A Forgery Attack on Leaked-State Authenticated Encryption

被引:0
|
作者
Mao, Jieshen [1 ,2 ]
Mu, Daoguang [2 ]
Lai, Xuejia [1 ]
机构
[1] Shanghai Jiao Tong Univ, Inst Cryptol & Informat Secur, Dept Comp Sci & Technol, Shanghai 200030, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu, Peoples R China
关键词
CASESAR; LAC; birthday paradox; leaked-State authenticated encryption; forgery attack;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The CAESAR competition is launched in 2013 which aims to find some authenticated encryption with good security and performance. Among these submissions, LAC is designed in a unique way with leaked-state structure. In this paper, based on birthday paradox, we find a forgery attack on LAC in nonce-misused case with time complexity 228. Moreover, we generalize the attack on normal version of leaked-state authenticated encryption and conclude some suggestions on how to use such structure.
引用
收藏
页码:128 / 131
页数:4
相关论文
共 50 条
  • [1] Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE
    Wu, Shengbao
    Wu, Hongjun
    Huang, Tao
    Wang, Mingsheng
    Wu, Wenling
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I, 2013, 8269 : 377 - 404
  • [2] Generalized forgery attack to optical encryption systems
    Feng, Jun
    Huang, Wei
    Jiao, Shuming
    Wang, Xiaopeng
    [J]. OPTICS EXPRESS, 2021, 29 (26) : 43580 - 43597
  • [3] Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
    Bay, Asli
    Ersoy, Oguzhan
    Karakoc, Ferhat
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 354 - 368
  • [4] Almost Universal Forgery Attacks on the COPA and Marble Authenticated Encryption Algorithms
    Lu, Jiqiang
    [J]. PROCEEDINGS OF THE 2017 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIA CCS'17), 2017, : 789 - 799
  • [5] The LOCAL Attack: Cryptanalysis of the Authenticated Encryption Scheme ALE
    Khovratovich, Dmitry
    Rechberger, Christian
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 174 - 184
  • [6] Forgery attack on optical encryption based on computational ghost imaging
    Yuan, Sheng
    Wang, Lanjie
    Liu, Xuemei
    Zhou, Xin
    [J]. OPTICS LETTERS, 2020, 45 (14) : 3913 - 3916
  • [7] On the Related-Key Attack Security of Authenticated Encryption Schemes
    Faust, Sebastian
    Kraemer, Juliane
    Orlt, Maximilian
    Struck, Patrick
    [J]. SECURITY AND CRYPTOGRAPHY FOR NETWORKS (SCN 2022), 2022, 13409 : 362 - 386
  • [8] ATTACK AND IMPROVE THE ZHAO-LIU AUTHENTICATED ENCRYPTION SCHEME
    Chang, Ting-Yi
    Chiang, Mao-Lun
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2009, 5 (10A): : 3025 - 3030
  • [9] Power Analysis Attack for an Authenticated Encryption Offset Two Round
    Nozaki, Yusuke
    Yoshikawa, Masaya
    [J]. 2017 IEEE 7TH ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL, AND INTELLIGENT SYSTEMS (CYBER), 2017, : 521 - 526
  • [10] Parallelizable Authenticated Encryption with Small State Size
    Inoue, Akiko
    Minematsu, Kazuhiko
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 618 - 644