Conference paper
Key Recovery Attacks on Recent Authenticated Ciphers
In this paper, we cryptanalyze three authenticated ciphers: AVALANCHE, Calico, and RBS. While the former two are contestants in the ongoing international CAESAR competition for authenticated encryption schemes, the latter has recently been proposed for lightweight applications such as RFID systems and wireless networks.
All these schemes use well-established and secure components such as the AES, Grain-like NFSRs, ChaCha and SipHash as their building blocks. However, we discover key recovery attacks for all three designs, featuring square-root complexities. Using a key collision technique, we can recover the secret key of AVALANCHE in 2n/2, where n 2∈ {28; 192; 256} is the key length.
This technique also applies to the authentication part of Calico whose 128-bit key can be recovered in 264 time. For RBS, we can recover its full 132-bit key in 265 time with a guess-and-determine attack. All attacks also allow the adversary to mount universal forgeries.
Language: | English |
---|---|
Publisher: | Springer |
Year: | 2014 |
Pages: | 274-287 |
Proceedings: | 3rd International Conference on Cryptology and Information Security in Latin AmericaInternational Conference on Cryptology and Information Security in Latin America |
Series: | Lecture Notes in Computer Science |
ISBN: | 3319162942 , 3319162950 , 9783319162942 and 9783319162959 |
ISSN: | 03029743 |
Types: | Conference paper |
DOI: | 10.1007/978-3-319-16295-9_15 |
ORCIDs: | Bogdanov, Andrey and Tischhauser, Elmar Wolfgang |