Item type |
Symposium(1) |
公開日 |
2019-10-14 |
タイトル |
|
|
タイトル |
Cryptanalysis of Subterranean-SAE |
タイトル |
|
|
言語 |
en |
|
タイトル |
Cryptanalysis of Subterranean-SAE |
言語 |
|
|
言語 |
eng |
キーワード |
|
|
主題Scheme |
Other |
|
主題 |
AEAD,Subterranean 2.0,key-recovery attack,conditional cube tester |
資源タイプ |
|
|
資源タイプ識別子 |
http://purl.org/coar/resource_type/c_5794 |
|
資源タイプ |
conference paper |
著者所属 |
|
|
|
華東師範大学/兵庫県立大学 |
著者所属 |
|
|
|
NICT/兵庫県立大学 |
著者所属(英) |
|
|
|
en |
|
|
East China Normal University / University of Hyogo |
著者所属(英) |
|
|
|
en |
|
|
NICT / University of Hyogo |
著者名 |
リュウ, フカン
五十部, 孝典
|
著者名(英) |
Fukang, Liu
Takanori, Isobe
|
論文抄録 |
|
|
内容記述タイプ |
Other |
|
内容記述 |
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 1 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have made a cryptanalysis of the state collisions in unkeyed absorbing by reducing the number of rounds to absorb the message from 2 to 1. However, no cryptanalysis of the authenticated encryption scheme Subterranean-SAE is made. For Subterranean-SAE, the designers introduce 8 blank rounds to separate the controllable input and output, and expect that 8 blank rounds can achieve a sufficient diffusion. Therefore, it is meaningful to investigate the security by reducing the number of blank rounds. By reducing the number of blank rounds to 4, we can mount a key-recovery attack with time complexity 2122 and data complexity 269.5 |
論文抄録(英) |
|
|
内容記述タイプ |
Other |
|
内容記述 |
Subterranean 2.0 designed by Daemen, Massolino and Rotella is a Round 1 candidate of the NIST Lightweight Cryptography Standardization process. In the official document of Subterranean 2.0, the designers have made a cryptanalysis of the state collisions in unkeyed absorbing by reducing the number of rounds to absorb the message from 2 to 1. However, no cryptanalysis of the authenticated encryption scheme Subterranean-SAE is made. For Subterranean-SAE, the designers introduce 8 blank rounds to separate the controllable input and output, and expect that 8 blank rounds can achieve a sufficient diffusion. Therefore, it is meaningful to investigate the security by reducing the number of blank rounds. By reducing the number of blank rounds to 4, we can mount a key-recovery attack with time complexity 2122 and data complexity 269.5. |
書誌レコードID |
|
|
|
識別子タイプ |
NCID |
|
|
関連識別子 |
ISSN 1882-0840 |
書誌情報 |
コンピュータセキュリティシンポジウム2019論文集
巻 2019,
p. 342-348,
発行日 2019-10-14
|
出版者 |
|
|
言語 |
ja |
|
出版者 |
情報処理学会 |