loading
Documents

Research.Publish.Connect.

Paper

Authors: Ashutosh Dhar Dwivedi 1 ; Miloš Klouček 2 ; Paweł Morawiecki 1 ; Ivica Nikolić 3 ; Josef Pieprzyk 4 and Sebastian Wójtowicz 1

Affiliations: 1 Polish Academy of Sciences, Poland ; 2 Charles University in Prague, Czech Republic ; 3 Nanyang Technological University, Singapore ; 4 Polish Academy of Sciences and Queensland University of Technology, Poland

ISBN: 978-989-758-259-2

Keyword(s): SAT Solvers, SAT-based Cryptanalysis, Logic Cryptanalysis, Authenticated Encryption, CAESAR.

Related Ontology Subjects/Areas/Topics: Applied Cryptography ; Cryptographic Techniques and Key Management ; Data Engineering ; Databases and Data Security ; Formal Methods for Security ; Identification, Authentication and Non-Repudiation ; Information and Systems Security

Abstract: We investigate six authenticated encryption schemes (ACORN, ASCON-128a, ICEPOLE-128a, Ketje Jr, MORUS, and NORX-32) from the CAESAR competition. We aim at state recovery attacks using a SAT solver as a main tool. Our analysis reveals that these schemes, as submitted to CAESAR, provide strong resistance against SAT-based state recoveries. To shed a light on their security margins, we also analyse modified versions of these algorithms, including round-reduced variants and versions with higher security claims. Our attacks on such variants require only a few known plaintext-ciphertext pairs and small memory requirements (to run the SAT solver), whereas time complexity varies from very practical (few seconds on a desktop PC) to ‘theoretical’ attacks.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.162.159.33

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Dwivedi A., Klouček M., Morawiecki P., Nikolić I., Pieprzyk J. and Wójtowicz S. (2017). SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition.In Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017) ISBN 978-989-758-259-2, pages 237-246. DOI: 10.5220/0006387302370246

@conference{secrypt17,
author={Ashutosh Dhar Dwivedi and Miloš Klouček and Paweł Morawiecki and Ivica Nikolić and Josef Pieprzyk and Sebastian Wójtowicz},
title={SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition},
booktitle={Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)},
year={2017},
pages={237-246},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006387302370246},
isbn={978-989-758-259-2},
}

TY - CONF

JO - Proceedings of the 14th International Joint Conference on e-Business and Telecommunications - Volume 6: SECRYPT, (ICETE 2017)
TI - SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition
SN - 978-989-758-259-2
AU - Dwivedi A.
AU - Klouček M.
AU - Morawiecki P.
AU - Nikolić I.
AU - Pieprzyk J.
AU - Wójtowicz S.
PY - 2017
SP - 237
EP - 246
DO - 10.5220/0006387302370246

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.