Cryptanalysis of JAMBU

نویسندگان

  • Thomas Peyrin
  • Siang Meng Sim
  • Lei Wang
  • Guoyan Zhang
چکیده

In this article, we analyse the security of the authenticated encryption mode JAMBU, a submission to the CAESAR competition that remains currently unbroken. We show that the security claims of this candidate regarding its nonce-misuse resistance can be broken. More precisely, we explain a technique to guess in advance a ciphertext block corresponding to a plaintext that has never been queried before (nor its prefix), thus breaking the confidentiality of the scheme when the attacker can make encryption queries with the same nonce. Our attack is very practical as it requires only about 2 encryption queries and computations (instead of the 2 claimed by the designers). Our cryptanalysis has been fully implemented in order to verify our findings. Moreover, due to the small tag length of JAMBU, we show how this attack can be extended in the nonce-respecting scenario to break confidentiality in the adaptative chosen-ciphertext model (IND-CCA2) with 2 computations, with message prefixes not previously queried.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases

JAMBU is an AEAD mode of operation which entered the third round of CAESAR competition. However, it does not have a security proof like other modes of operation do, and there was a cryptanalysis result that has overthrown the security claim under nonce misuse case by the designers. In this paper, we complement the shortage of the scheme by giving security proofs of JAMBU both under nonce respec...

متن کامل

JAMBU Lightweight Authenticated Encryption Mode and AES-JAMBU

In this paper, we propose a lightweight authenticated encryption mode JAMBU. It only needs n-bit extra register for a block cipher with 2n-bit block size. It achieves n-bit authentication security when 2 bits are processed under a single key. When nonce (IV) is reused, the encryption security is similar to that of the CFB mode while the message authentication maintains strong security. We insta...

متن کامل

Guava (Psidium guajava) | Feedipedia

Guava, common guava, yellow guava [English]; goyavier, goyave [French]; goiaba, guaiaba, guaiava, goiabeira, goiabeiro, araça-goiaba, araça-guaçu [Portuguese]; guayaba, guayabo, guayaba manzana [Spanish]; koejawel [Afrikaans]; guave [Dutch]; Echte Guave [German]; gweba [Hausa]; jambu batu, jambu biji [Indonesian]; guaiava [Italian]; jambu kluthuk [Javanese]; amapera [Kinyarwanda]; mpera [Kiswah...

متن کامل

Development and Evaluation of a Novel Mucoadhesive Film Containing Acmella oleracea Extract for Oral Mucosa Topical Anesthesia

PURPOSE To develop an anesthetic mucoadhesive film containing Acmella oleracea (jambu) extract for topical use on oral mucosa. METHODS Ethanolic extracts from aerial parts of jambu were prepared by maceration. Pigment removal was obtained by adsorption with activated carbon. Three mucoadhesive films were developed using a film casting method: 10 or 20% of crude jambu extract (10% JB and 20% J...

متن کامل

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2014  شماره 

صفحات  -

تاریخ انتشار 2014