Truncated, Impossible, and Improbable Differential Analysis of ASCON
نویسنده
چکیده
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition for Authenticated Encryption: Security, Applicability, and Robustness. So far, successful differential, differential-linear, and cube-like attacks on the reduced-round ASCON are provided. In this work, we provide the inverse of ASCON’s linear layer in terms of rotations which can be used for constructing impossible differentials. We show that ASCON’s S-box contains 35 undisturbed bits and we use them to construct 4 and 5round truncated, impossible, and improbable differential distinguishers. Our results include practical 4-round truncated, impossible, and improbable differential attacks on ASCON. Our best attacks using these techniques break 5 out of 12 rounds. These are the first successful truncated, impossible, and improbable differential attacks on the reduced-round ASCON.
منابع مشابه
Improbable differential attacks on Present using undisturbed bits
1 Statistical attacks on block ciphers make use of a property of the cipher so that an incident occurs with different probabilities depending on whether the correct key is used or not. For instance, differential cryptanalysis [1] considers characteristics or differentials which show that a particular output difference should be obtained with a relatively high probability when a particular input...
متن کاملImprobable Differential from Impossible Differential: On the Validity of the Model
Differentials with low probability are used in improbable differential cryptanalysis to distinguish a cipher from a random permutation. Due to large diffusion, finding such differentials for actual ciphers remains a challenging task. At Indocrypt 2010, Tezcan proposed a method to derive improbable differential distinguishers from impossible differential ones. In this paper, we discuss the valid...
متن کاملCryptanalysis of Ascon
We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds. Theoretical keyrecovery attacks are possible for up to 6 rounds of init...
متن کاملThree-dimensional Magneto-thermo-elastic Analysis of Functionally Graded Truncated Conical Shells
This work deals with the three-dimensional magneto-thermo-elastic problem of a functionally graded truncated conical shell under non-uniform internal pressure and subjected to magnetic and thermal fields. The material properties are assumed to obey the power law form that depends on the thickness coordinate of the shell. The formulation of the problem begins with the derivation of fundamental r...
متن کاملFree Vibration Analysis of Continuously Graded Fiber Reinforced Truncated Conical Shell Via Third-Order Shear Deformation Theory
This paper deals with free vibration analysis of continuously graded fiber reinforced (CGFR) truncated conical shell based on third-order shear deformation theory (TSDT), by developing special power-law distributions. The orthotropic (CGFR) truncated conical shell are clamped and simply supported at the both ends. It is assumed to have a smooth variation of fibers volume fraction in the thickne...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2016 شماره
صفحات -
تاریخ انتشار 2016