STRIBOB / WHIRLBOB Security Analysis Addendum

نویسنده

  • Markku-Juhani O. Saarinen
چکیده

This memo collects references to published cryptanalytic results which are directly relevant to the security evaluation of CAESAR first round algorithm STRIBOB and its second round tweaked variant, WHIRLBOB. During the first year after initial publication of STRIBOB and WHIRLBOB, no cryptanalytic breaks or other serious issues have emerged. The main difference in the security between the two variants is that WHIRLBOB allows easier creation of constanttime software implementations resistant to cache timing attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation

Authenticated encryption algorithms protect both the confidentiality and integrity of messages in a single processing pass. In this note we show how to utilize the L◦P ◦S transform of the Russian GOST R 34.11-2012 standard hash “Streebog” to build an efficient, lightweight algorithm for Authenticated Encryption with Associated Data (AEAD) via the Sponge construction and BLNK padding. The propos...

متن کامل

Information Security Oversight Office

This report provides infOlmation on the cost estimates of the security classification program as required by Executive Order 12958, as amended, "Classified National Security lnformation." [t provides statistics and analysis concellling key components of the system from 41 Executive branch agencies. It also contains cost infomlation with respect to industrial security in the private sector as re...

متن کامل

Looking Back: Addendum

The picture of computer and network security painted in my 2005 ACSAC paper was bleak. I learned at the conference that the situation is even bleaker than it seemed. We connect our most sensitive networks to less-secure networks using low-security products, creating high-value targets that are extremely vulnerable to sophisticated attack or subversion. Only systems of the highest security are s...

متن کامل

Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes

The Sponge function is known to achieve 2 security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2, 2} security bound, with κ the key length. Similarly, many CAESAR competition submissions are designed to comply with the classical 2 security bound. We show that Spongebased constructions for authenticated encryption ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015