Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

被引:0
|
作者
Niknam, Majid M. [1 ]
Sadeghi, Sadegh [1 ]
Aref, Mohammad Reza [2 ]
Bagheri, Nasour [3 ,4 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Dept Math, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[3] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[4] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
基金
美国国家科学基金会;
关键词
NIST lightweight cryptography competition; Preimage attack; Integrity; Confidentiality; Key recovery; MILP;
D O I
10.22042/ISECURE.2020.199099.480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi, which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively, and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respectively. We show that the security bounds for some variants of its hash and AEAD are less than the designers' claims. For example, the designers' security claim of the preimage attack for a hash function when the rate is 128 bits, and the capacity is 256 bits, is 2(256). However, we show that the security of preimage for this parameter set is 2(128). Also, the designer claimed security of confidentiality for an AEAD, when the rate is 8 bits, and the capacity is 224 bits, is 2(116). However, we show the security of confidentiality for it is 2(112). We also investigate the structure of the permutation used in InGAGE and present an attack to recover the key for reduced rounds of a variant of InGAGE. In an instance of AEAD of InGAGE, when the rate is 8 bits and the capacity is 224 bits, we recover the key when the number of the composition of the main permutation with itself, i.e., r(1), is less than 8. We also show that CiliPadi is vulnerable to the length extension attack by presenting concrete examples of forged messages. (C) 2020 ISC. All rights reserved.
引用
收藏
页码:13 / 23
页数:11
相关论文
共 50 条
  • [31] On the role of V1 in avoiding obstacles
    Hesse, Constanze
    Billino, Jutta
    Schenk, Thomas
    CORTEX, 2018, 98 : 276 - 282
  • [32] Color contrast in macaque V1
    Conway, BR
    Hubel, DH
    Livingstone, MS
    CEREBRAL CORTEX, 2002, 12 (09) : 915 - 925
  • [34] On the Emergence of Orientation Biases in V1
    Shirazi, Mehdil Nouri
    ADVANCES IN COGNITIVE NEURODYNAMICS, PROCEEDINGS, 2008, : 31 - 35
  • [35] In V1, attending is not learning to see
    Jahn, Caroline, I
    Buschman, Timothy J.
    NEURON, 2022, 110 (04) : 561 - 563
  • [36] Contextual and predictive coding in V1
    Muckli, Lars
    I-PERCEPTION, 2011, 2 (04): : 339 - 339
  • [37] “V1”速度的浅析
    魏猛
    中外企业家, 2017, (17) : 176 - 176
  • [38] Dependence of latency on contrast in V1
    Richmond, B. J.
    PERCEPTION, 2006, 35 : 122 - 122
  • [39] STRUCTURE OF V1 CENTER IN KCL
    KELLER, FJ
    PATTEN, FW
    BULLETIN OF THE AMERICAN PHYSICAL SOCIETY, 1969, 14 (03): : 325 - &
  • [40] The role of V1 in shape representation
    Lee, TS
    Mumford, D
    Zhu, SC
    Lamme, VAF
    COMPUTATIONAL NEUROSCIENCE: TRENDS IN RESEARCH, 1997, 1997, : 697 - 703