Truncated, Impossible, and Improbable Differential Analysis of ASCON

نویسنده

  • Cihangir Tezcan
چکیده

ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition for Authenticated Encryption: Security, Applicability, and Robustness. So far, successful differential, differential-linear, and cube-like attacks on the reduced-round ASCON are provided. In this work, we provide the inverse of ASCON’s linear layer in terms of rotations which can be used for constructing impossible differentials. We show that ASCON’s S-box contains 35 undisturbed bits and we use them to construct 4 and 5round truncated, impossible, and improbable differential distinguishers. Our results include practical 4-round truncated, impossible, and improbable differential attacks on ASCON. Our best attacks using these techniques break 5 out of 12 rounds. These are the first successful truncated, impossible, and improbable differential attacks on the reduced-round ASCON.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improbable differential attacks on Present using undisturbed bits

1 Statistical attacks on block ciphers make use of a property of the cipher so that an incident occurs with different probabilities depending on whether the correct key is used or not. For instance, differential cryptanalysis [1] considers characteristics or differentials which show that a particular output difference should be obtained with a relatively high probability when a particular input...

متن کامل

Improbable Differential from Impossible Differential: On the Validity of the Model

Differentials with low probability are used in improbable differential cryptanalysis to distinguish a cipher from a random permutation. Due to large diffusion, finding such differentials for actual ciphers remains a challenging task. At Indocrypt 2010, Tezcan proposed a method to derive improbable differential distinguishers from impossible differential ones. In this paper, we discuss the valid...

متن کامل

Cryptanalysis of Ascon

We present a detailed security analysis of the CAESAR candidate Ascon. Amongst others, cube-like, differential and linear cryptanalysis are used to evaluate the security of Ascon. Our results are practical key-recovery attacks on round-reduced versions of Ascon-128, where the initialization is reduced to 5 out of 12 rounds. Theoretical keyrecovery attacks are possible for up to 6 rounds of init...

متن کامل

Three-dimensional Magneto-thermo-elastic Analysis of Functionally Graded Truncated Conical Shells

This work deals with the three-dimensional magneto-thermo-elastic problem of a functionally graded truncated conical shell under non-uniform internal pressure and subjected to magnetic and thermal fields. The material properties are assumed to obey the power law form that depends on the thickness coordinate of the shell. The formulation of the problem begins with the derivation of fundamental r...

متن کامل

Free Vibration Analysis of Continuously Graded Fiber Reinforced Truncated Conical Shell Via Third-Order Shear Deformation Theory

This paper deals with free vibration analysis of continuously graded fiber reinforced (CGFR) truncated conical shell based on third-order shear deformation theory (TSDT), by developing special power-law distributions. The orthotropic (CGFR) truncated conical shell are clamped and simply supported at the both ends. It is assumed to have a smooth variation of fibers volume fraction in the thickne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2016  شماره 

صفحات  -

تاریخ انتشار 2016