: https://doi.org/10.46586/tosc.v2022.i4.145-178