CryptoDB
Nicky Mouha
Publications
Year
Venue
Title
2023
TOSC
Key Committing Security of AEZ and More
Abstract
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refers to the security notion of whether the adversary can produce a pair of distinct input tuples, including the key, that result in the same output. While the key committing security of various nonce-based AEAD schemes is known, the security analysis of Robust AE (RAE) is largely unexplored. In particular, we are interested in the key committing security of AEAD schemes built on the Encode-then-Encipher (EtE) approach from a wide block cipher. We first consider AEZ v5, the classical and the first dedicated RAE that employs the EtE approach. We focus our analysis on the core part of AEZ to show our best attacks depending on the length of the ciphertext expansion. In the general case where the Tweakable Block Cipher (TBC) is assumed to be ideal, we show a birthday attack and a matching provable security result. AEZ adopts a simpler key schedule and the prove-then-prune approach in the full specification, and we show a practical attack against it by exploiting the simplicity of the key schedule. The complexity is 227, and we experimentally verify the correctness with a concrete example. We also cover two AEAD schemes based on EtE. One is built on Adiantum, and the other one is built on HCTR2, which are two wide block ciphers that are used in real applications. We present key committing attacks against these schemes when used in EtE and matching proofs for particular cases.
2022
TOSC
Revisiting the Extension of Matsui’s Algorithm 1 to Linear Hulls: Application to TinyJAMBU
Abstract
At EUROCRYPT ’93, Matsui introduced linear cryptanalysis. Both Matsui’s Algorithm 1 and 2 use a linear approximation involving certain state bits. Algorithm 2 requires partial encryptions or decryptions to obtain these state bits after guessing extra key bits. For ciphers where only part of the state can be obtained, like some stream ciphers and authenticated encryption schemes, Algorithm 2 will not work efficiently since it is hard to implement partial encryptions or decryptions. In this case, Algorithm 1 is a good choice since it only involves these state bits, and one bit of key information can be recovered using a single linear approximation trail. However, when there are several strong trails containing the same state bits, known as the linear hull effect, recovering key bits with Algorithm 1 is infeasible. To overcome this, Röck and Nyberg extended Matsui’s Algorithm 1 to linear hulls. However, Röck and Nyberg found that their theoretical estimates are quite pessimistic for low success probabilities and too optimistic for high success probabilities. To deal with this, we construct new statistical models where the theoretical success probabilities are in a good accordance with experimental ones, so that we provide the first accurate analysis of the extension of Matsui’s Algorithm 1 to linear hulls. To illustrate the usefulness of our new models, we apply them to one of the ten finalists of the NIST Lightweight Cryptography (LWC) Standardization project: TinyJAMBU. We provide the first cryptanalysis under the nonce-respecting setting on the full TinyJAMBU v1 and the round-reduced TinyJAMBU v2, where partial key bits are recovered. Our results do not violate the security claims made by the designers.
2021
TOSC
Maximums of the Additive Differential Probability of Exclusive-Or
📺
Abstract
At FSE 2004, Lipmaa et al. studied the additive differential probability adp⊕(α,β → γ) of exclusive-or where differences α,β,γ ∈ Fn2 are expressed using addition modulo 2n. This probability is used in the analysis of symmetric-key primitives that combine XOR and modular addition, such as the increasingly popular Addition-Rotation-XOR (ARX) constructions. The focus of this paper is on maximal differentials, which are helpful when constructing differential trails. We provide the missing proof for Theorem 3 of the FSE 2004 paper, which states that maxα,βadp⊕(α,β → γ) = adp⊕(0,γ → γ) for all γ. Furthermore, we prove that there always exist either two or eight distinct pairs α,β such that adp⊕( α,β → γ) = adp⊕(0,γ → γ), and we obtain recurrence formulas for calculating adp⊕. To gain insight into the range of possible differential probabilities, we also study other properties such as the minimum value of adp⊕(0,γ → γ), and we find all γ that satisfy this minimum value.
2012
FSE
Program Committees
- FSE 2023
- FSE 2022
- FSE 2020
- FSE 2019
Coauthors
- Danil Akhtiamov (1)
- Elena Andreeva (2)
- Ritam Bhaumik (1)
- Begül Bilgin (1)
- Andrey Bogdanov (2)
- Tatiana Bonich (1)
- Christophe De Cannière (1)
- Christophe De Cannière (1)
- Yu Long Chen (1)
- Nilanjan Datta (1)
- Avijit Dutta (1)
- Antonio Flórez-Gutiérrez (1)
- Shay Gueron (1)
- Akiko Inoue (1)
- Evgeniya Ishchukova (1)
- Ryoma Ito (1)
- Tetsu Iwata (1)
- Nikolay Kolomeec (1)
- Muzhou Li (1)
- Atul Luykx (3)
- Bart Mennink (2)
- Kazuhiko Minematsu (1)
- Nicky Mouha (10)
- Yusuke Naito (1)
- Mridul Nandi (1)
- Matvey Panferov (1)
- Bart Preneel (2)
- Ferdinand Sibleyras (1)
- Ling Sun (1)
- Ivan Sutormin (1)
- Kseniya Titova (1)
- Yosuke Todo (1)
- Natalia Tokareva (1)
- Vesselin Velichkov (2)
- Meiqin Wang (1)
- Kan Yasuda (2)
- Bulat Zhantulikov (1)