About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Book chapter · Conference paper

Cryptanalysis of ARMADILLO2

In Advances in Cryptology 2011, pp. 308-326
From

Department of Mathematics, Technical University of Denmark1

French National Institute for Computer Science and Applied Mathematics2

Université de Versailles Saint-Quentin-en-Yvelines3

Agence nationale de la scurit des systmes d'information4

ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-themiddle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function.

This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function.We have validated our attacks by implementing cryptanalysis on scaled variants.

The experimental results match the theoretical complexities. In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2.

Language: English
Publisher: Springer
Year: 2011
Pages: 308-326
Proceedings: 17th International Conference on the Theory and Application of Cryptology and Information Security
Series: Lecture Notes in Computer Science
ISBN: 3642253849 , 3642253857 , 9783642253843 and 9783642253850
ISSN: 16113349 and 03029743
Types: Book chapter and Conference paper
DOI: 10.1007/978-3-642-25385-0_17

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis