The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE

被引:6
|
作者
Khovratovich, Dmitry [1 ]
Rechberger, Christian [2 ]
机构
[1] Univ Luxembourg, Walferdange, Luxembourg
[2] DTU, Lyngby, Denmark
来源
关键词
D O I
10.1007/978-3-662-43414-7_9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2(102) ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted state bytes to the adversary. Our approach allows for a time-data complexity tradeoff, with an extreme case of a forgery produced after 2(119) attempts and based on a single authenticated message. Our attack is further turned into a state recovery and a universal forgery attack with a time complexity of 2(120) verification attempts using only a single authenticated 48-byte message.
引用
收藏
页码:174 / 184
页数:11
相关论文
共 50 条
  • [1] Impossible differential cryptanalysis of the Gimli authenticated encryption scheme
    Tan, Hao
    Shen, Bing
    Miao, Xudong
    Zhang, Wenzheng
    [J]. Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (05): : 213 - 220
  • [2] Cryptanalysis of a Convertible Authenticated Encryption Scheme Based on the ElGamal Cryptosystem
    Li, Fagen
    Qin, Zhiguang
    [J]. IETE TECHNICAL REVIEW, 2010, 27 (03) : 266 - 269
  • [3] Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
    Wu, Shengbao
    Wu, Hongjun
    Huang, Tao
    Wang, Mingsheng
    Wu, Wenling
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 377 - 404
  • [4] Cryptanalysis of the EPBC authenticated encryption mode
    Mitchell, Chris J.
    [J]. CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2007, 4887 : 118 - +
  • [5] Cryptanalysis of publicly verifiable authenticated encryption
    Chang, TY
    Yang, CC
    Hwang, MS
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (06) : 1645 - 1646
  • [6] ATTACK AND IMPROVE THE ZHAO-LIU AUTHENTICATED ENCRYPTION SCHEME
    Chang, Ting-Yi
    Chiang, Mao-Lun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (10A): : 3025 - 3030
  • [7] Cryptanalysis of an authenticated encryption scheme using self-certified public keys
    Tsai, CS
    Lin, SC
    Hwang, MS
    [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 166 (01) : 118 - 122
  • [8] Cryptanalysis of iterative encryption and image sharing scheme based on the VQ attack
    Chang, Chin-Chen
    Liu, Jui-Chuan
    Gao, Kai
    [J]. JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2023, 97
  • [9] ALE: AES-Based Lightweight Authenticated Encryption
    Bogdanov, Andrey
    Mendel, Florian
    Regazzoni, Francesco
    Rijmen, Vincent
    Tischhauser, Elmar
    [J]. FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 447 - 466
  • [10] Reforgeability of Authenticated Encryption Scheme
    Forler, Christian
    List, Eik
    Lucks, Stefan
    Wenzel, Jakob
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT II, 2017, 10343 : 19 - 37