Understanding RUP Integrity of COLM
نویسندگان
چکیده
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM structure when unverified plaintext is released, and demonstrate that its security highly depends on the choice of mixing function. Our results are threefold. First, we discuss the practical nonce-respecting forgery by Andreeva et al. (ASIACRYPT 2014) against COPA’s XOR mixing. Then we present a noncemisusing forgery against arbitrary mixing functions with practical time complexity. Finally, by using significantly larger queries, we can extend the previous forgery to be nonce-respecting.
منابع مشابه
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
Authenticated encryption schemes are important cryptographic primitives that received extensive attention recently. They can provide both confidentiality and authenticity services, simultaneously. Correlation power analysis (CPA) can be a thread for authenticated ciphers, similar to the any physical implementation of any other cryptographic scheme. In this paper, a three-step CPA attack against...
متن کاملThe INT-RUP Security of OCB with Intermediate (Parity) Checksum
OCB is neither integrity under releasing unvierified plaintext (INT-RUP) nor nonce-misuse resistant. The tag of OCB is generated by encrypting plaintext checksum, which is vulnerable in the INT-RUP security model. This paper focuses on the weakness of the checksum processing in OCB. We describe a new notion, called plaintext or ciphertext checksum (PCC), which is a generalization of plaintext c...
متن کاملColicin M, a peptidoglycan lipid-II-degrading enzyme: potential use for antibacterial means?
Colicins are proteins produced by some strains of Escherichia coli to kill competitors belonging to the same species. Among them, ColM (colicin M) is the only one that blocks the biosynthesis of peptidoglycan, a specific bacterial cell-wall polymer essential for cell integrity. ColM acts in the periplasm by hydrolysing the phosphoester bond of the peptidoglycan lipid intermediate (lipid II). Co...
متن کاملMapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملEffects of Rumen Undegradable Protein on Productive Performance and N Balance of Holstein Cows in Early Post-Partum Period
Metabolizable protein (MP) supply and amino acid balance were manipulated through selection of highly digestible rumen-undegradable protein (RUP) sources. Effects on production efficiency and N utilization of early post-partum dairy cows were determined. Forty-two multiparous and 16 primiparous Holstein cows were assigned to the diets in a randomized complete block design immediately after part...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2017 شماره
صفحات -
تاریخ انتشار 2017