SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition

Ashutosh Dhar Dwivedi, Miloš Klouček, Pawel Morawiecki, Ivica Nikolić, Josef Pieprzyk, Sebastian Wójtowicz

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

26 Citations (Scopus)

Abstract

We investigate six authenticated encryption schemes (ACORN, ASCON-128a, ICEPOLE-128a, Ketje Jr, MORUS, and NORX-32) from the CAESAR competition. We aim at state recovery attacks using a SAT solver as a main tool. Our analysis reveals that these schemes, as submitted to CAESAR, provide strong resistance against SAT-based state recoveries. To shed a light on their security margins, we also analyse modified versions of these algorithms, including round-reduced variants and versions with higher security claims. Our attacks on such variants require only a few known plaintext-ciphertext pairs and small memory requirements (to run the SAT solver), whereas time complexity varies from very practical (few seconds on a desktop PC) to 'theoretical' attacks.

Original languageEnglish
Title of host publicationSECRYPT
EditorsPierangela Samarati, Mohammad S. Obaidat, Enrique Cabello
Number of pages10
PublisherSCITEPRESS – Science and Technology Publications
Publication date2017
Pages237-246
ISBN (Electronic)9789897582592
DOIs
Publication statusPublished - 2017
Event14th International Joint Conference on e-Business and Telecommunications, ICETE 2017 - Madrid, Spain
Duration: 24 Jul 201726 Jul 2017

Conference

Conference14th International Joint Conference on e-Business and Telecommunications, ICETE 2017
Country/TerritorySpain
CityMadrid
Period24/07/201726/07/2017
SponsorInstitute for Systems and Technologies of Information, Control and Communication (INSTICC), Object Management Group (OMG), The Foundation for Intelligent Physical Agents (FIPA), Workflow Management Coalition (WfMC)
SeriesICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications
Volume4

Bibliographical note

Publisher Copyright:
Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.

Keywords

  • Authenticated Encryption
  • CAESAR
  • Logic Cryptanalysis
  • SAT Solvers
  • SAT-based Cryptanalysis

Fingerprint

Dive into the research topics of 'SAT-based cryptanalysis of authenticated ciphers from the CAESAR competition'. Together they form a unique fingerprint.

Cite this