Analysis of the CAESAR Candidate Silver
نویسندگان
چکیده
In this paper, we present the first third-party cryptanalysis against the authenticated encryption scheme Silver. In high-level, Silver builds a tweakable block cipher by tweaking AES-128 with a dedicated method and performs a similar computation as OCB3 to achieve 128bit security for both of integrity and confidentiality in nonce-respecting model. Besides, by modifying the tag generation of OCB3, some robustness against nonce-repeating adversaries is claimed. We first present a forgery attack against 8 (out of 10) rounds with 2 blocks of queries in the nonce-respecting model. The attack exploits a weakness of the dedicated AES tweaking method of Silver. Then, we present several attacks in the nonce-repeating model. Those include 1) a forgery against full Silver with 2 blocks of queries which matches a conservative security claim by the designers, 2) a plaintext recovery against full Silver with a single query and 3) a key recovery against 8 rounds with 2 blocks of queries. In particular, the plaintext recovery breaks the security claim by the designers. Considering that the current best key recovery for plain AES-128 is up to seven rounds, Silver lowers the security margin of AES due to its tweaking method. The attacks have been partially implemented and experimentally verified.
منابع مشابه
A computational system to select candidate genes for complex human traits
MOTIVATION Identification of the genetic variation underlying complex traits is challenging. The wealth of information publicly available about the biology of complex traits and the function of individual genes permits the development of informatics-assisted methods for the selection of candidate genes for these traits. RESULTS We have developed a computational system named CAESAR that ranks ...
متن کاملCryptanalysis of some first round CAESAR candidates
ΑΕS _ CMCCv₁, ΑVΑLΑNCHEv₁, CLΟCv₁, and SILCv₁ are four candidates of the first round of CAESAR. CLΟCv₁ is presented in FSE 2014 and SILCv₁ is designed upon it with the aim of optimizing the hardware implementation cost. In this paper, structural weaknesses of these candidates are studied. We present distinguishing attacks against ΑES _ CMCCv₁ with the complexity of two queries and the success ...
متن کاملSAT-based cryptanalysis of ACORN
The CAESAR competition aims to provide a portfolio of authenticated encryption algorithms. SAT solvers represent powerful tools to verify automatically and efficiently (among others) the confidentiality and the authenticity of information claimed by cryptographic primitives. In this work, we study the security of the CAESAR candidate Acorn against a SAT-based cryptanalysis. We provide the first...
متن کاملEnhanced Antimicrobial Effect of Yeast Mediated Silver Nanoparticles Synthesized From Baker’s Yeast
In recent science Nanotechnology is a burning field for the researchers. To meet the requirements and growing technological demand, there is a need to develop an eco-friendly approach. In the present effort, the baker’s yeast (Saccharomyces cerevisiae) has been taken in order to assess its potential as putative candidate fungal genera for the transformation of silver nanoparticles. Silve...
متن کاملGreen Synthesis of Silver Nanoparticles using Bidens Frondosa Extract and their Tyrosinase Activity
Herbal nanoparticles gain lot of attention because of their pharmaceutical importance. The present study reports the eco-friendly synthesis, characterization and their tyrosinase activity of silver nanoparticles (AgNPs) using aqueous extract of Bidens frondosa. The appearance of brown color indicated the formation of B. frondosa AgNPs. The Formation of AgNPs was confirmed by UV–Vis spectroscopy...
متن کامل