Collision Attacks Against CAESAR Candidates Forgery and Key-Recovery Against AEZ and Marble

被引:19
|
作者
Fuhr, Thomas [1 ]
Leurent, Gaetan [2 ]
Suder, Valentin [3 ]
机构
[1] ANSSI, Paris, France
[2] Inria, Paris, France
[3] Univ Waterloo, Waterloo, ON N2L 3G1, Canada
关键词
CAESAR competition; Authenticated encryption; Cryptanalysis; Marble; AEZ; PMAC; Forgery; Key-recovery;
D O I
10.1007/978-3-662-48800-3_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we study authenticated encryption algorithms inspired by the OCB mode (Offset Codebook). These algorithms use secret offsets (masks derived from a whitening key) to turn a block cipher into a tweakable block cipher, following the XE or XEX construction. OCB has a security proof up to 2(n/2) queries, and a matching forgery attack was described by Ferguson, where the main step of the attack recovers the whitening key. In this work we study recent authenticated encryption algorithms inspired by OCB, such as Marble, AEZ, and COPA. While Ferguson's attack is not applicable to those algorithms, we show that it is still possible to recover the secret mask with birthday complexity. Recovering the secret mask easily leads to a forgery attack, but it also leads to more devastating attacks, with a key-recovery attack against Marble and AEZ v2 and v3 with birthday complexity. For Marble, this clearly violates the security claims of full n-bit security. For AEZ, this matches the security proof, but we believe it is nonetheless a quite undesirable property that collision attacks allow to recover the master key, and more robust designs would be desirable. Our attack against AEZ is generic and independent of the internal permutation (in particular, it still works with the full AES), but the key-recovery is specific to the key derivation used in AEZ v2 and v3. Against Marble, the forgery attack is generic, but the key-recovery exploits the structure of the E permutation (4 AES rounds). In particular, we introduce a novel cryptanalytic method to attack 3 AES rounds followed by 3 inverse AES rounds, which can be of independent interest.
引用
收藏
页码:510 / 532
页数:23
相关论文
共 50 条
  • [1] Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
    Chaigneau, Colin
    Gilbert, Henri
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (01) : 114 - 133
  • [2] Quantum Key-Recovery on Full AEZ
    Bonnetain, Xavier
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 394 - 406
  • [3] Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ
    Tairong Shi
    Chenhui Jin
    Jie Guan
    中国通信, 2018, 15 (02) : 46 - 53
  • [4] Collision Attacks against AEZ-PRF for Authenticated Encryption AEZ
    Shi, Tairong
    Jin, Chenhui
    Guan, Jie
    CHINA COMMUNICATIONS, 2018, 15 (02) : 46 - 53
  • [5] The security of elastic block ciphers against key-recovery attacks
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 89 - +
  • [6] Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
    Dong, Xiaoyang
    Hua, Jialiang
    Sun, Siwei
    Li, Zheng
    Wang, Xiaoyun
    Hu, Lei
    ADVANCES IN CRYPTOLOGY - CRYPTO 2021, PT III, 2021, 12827 : 278 - 308
  • [7] Key-Recovery Attacks on ASASA
    Brice Minaud
    Patrick Derbez
    Pierre-Alain Fouque
    Pierre Karpman
    Journal of Cryptology, 2018, 31 : 845 - 884
  • [8] Forgery and partial key-recovery attacks on HMAC and NMAC using hash collisions
    Contini, Scott
    Yin, Yiqun Lisa
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006, 2006, 4284 : 37 - +
  • [9] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 3 - 27
  • [10] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    JOURNAL OF CRYPTOLOGY, 2018, 31 (03) : 845 - 884