Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants

被引:0
|
作者
Niknam, Majid M. [1 ]
Sadeghi, Sadegh [1 ]
Aref, Mohammad Reza [2 ]
Bagheri, Nasour [3 ,4 ]
机构
[1] Kharazmi Univ, Fac Math Sci & Comp, Dept Math, Tehran, Iran
[2] Sharif Univ Technol, Dept Elect Engn, Tehran, Iran
[3] Shahid Rajaee Teacher Training Univ, Elect Engn Dept, Tehran 1678815811, Iran
[4] Inst Res Fundamental Sci IPM, Sch Comp Sci, Tehran, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2020年 / 12卷 / 01期
基金
美国国家科学基金会;
关键词
NIST lightweight cryptography competition; Preimage attack; Integrity; Confidentiality; Key recovery; MILP;
D O I
10.22042/ISECURE.2020.199099.480
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we present some attacks on GAGE, InGAGE, and CiliPadi, which are candidates of the first round of the NIST-LWC competition. GAGE and InGAGE are lightweight sponge based hash function and Authenticated Encryption with Associated Data (AEAD), respectively, and support different sets of parameters. The length of hash, key, and tag are always 256, 128, and 128 bits, respectively. We show that the security bounds for some variants of its hash and AEAD are less than the designers' claims. For example, the designers' security claim of the preimage attack for a hash function when the rate is 128 bits, and the capacity is 256 bits, is 2(256). However, we show that the security of preimage for this parameter set is 2(128). Also, the designer claimed security of confidentiality for an AEAD, when the rate is 8 bits, and the capacity is 224 bits, is 2(116). However, we show the security of confidentiality for it is 2(112). We also investigate the structure of the permutation used in InGAGE and present an attack to recover the key for reduced rounds of a variant of InGAGE. In an instance of AEAD of InGAGE, when the rate is 8 bits and the capacity is 224 bits, we recover the key when the number of the composition of the main permutation with itself, i.e., r(1), is less than 8. We also show that CiliPadi is vulnerable to the length extension attack by presenting concrete examples of forged messages. (C) 2020 ISC. All rights reserved.
引用
收藏
页码:13 / 23
页数:11
相关论文
共 50 条
  • [41] SYMMETRY PROPERTIES OF THE V1 CENTER
    LAMBE, J
    WEST, EJ
    PHYSICAL REVIEW, 1957, 108 (03): : 634 - 637
  • [42] Express saccade without V1
    Yoshida, Masatoshi
    Isa, Tadashi
    NEUROSCIENCE RESEARCH, 2011, 71 : E144 - E144
  • [43] Memory modulation of area V1
    Sneve, M. H.
    Magnussen, S.
    Endestad, T.
    Greenlee, M. W.
    PERCEPTION, 2009, 38 : 178 - 178
  • [44] V1 neurons: In tune with the neighbors
    Bosking, William H.
    NEURON, 2008, 57 (05) : 627 - 628
  • [45] The V1 Population Gains Normalization
    Ganmor, Elad
    Okun, Michael
    Lampl, Ilan
    NEURON, 2009, 64 (06) : 778 - 780
  • [46] Note to Thuc. V1
    Beghini, Andrea
    EIKASMOS-QUADERNI BOLOGNESI DI FILOLOGIA CLASSICA, 2015, 26 : 177 - 185
  • [48] “早不V1,晚不V1,‘偏偏’+时间词+V2”格式探析
    闫真
    现代语文, 2010, (05) : 52 - 54
  • [49] Some Insights into Differential Cryptanalysis of Grain v1
    Banik, Subhadeep
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 34 - 49
  • [50] From V1 to V2 in West Germanic
    Hinterhoelzl, Roland
    Petrova, Svetlana
    LINGUA, 2010, 120 (02) : 315 - 328