Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
نویسندگان
چکیده
منابع مشابه
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
In this paper, we revisit meet-in-the-middle attacks on AES in the single-key model and improve on Dunkelman, Keller and Shamir attacks of Asiacrypt 2010. We present the best attack on 7 rounds of AES-128 where data/time/memory complexities are below 2. Moreover, we are able to extend the number of rounds to reach attacks on 8 rounds for both AES-192 and AES-256. This gives the best attacks on ...
متن کاملConditional Cube Attack on Round-Reduced ASCON
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. Ascon submitted by Dobraunig et al. is one of 16 survivors of the 3rd round CAESAR competition. The cube-like method is first used by Dinur et al. to analyze Keccak keyed modes. At CT-RSA 2015, Dobraunig et al. applied this method to 5/6-round reduced Ascon, whose structure is similar to Keccak key...
متن کاملRelated Key Attacks on Reduced Round KASUMI
This paper describes related key attacks on five and six round KASUMI. The five round attack requires the encryption of approximately 2 chosen plaintext pairs X and X∗ under keys K and K∗ respectively where K and K∗ differ in only one bit, and requires a maximum of a little over 2 trials to recover the entire key. The six round attack requires a smaller number of chosen plaintext encryptions th...
متن کاملCube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
CRYPTO 2008 saw the introduction of the hash function MD6 and of cube attacks, a type of algebraic attack applicable to cryptographic functions having a low-degree algebraic normal form over GF(2). This paper applies cube attacks to reduced round MD6, finding the full 128-bit key of a 14-round MD6 with complexity 2 (which takes less than a minute on a single PC). This is the best key recovery a...
متن کاملKey Recovery Attacks on 3-round Even-Mansour, 8-step LED-128, and Full AES2
The Even-Mansour (EM) encryption scheme received a lot of attention in the last couple of years due to its exceptional simplicity and tight security proofs. The original 1-round construction was naturally generalized into r-round structures with one key, two alternating keys, and completely independent keys. In this paper we describe the first key recovery attack on the one-key 3-round version ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR Transactions on Symmetric Cryptology
سال: 2021
ISSN: 2519-173X
DOI: 10.46586/tosc.v2021.i1.130-155