Abstract
We investigate six authenticated encryption schemes (ACORN, ASCON-128a, ICEPOLE-128a, Ketje Jr, MORUS, and NORX-32) from the CAESAR competition. We aim at state recovery attacks using a SAT solver as a main tool. Our analysis reveals that these schemes, as submitted to CAESAR, provide strong resistance against SAT-based state recoveries. To shed a light on their security margins, we also analyse modified versions of these algorithms, including round-reduced variants and versions with higher security claims. Our attacks on such variants require only a few known plaintext-ciphertext pairs and small memory requirements (to run the SAT solver), whereas time complexity varies from very practical (few seconds on a desktop PC) to 'theoretical' attacks.
Original language | English |
---|---|
Title of host publication | SECRYPT |
Editors | Pierangela Samarati, Mohammad S. Obaidat, Enrique Cabello |
Number of pages | 10 |
Publisher | SCITEPRESS – Science and Technology Publications |
Publication date | 2017 |
Pages | 237-246 |
ISBN (Electronic) | 9789897582592 |
DOIs | |
Publication status | Published - 2017 |
Event | 14th International Joint Conference on e-Business and Telecommunications, ICETE 2017 - Madrid, Spain Duration: 24 Jul 2017 → 26 Jul 2017 |
Conference
Conference | 14th International Joint Conference on e-Business and Telecommunications, ICETE 2017 |
---|---|
Country/Territory | Spain |
City | Madrid |
Period | 24/07/2017 → 26/07/2017 |
Sponsor | Institute for Systems and Technologies of Information, Control and Communication (INSTICC), Object Management Group (OMG), The Foundation for Intelligent Physical Agents (FIPA), Workflow Management Coalition (WfMC) |
Series | ICETE 2017 - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications |
---|---|
Volume | 4 |
Bibliographical note
Publisher Copyright:Copyright © 2017 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
Keywords
- Authenticated Encryption
- CAESAR
- Logic Cryptanalysis
- SAT Solvers
- SAT-based Cryptanalysis