SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition

Ashutosh Dhar Dwivedi, Miloš Klouček, Pawel Morawiecki, Ivica Nikolić, Josef Pieprzyk, Sebastian Wójtowicz

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

104 Downloads (Pure)

Abstract

We investigate six authenticated encryption schemes (ACORN, ASCON-128a, ICEPOLE-128a, Ketje Jr, MORUS, and NORX-32) from the CAESAR competition. We aim at state recovery attacks using a SAT solver as a main tool. Our analysis reveals that these schemes, as submitted to CAESAR, provide strong resistance against SAT-based state recoveries. To shed a light on their security margins, we also analyse modified versions of these algorithms, including round-reduced variants and versions with higher security claims. Our attacks on such variants require only a few known plaintext-ciphertext pairs and small memory requirements (to run the SAT solver), whereas time complexity varies from very practical (few seconds on a desktop PC) to 'theoretical' attacks.
Original languageEnglish
Title of host publicationProceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017) : Volume 4: SECRYPT
EditorsPierangela Samarati, Mohammad S. Obaidat, Enrique Cabello
Number of pages10
PublisherSCITEPRESS Digital Library
Publication date2017
Pages237-246
ISBN (Electronic)9789897582592
DOIs
Publication statusPublished - 2017
Externally publishedYes
Event14th International Joint Conference on e-Business and Telecommunications. ICETE 2017 - Madrid, Spain
Duration: 24 Jul 201726 Jul 2017
Conference number: 14

Conference

Conference14th International Joint Conference on e-Business and Telecommunications. ICETE 2017
Number14
Country/TerritorySpain
CityMadrid
Period24/07/201726/07/2017
SponsorInstitute for Systems and Technologies of Information, Control and Communication, Object Management Group, The Foundation for Intelligent Physical Agents, Workflow Management Coalition
SeriesProceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017)
Number4
ISSN2184-2825

Keywords

  • Authenticated Encryption
  • CAESAR
  • Logic Cryptanalysis
  • SAT Solvers
  • SAT-based Cryptanalysis

Cite this