STRIBOB / WHIRLBOB Security Analysis Addendum
نویسنده
چکیده
This memo collects references to published cryptanalytic results which are directly relevant to the security evaluation of CAESAR first round algorithm STRIBOB and its second round tweaked variant, WHIRLBOB. During the first year after initial publication of STRIBOB and WHIRLBOB, no cryptanalytic breaks or other serious issues have emerged. The main difference in the security between the two variants is that WHIRLBOB allows easier creation of constanttime software implementations resistant to cache timing attacks.
منابع مشابه
STRIBOB: Authenticated Encryption from GOST R 34.11-2012 LPS Permutation
Authenticated encryption algorithms protect both the confidentiality and integrity of messages in a single processing pass. In this note we show how to utilize the L◦P ◦S transform of the Russian GOST R 34.11-2012 standard hash “Streebog” to build an efficient, lightweight algorithm for Authenticated Encryption with Associated Data (AEAD) via the Sponge construction and BLNK padding. The propos...
متن کاملInformation Security Oversight Office
This report provides infOlmation on the cost estimates of the security classification program as required by Executive Order 12958, as amended, "Classified National Security lnformation." [t provides statistics and analysis concellling key components of the system from 41 Executive branch agencies. It also contains cost infomlation with respect to industrial security in the private sector as re...
متن کاملLooking Back: Addendum
The picture of computer and network security painted in my 2005 ACSAC paper was bleak. I learned at the conference that the situation is even bleaker than it seemed. We connect our most sensitive networks to less-secure networks using low-security products, creating high-value targets that are extremely vulnerable to sophisticated attack or subversion. Only systems of the highest security are s...
متن کاملAddendum: Pinto, M.; Gámez, N.; Fuentes, L.; Amor, M.; Horcas, J.M.; Ayala, I. Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks. Sensors 2015, 15, 5251–5280
متن کامل
Beyond 2 c/2 Security in Sponge-Based Authenticated Encryption Modes
The Sponge function is known to achieve 2 security, where c is its capacity. This bound was carried over to keyed variants of the function, such as SpongeWrap, to achieve a min{2, 2} security bound, with κ the key length. Similarly, many CAESAR competition submissions are designed to comply with the classical 2 security bound. We show that Spongebased constructions for authenticated encryption ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2015 شماره
صفحات -
تاریخ انتشار 2015