Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm

被引:3
|
作者
Bay, Asli [1 ]
Ersoy, Oguzhan [2 ]
Karakoc, Ferhat [1 ]
机构
[1] TUBITAK BILGEM, Gebze, Turkey
[2] Bogazici Univ, Elect & Elect Engn Dept, Istanbul, Turkey
关键词
Authenticated encryption; CAESAR; ELmD; Forgery attack; Key recovery;
D O I
10.1007/978-3-662-53887-6_13
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide misuse resistant against forgeries and security against block-wise adaptive adversaries as well as 128-bit security against key recovery attacks. We scrutinize ElmD in such a way that we provide universal forgery attacks as well as key recovery attacks. First, based on the collision attacks on similar structures such as Marble, AEZ, and COPA, we present universal forgery attacks. Second, by exploiting the structure of ELmD, we acquire ability to query to the block cipher used in ELmD. Finally, for one of the proposed versions of ELmD, we mount key recovery attacks reducing the effective key strength by more than 60 bits.
引用
收藏
页码:354 / 368
页数:15
相关论文
共 50 条
  • [1] Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms
    Lu, Jiqiang
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 789 - 799
  • [2] Key recovery and forgery attacks on the MacDES MAC algorithm
    Coppersmith, D
    Knudsen, LR
    Mitchell, CJ
    [J]. ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 184 - 196
  • [3] Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM
    Ulusoy, Sirri Erdem
    Kara, Orhun
    Efe, Mehmet Onder
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 70
  • [4] ELmD: A Pipelineable Authenticated Encryption and Its Hardware Implementation
    Bossuet, Lilian
    Datta, Nilanjan
    Mancillas-Lopez, Cuauhtemoc
    Nandi, Mridul
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (11) : 3318 - 3331
  • [5] Key Recovery Attacks on Recent Authenticated Ciphers
    Bogdanov, Andrey
    Dobraunig, Christoph
    Eichlseder, Maria
    Lauridsen, Martin M.
    Mendel, Florian
    Schlaeffer, Martin
    Tischhauser, Elmar
    [J]. PROGRESS IN CRYPTOLOGY - LATINCRYPT 2014, 2015, 8895 : 274 - 287
  • [6] Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
    Yinsong Xu
    Wenjie Liu
    Wenbin Yu
    [J]. Quantum Information Processing, 2021, 20
  • [7] Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms
    Xu, Yinsong
    Liu, Wenjie
    Yu, Wenbin
    [J]. QUANTUM INFORMATION PROCESSING, 2021, 20 (04)
  • [8] Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
    Wu, Shengbao
    Wu, Hongjun
    Huang, Tao
    Wang, Mingsheng
    Wu, Wenling
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 377 - 404
  • [9] Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security
    Takeuchi, Ryunouchi
    Todo, Yosuke
    Iwata, Tetsu
    [J]. IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2024, 2024 (02) : 85 - 117
  • [10] Public key authenticated searchable encryption against frequency analysis attacks
    Cheng, Leixiao
    Meng, Fei
    [J]. INFORMATION SCIENCES, 2023, 640