Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

被引:0
|
作者
Niknam, Majid M. [1 ]
Sadeghi, Sadegh [1 ]
Aref, Mohammad Reza [2 ]
Bagheri, Nasour [3 ,4 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Dept Math, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[3] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[4] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2020年 / 12卷 / 01期
基金
美国国家科学基金会;
关键词
NIST lightweight cryptography competition; Preimage attack; Integrity; Confidentiality; Key recovery; MILP;
D O I
10.22042/ISECURE.2020.199099.480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi, which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively, and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respectively. We show that the security bounds for some variants of its hash and AEAD are less than the designers' claims. For example, the designers' security claim of the preimage attack for a hash function when the rate is 128 bits, and the capacity is 256 bits, is 2(256). However, we show that the security of preimage for this parameter set is 2(128). Also, the designer claimed security of confidentiality for an AEAD, when the rate is 8 bits, and the capacity is 224 bits, is 2(116). However, we show the security of confidentiality for it is 2(112). We also investigate the structure of the permutation used in InGAGE and present an attack to recover the key for reduced rounds of a variant of InGAGE. In an instance of AEAD of InGAGE, when the rate is 8 bits and the capacity is 224 bits, we recover the key when the number of the composition of the main permutation with itself, i.e., r(1), is less than 8. We also show that CiliPadi is vulnerable to the length extension attack by presenting concrete examples of forged messages. (C) 2020 ISC. All rights reserved.
引用
收藏
页码:13 / 23
页数:11
相关论文
共 50 条
  • [21] “V1着V1着,V2P”的构式语块分析
    曾炜
    湖南科技大学学报(社会科学版), 2018, 21 (06) : 129 - 134
  • [22] HIGH-RESOLUTION IR LASER SPECTROSCOPY OF VANDERWAALS COMPLEXES IN SLIT SUPERSONIC JETS - OBSERVATION AND ANALYSIS OF V1, V1 + V2, AND V1 +2V3 IN ARHF
    LOVEJOY, CM
    SCHUDER, MD
    NESBITT, DJ
    JOURNAL OF CHEMICAL PHYSICS, 1986, 85 (09): : 4890 - 4902
  • [25] V1 as an egocentric cognitive map
    Linton, Paul
    NEUROSCIENCE OF CONSCIOUSNESS, 2021, 7 (02) : 1 - 19
  • [26] Security Analysis of Fountain V1
    Beighton, Matthew
    Bartlett, Harry
    Simpson, Leonie
    PROCEEDINGS OF THE AUSTRALASIAN COMPUTER SCIENCE WEEK MULTICONFERENCE (ACSW 2020), 2020,
  • [27] Neurogeometry of V1 and Kanizsa Contours
    Jean Petitot
    Axiomathes, 2003, 13 (3-4): : 347 - 363
  • [28] Surround suppression in primate V1
    Jones, HE
    Grieve, KL
    Wang, W
    Sillito, AM
    JOURNAL OF NEUROPHYSIOLOGY, 2001, 86 (04) : 2011 - 2028
  • [29] Linking V1 Activity to Behavior
    Seidemann, Eyal
    Geisler, Wilson S.
    ANNUAL REVIEW OF VISION SCIENCE, VOL 4, 2018, 4 : 287 - 310
  • [30] The "V1 continuum" in the athletes' ECG
    Diaz-Gonzalez, Leonel
    Bruna, Vanesa
    Velasquez-Rodriguez, Jesus
    Valenzuela, Pedro L.
    Jesus Valero-Masa, Maria
    Gonzalez-Saldivar, Hugo
    Martinez-Selles, Manuel
    Lucia, Alejandro
    Boraita, Araceli
    SCANDINAVIAN JOURNAL OF MEDICINE & SCIENCE IN SPORTS, 2020, 30 (11) : 2277 - 2278