首页 > 最新文献

IACR Transactions on Symmetric Cryptology最新文献

英文 中文
PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers PLCrypto:可编程逻辑控制器的对称密码库
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-09-17 DOI: 10.46586/tosc.v2021.i3.170-217
Zheng Yang, Zhiting Bao, Chenglu Jin, Zhe Liu, Jianying Zhou
Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They can be found in critical infrastructures like power grids, water systems, nuclear plants, manufacturing systems, etc. This paper introduces PLCrypto, a software cryptographic library that implements lightweight symmetric cryptographic algorithms for PLCs using a standard PLC programming language called structured text (ST). To the best of our knowledge, PLCrypto is the first ST-based cryptographic library that is executable on commercial off-the-shelf PLCs. PLCrypto includes a wide range of commonly used algorithms, totaling ten algorithms, including one-way functions, message authentication codes, hash functions, block ciphers, and pseudo-random functions/generators. PLCrypto can be used to protect the confidentiality and integrity of data on PLCs without additional hardware or firmware modification. This paper also presents general optimization methodologies and techniques used in PLCrypto for implementing primitive operations like bit-shifting/rotation, substitution, and permutation. The optimization tricks we distilled from our practice can also guide future implementation of other computationheavy programs on PLCs. To demonstrate a use case of PLCrypto in practice, we further realize a cryptographic protocol called proof of aliveness as a case study. We benchmarked the algorithms and protocols in PLCrypto on a commercial PLC, Allen Bradley ControlLogix 5571, which is widely used in the real world. Also, we make our source codes publicly available, so plant operators can freely deploy our library in practice.
可编程逻辑控制器(plc)是广泛应用于工业自动化的控制装置。它们可以在电网、供水系统、核电站、制造系统等关键基础设施中找到。本文介绍了PLCrypto,这是一个软件加密库,它使用称为结构化文本(ST)的标准PLC编程语言为PLC实现轻量级对称加密算法。据我们所知,PLCrypto是第一个基于st的加密库,可在商用现成的plc上执行。PLCrypto包括广泛的常用算法,共计十种算法,包括单向函数、消息认证码、哈希函数、分组密码和伪随机函数/生成器。PLCrypto可用于保护plc上数据的机密性和完整性,而无需额外的硬件或固件修改。本文还介绍了PLCrypto中用于实现基本操作(如位移动/旋转,替换和排列)的一般优化方法和技术。我们从实践中提炼出的优化技巧也可以指导未来在plc上实现其他计算繁重的程序。为了在实践中演示PLCrypto的用例,我们进一步实现了一种称为活体证明的加密协议作为案例研究。我们在商用PLC Allen Bradley ControlLogix 5571上对PLCrypto中的算法和协议进行了基准测试,该PLC在现实世界中广泛使用。此外,我们将源代码公开,因此工厂操作员可以在实践中自由地部署我们的库。
{"title":"PLCrypto: A Symmetric Cryptographic Library for Programmable Logic Controllers","authors":"Zheng Yang, Zhiting Bao, Chenglu Jin, Zhe Liu, Jianying Zhou","doi":"10.46586/tosc.v2021.i3.170-217","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i3.170-217","url":null,"abstract":"Programmable Logic Controllers (PLCs) are control devices widely used in industrial automation. They can be found in critical infrastructures like power grids, water systems, nuclear plants, manufacturing systems, etc. This paper introduces PLCrypto, a software cryptographic library that implements lightweight symmetric cryptographic algorithms for PLCs using a standard PLC programming language called structured text (ST). To the best of our knowledge, PLCrypto is the first ST-based cryptographic library that is executable on commercial off-the-shelf PLCs. PLCrypto includes a wide range of commonly used algorithms, totaling ten algorithms, including one-way functions, message authentication codes, hash functions, block ciphers, and pseudo-random functions/generators. PLCrypto can be used to protect the confidentiality and integrity of data on PLCs without additional hardware or firmware modification. This paper also presents general optimization methodologies and techniques used in PLCrypto for implementing primitive operations like bit-shifting/rotation, substitution, and permutation. The optimization tricks we distilled from our practice can also guide future implementation of other computationheavy programs on PLCs. To demonstrate a use case of PLCrypto in practice, we further realize a cryptographic protocol called proof of aliveness as a case study. We benchmarked the algorithms and protocols in PLCrypto on a commercial PLC, Allen Bradley ControlLogix 5571, which is widely used in the real world. Also, we make our source codes publicly available, so plant operators can freely deploy our library in practice.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"61 1","pages":"170-217"},"PeriodicalIF":3.5,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91199145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives 以GIFT-128为基本基元的三种aead的线性密码分析
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.199-221
Ling Sun, Wei Wang, Meiqin Wang
This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of these proposals take GIFT-128 as underlying primitives. The automatic search with the Boolean satisfiability problem (SAT) method is implemented to search for linear approximations that match the attack settings concerning these primitives. With the newly identified approximations, we launch key-recovery attacks on GIFT-COFB, SUNDAE-GIFT, and HyENA when the underlying primitives are replaced with 16-round, 17-round, and 16-round versions of GIFT-128. The resistance of GIFT-128 against linear cryptanalysis is also evaluated. We present a 24-round key-recovery attack on GIFT-128 with a newly obtained 19-round linear approximation. We note that the attack results in this paper are far from threatening the security of GIFT-COFB, SUNDAE-GIFT, HyENA, and GIFT-128.
本文研究了关联数据认证加密(AEADs) GIFT-COFB、SUNDAE-GIFT和HyENA的线性密码分析。所有这些提议都以GIFT-128作为基础原语。利用布尔可满足性问题(SAT)方法实现自动搜索,以搜索与这些原语的攻击设置匹配的线性逼近。使用新识别的近似,当底层原语被16轮、17轮和16轮版本的GIFT-128替换时,我们对GIFT-COFB、SUNDAE-GIFT和HyENA发起密钥恢复攻击。对GIFT-128对线性密码分析的抗性也进行了评估。我们利用新获得的19轮线性近似,提出了对GIFT-128的24轮密钥恢复攻击。我们注意到本文的攻击结果远未威胁到GIFT-COFB、SUNDAE-GIFT、HyENA和GIFT-128的安全性。
{"title":"Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives","authors":"Ling Sun, Wei Wang, Meiqin Wang","doi":"10.46586/tosc.v2021.i2.199-221","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.199-221","url":null,"abstract":"This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of these proposals take GIFT-128 as underlying primitives. The automatic search with the Boolean satisfiability problem (SAT) method is implemented to search for linear approximations that match the attack settings concerning these primitives. With the newly identified approximations, we launch key-recovery attacks on GIFT-COFB, SUNDAE-GIFT, and HyENA when the underlying primitives are replaced with 16-round, 17-round, and 16-round versions of GIFT-128. The resistance of GIFT-128 against linear cryptanalysis is also evaluated. We present a 24-round key-recovery attack on GIFT-128 with a newly obtained 19-round linear approximation. We note that the attack results in this paper are far from threatening the security of GIFT-COFB, SUNDAE-GIFT, HyENA, and GIFT-128.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"47 1","pages":"199-221"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80804529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Weak Keys in Reduced AEGIS and Tiaoxin 简化AEGIS和调信中的弱密钥
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.104-139
F. Liu, Takanori Isobe, W. Meier, Kosei Sakamoto
AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the final portfolio for high-performance applications, while Tiaoxin is a third-round candidate. Although both primitives adopt a stream cipher based design, they are quite different from the well-known bit-oriented stream ciphers like Trivium and the Grain family. Their common feature consists in the round update function, where the state is divided into several 128-bit words and each word has the option to pass through an AES round or not. During the 6-year CAESAR competition, it is surprising that for both primitives there is no third-party cryptanalysis of the initialization phase. Due to the similarities in both primitives, we are motivated to investigate whether there is a common way to evaluate the security of their initialization phases. Our technical contribution is to write the expressions of the internal states in terms of the nonce and the key by treating a 128-bit word as a unit and then carefully study how to simplify these expressions by adding proper conditions. As a result, we find that there are several groups of weak keys with 296 keys each in 5-round AEGIS-128 and 8-round Tiaoxin, which allows us to construct integral distinguishers with time complexity 232 and data complexity 232. Based on the distinguisher, the time complexity to recover the weak key is 272 for 5-round AEGIS-128. However, the weak key recovery attack on 8-round Tiaoxin will require the usage of a weak constant occurring with probability 2−32. All the attacks reach half of the total number of initialization rounds. We expect that this work can advance the understanding of the designs similar to AEGIS and Tiaoxin.
AEGIS-128和振奋-346(简称振奋)是提交给CAESAR竞赛的两个基于aes的原语。其中,AEGIS-128已入选高性能应用的最终产品组合,而调信则是第三轮候选产品。虽然这两个原语都采用基于流密码的设计,但它们与Trivium和Grain家族等知名的面向位的流密码有很大不同。它们的共同特征包括轮更新功能,其中状态被分成几个128位的单词,每个单词都可以选择是否通过AES轮询。在为期6年的CAESAR竞赛中,令人惊讶的是,对于这两个原语,初始化阶段都没有第三方密码分析。由于这两个原语的相似性,我们有动机研究是否存在一种通用的方法来评估它们初始化阶段的安全性。我们的技术贡献是通过将128位字作为一个单元来编写nonce和key的内部状态表达式,然后仔细研究如何通过添加适当的条件来简化这些表达式。结果发现,在5轮AEGIS-128和8轮调信中存在多组每组296个密钥的弱密钥,从而可以构造时间复杂度为232、数据复杂度为232的整数区分符。基于区分符的5轮AEGIS-128恢复弱密钥的时间复杂度为272。然而,对8轮调信的弱密钥恢复攻击将需要使用一个弱常数,其发生概率为2−32。所有攻击都达到初始化回合数的一半。我们期望这项工作可以促进对类似宙斯盾和调信的设计的理解。
{"title":"Weak Keys in Reduced AEGIS and Tiaoxin","authors":"F. Liu, Takanori Isobe, W. Meier, Kosei Sakamoto","doi":"10.46586/tosc.v2021.i2.104-139","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.104-139","url":null,"abstract":"AEGIS-128 and Tiaoxin-346 (Tiaoxin for short) are two AES-based primitives submitted to the CAESAR competition. Among them, AEGIS-128 has been selected in the final portfolio for high-performance applications, while Tiaoxin is a third-round candidate. Although both primitives adopt a stream cipher based design, they are quite different from the well-known bit-oriented stream ciphers like Trivium and the Grain family. Their common feature consists in the round update function, where the state is divided into several 128-bit words and each word has the option to pass through an AES round or not. During the 6-year CAESAR competition, it is surprising that for both primitives there is no third-party cryptanalysis of the initialization phase. Due to the similarities in both primitives, we are motivated to investigate whether there is a common way to evaluate the security of their initialization phases. Our technical contribution is to write the expressions of the internal states in terms of the nonce and the key by treating a 128-bit word as a unit and then carefully study how to simplify these expressions by adding proper conditions. As a result, we find that there are several groups of weak keys with 296 keys each in 5-round AEGIS-128 and 8-round Tiaoxin, which allows us to construct integral distinguishers with time complexity 232 and data complexity 232. Based on the distinguisher, the time complexity to recover the weak key is 272 for 5-round AEGIS-128. However, the weak key recovery attack on 8-round Tiaoxin will require the usage of a weak constant occurring with probability 2−32. All the attacks reach half of the total number of initialization rounds. We expect that this work can advance the understanding of the designs similar to AEGIS and Tiaoxin.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"38 6 1","pages":"104-139"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77514290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Provable Security of SP Networks with Partial Non-Linear Layers 部分非线性层SP网络的可证明安全性
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.353-388
Chun Guo, François-Xavier Standaert, Weijia Wang, X. Wang, Yu Yu
Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study their underlying structure partial SPNs, i.e., Substitution-Permutation Networks (SPNs) with parts of the substitution layer replaced by an identity mapping, and put forward the first provable security analysis for such partial SPNs built upon dedicated linear layers. For different instances of partial SPNs using MDS linear layers, we establish strong pseudorandom security as well as practical provable security against impossible differential attacks. By extending the well-established MDS code-based idea, we also propose the first principled design of linear layers that ensures optimal differential propagation. Our results formally confirm the conjecture that partial SPNs achieve the same security as normal SPNs while consuming less non-linearity, in a well-established framework.
受最近低乘法复杂度区块密码(例如,佐罗,CHES 2013;LowMC, EUROCRYPT 2015;Hades, eurocrypt 2020;恶意的,CRYPTO 2020),我们研究了它们的底层结构部分spn,即替换置换网络(substitution - permutation Networks, spn),其中替换层的部分被一个身份映射取代,并提出了第一个可证明的基于专用线性层的部分spn的安全性分析。对于使用MDS线性层的部分spn的不同实例,我们建立了强大的伪随机安全性以及针对不可能的差分攻击的实际可证明安全性。通过扩展已建立的基于MDS代码的思想,我们还提出了确保最优差分传播的线性层的第一个原则设计。我们的结果正式证实了一个猜想,即在一个完善的框架中,部分spn在消耗较少非线性的同时实现了与正常spn相同的安全性。
{"title":"Provable Security of SP Networks with Partial Non-Linear Layers","authors":"Chun Guo, François-Xavier Standaert, Weijia Wang, X. Wang, Yu Yu","doi":"10.46586/tosc.v2021.i2.353-388","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.353-388","url":null,"abstract":"Motivated by the recent trend towards low multiplicative complexity blockciphers (e.g., Zorro, CHES 2013; LowMC, EUROCRYPT 2015; HADES, EUROCRYPT 2020; MALICIOUS, CRYPTO 2020), we study their underlying structure partial SPNs, i.e., Substitution-Permutation Networks (SPNs) with parts of the substitution layer replaced by an identity mapping, and put forward the first provable security analysis for such partial SPNs built upon dedicated linear layers. For different instances of partial SPNs using MDS linear layers, we establish strong pseudorandom security as well as practical provable security against impossible differential attacks. By extending the well-established MDS code-based idea, we also propose the first principled design of linear layers that ensures optimal differential propagation. Our results formally confirm the conjecture that partial SPNs achieve the same security as normal SPNs while consuming less non-linearity, in a well-established framework.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"06 1","pages":"353-388"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86145365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Permutation Based EDM: An Inverse Free BBB Secure PRF 基于置换的EDM:一种逆自由BBB安全PRF
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.31-70
Avijit Dutta, M. Nandi, Suprita Talnikar
In CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing PRF based on public permutations. They have proposed two beyond the birthday bound secure n-bit to n-bit PRF constructions, i.e., SoEM22 and SoKAC21, which are built on public permutations, where n is the size of the permutation. However, both of their constructions require two independent instances of public permutations. In FSE 2020, Chakraborti et al. have proposed a single public permutation based n-bit to n-bit beyond the birthday bound secure PRF, which they refer to as PDMMAC. Although the construction is minimal in the number of permutations, it requires the inverse call of its underlying permutation in their design. Coming up with a beyond the birthday bound secure public permutation based n-bit to n-bit PRF with a single permutation and two forward calls was left as an open problem in their paper. In this work, we propose pEDM, a single permutation based n-bit to n-bit PRF with two calls that do not require invertibility of the permutation. We have shown that our construction is secured against all adaptive information-theoretic distinguishers that make roughly up to 22n/3 construction and primitive queries. Moreover, we have also shown a matching attack with similar query complexity that establishes the tightness of our security bound.
在CRYPTO 2019中,Chen等人发起了一个有趣的研究方向,即基于公共排列设计PRF。他们提出了两个超越生日界的安全n-bit到n-bit PRF结构,即SoEM22和SoKAC21,它们建立在公共排列上,其中n是排列的大小。然而,这两种结构都需要两个独立的公共排列实例。在FSE 2020中,Chakraborti等人提出了一种基于n-bit到n-bit的单一公共排列,超越生日界安全PRF,他们称之为PDMMAC。虽然结构的排列数量很少,但它需要在设计中反向调用其潜在的排列。在他们的论文中,提出一个基于单排列和两个前向调用的n-bit到n-bit超过生日界限的安全公共排列PRF是一个开放的问题。在这项工作中,我们提出了pEDM,一种基于n位到n位单排列的PRF,具有两次调用,不需要排列的可逆性。我们已经证明,我们的结构是安全的,不受所有自适应信息论区分符的影响,这些区分符可以产生大约高达22n/3的结构和原始查询。此外,我们还展示了具有类似查询复杂性的匹配攻击,该攻击建立了安全边界的严密性。
{"title":"Permutation Based EDM: An Inverse Free BBB Secure PRF","authors":"Avijit Dutta, M. Nandi, Suprita Talnikar","doi":"10.46586/tosc.v2021.i2.31-70","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.31-70","url":null,"abstract":"In CRYPTO 2019, Chen et al. have initiated an interesting research direction in designing PRF based on public permutations. They have proposed two beyond the birthday bound secure n-bit to n-bit PRF constructions, i.e., SoEM22 and SoKAC21, which are built on public permutations, where n is the size of the permutation. However, both of their constructions require two independent instances of public permutations. In FSE 2020, Chakraborti et al. have proposed a single public permutation based n-bit to n-bit beyond the birthday bound secure PRF, which they refer to as PDMMAC. Although the construction is minimal in the number of permutations, it requires the inverse call of its underlying permutation in their design. Coming up with a beyond the birthday bound secure public permutation based n-bit to n-bit PRF with a single permutation and two forward calls was left as an open problem in their paper. In this work, we propose pEDM, a single permutation based n-bit to n-bit PRF with two calls that do not require invertibility of the permutation. We have shown that our construction is secured against all adaptive information-theoretic distinguishers that make roughly up to 22n/3 construction and primitive queries. Moreover, we have also shown a matching attack with similar query complexity that establishes the tightness of our security bound.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"32 1","pages":"31-70"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85925255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improved Rectangle Attacks on SKINNY and CRAFT 加强对SKINNY和CRAFT的矩形攻击
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.140-198
Hosein Hadipour, N. Bagheri, Ling Song
The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short differential trails for E0 and E1 with probability p and q respectively. According to the previous research, the dependency between these two differential characteristics has a great impact on the probability of boomerang and rectangle distinguishers. Dunkelman et al. proposed the sandwich attack to formalise such dependency that regards E as three parts, i.e., E = E1 ∘ Em ∘ E0, where Em contains the dependency between two differential trails, satisfying some differential propagation with probability r. Accordingly, the entire probability is p2q2r. Recently, Song et al. have proposed a general framework to identify the actual boundaries of Em and systematically evaluate the probability of Em with any number of rounds, and applied their method to accurately evaluate the probabilities of the best SKINNY’s boomerang distinguishers. In this paper, using a more advanced method to search for boomerang distinguishers, we show that the best previous boomerang distinguishers for SKINNY can be significantly improved in terms of probability and number of rounds. More precisely, we propose related-tweakey boomerang distinguishers for up to 19, 21, 23, and 25 rounds of SKINNY-64-128, SKINNY-128-256, SKINNY-64-192 and SKINNY-128-384 respectively, which improve the previous boomerang distinguishers of these variants of SKINNY by 1, 2, 1, and 1 round respectively. Based on the improved boomerang distinguishers for SKINNY, we provide related-tweakey rectangle attacks on 23 rounds of SKINNY-64-128, 24 rounds of SKINNY-128-256, 29 rounds of SKINNY-64-192, and 30 rounds of SKINNY-128-384. It is worth noting that our improved related-tweakey rectangle attacks on SKINNY-64-192, SKINNY-128-256 and SKINNY-128-384 can be directly applied for the same number of rounds of ForkSkinny-64-192, ForkSkinny-128-256 and ForkSkinny-128-384 respectively. CRAFT is another SKINNY-like tweakable block cipher for which we provide the security analysis against rectangle attack for the first time. As a result, we provide a 14-round boomerang distinguisher for CRAFT in the single-tweak model based on which we propose a single-tweak rectangle attack on 18 rounds of this cipher. Moreover, following the previous research regarding the evaluation of switching in multiple rounds of boomerang distinguishers, we also introduce new tools called Double Boomerang Connectivity Table (DBCT), LBCT⫤, and UBCT⊨ to evaluate the boomerang switch through the multiple rounds more accurately.
回旋镖攻击和矩形攻击是对差分密码分析的改进,它们把目标密码E看作两个子密码(即E = E1°E0)的组合,通过连接E0和E1的两个短差分轨迹,分别以p和q的概率构造一个概率为p2q2的区分符。根据以往的研究,这两种差分特征之间的依赖关系对回旋镖和矩形区分器的概率有很大的影响。Dunkelman等人提出了夹心攻击来形式化这种依赖关系,将E看成三部分,即E = E1°Em°E0,其中Em包含两条差分轨迹之间的依赖关系,满足某种概率为r的微分传播。因此,整个概率为p2q2r。最近,Song等人提出了一个通用框架来识别Em的实际边界,并系统地评估任意轮数Em的概率,并应用他们的方法来准确评估最佳SKINNY的回飞镖区分器的概率。在本文中,我们使用一种更高级的方法来搜索回飞镖区分器,我们表明,在概率和回合数方面,SKINNY的最佳先前回飞镖区分器可以显着提高。更准确地说,我们提出了相关调整的回飞镖区分器,分别适用于SKINNY-64-128、SKINNY-128-256、SKINNY-64-192和SKINNY-128-384,最多可达19、21、23和25轮,分别将这些变体的先前的回飞镖区分器提高了1、2、1和1轮。基于改进的SKINNY回旋镖区分器,我们对23轮SKINNY-64-128、24轮SKINNY-128-256、29轮SKINNY-64-192和30轮SKINNY-128-384进行了相关调整的矩形攻击。值得注意的是,我们对SKINNY-64-192, SKINNY-128-256和SKINNY-128-384的改进的相关调整矩形攻击可以分别直接应用于相同轮数的ForkSkinny-64-192, ForkSkinny-128-256和ForkSkinny-128-384。CRAFT是另一种类似于skinny的可调分组密码,我们首次为其提供了针对矩形攻击的安全性分析。在此基础上,我们提出了对该密码进行18轮单扭矩形攻击的方法。此外,在前人对多轮回飞镖区分器切换评估的基础上,我们还引入了双回飞镖连通性表(Double boomerang Connectivity Table, DBCT)、LBCT⫤和UBCT 等新工具,以更准确地评估多轮回飞镖切换。
{"title":"Improved Rectangle Attacks on SKINNY and CRAFT","authors":"Hosein Hadipour, N. Bagheri, Ling Song","doi":"10.46586/tosc.v2021.i2.140-198","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.140-198","url":null,"abstract":"The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition of two sub-ciphers, i.e., E = E1 ∘ E0, to construct a distinguisher for E with probability p2q2 by concatenating two short differential trails for E0 and E1 with probability p and q respectively. According to the previous research, the dependency between these two differential characteristics has a great impact on the probability of boomerang and rectangle distinguishers. Dunkelman et al. proposed the sandwich attack to formalise such dependency that regards E as three parts, i.e., E = E1 ∘ Em ∘ E0, where Em contains the dependency between two differential trails, satisfying some differential propagation with probability r. Accordingly, the entire probability is p2q2r. Recently, Song et al. have proposed a general framework to identify the actual boundaries of Em and systematically evaluate the probability of Em with any number of rounds, and applied their method to accurately evaluate the probabilities of the best SKINNY’s boomerang distinguishers. In this paper, using a more advanced method to search for boomerang distinguishers, we show that the best previous boomerang distinguishers for SKINNY can be significantly improved in terms of probability and number of rounds. More precisely, we propose related-tweakey boomerang distinguishers for up to 19, 21, 23, and 25 rounds of SKINNY-64-128, SKINNY-128-256, SKINNY-64-192 and SKINNY-128-384 respectively, which improve the previous boomerang distinguishers of these variants of SKINNY by 1, 2, 1, and 1 round respectively. Based on the improved boomerang distinguishers for SKINNY, we provide related-tweakey rectangle attacks on 23 rounds of SKINNY-64-128, 24 rounds of SKINNY-128-256, 29 rounds of SKINNY-64-192, and 30 rounds of SKINNY-128-384. It is worth noting that our improved related-tweakey rectangle attacks on SKINNY-64-192, SKINNY-128-256 and SKINNY-128-384 can be directly applied for the same number of rounds of ForkSkinny-64-192, ForkSkinny-128-256 and ForkSkinny-128-384 respectively. CRAFT is another SKINNY-like tweakable block cipher for which we provide the security analysis against rectangle attack for the first time. As a result, we provide a 14-round boomerang distinguisher for CRAFT in the single-tweak model based on which we propose a single-tweak rectangle attack on 18 rounds of this cipher. Moreover, following the previous research regarding the evaluation of switching in multiple rounds of boomerang distinguishers, we also introduce new tools called Double Boomerang Connectivity Table (DBCT), LBCT⫤, and UBCT⊨ to evaluate the boomerang switch through the multiple rounds more accurately.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"21 1","pages":"140-198"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73868116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT Power Yoga:面向节能轻量级物联网的CCM可变伸缩安全性
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.446-468
Emiljano Gjiriti, Reza Reyhanitabar, Damian Vizár
The currently ongoing NIST LWC project aims at identifying new standardization targets for lightweight authenticated encryption with associated data (AEAD) and (optionally) lightweight cryptographic hashing. NIST has deemed it important for performance and cost to be optimized on relevant platforms, especially for short messages. Reyhanitabar, Vaudenay and Vizár (Asiacrypt 2016) gave a formal treatment for security of nonce-based AEAD with variable stretch, i.e., when the length of the authentication tag is changed between encryptions without changing the key. They argued that AEAD supporting variable stretch is of practical interest for constrained applications, especially low-power devices operated by battery, due to the ability to flexibly trade communication overhead and level of integrity.In this work, we investigate this hypothesis with affirmative results. We present vCCM, a variable-stretch variant of the standard CCM and prove it is secure when used with variable stretch. We then experimentally measure the energy consumption of a real-world wireless sensor node when encrypting and sending messages with vCCM and CCM, respectively. Our projections show that the flexible trade of integrity level and ciphertext expansion can lead up to 21% overall energy consumption reduction in certain scenarios. As vCCM is obtained from the widely-used CCM by a black-box transformation, allowing any existing CCM implementations to be reused as-is, our results can be immediately put to use in practice. vCCM is all the more relevant because neither the NIST LWC project, nor any of the candidates give a consideration for the support of variable stretch and the related integrity-overhead trade-off.
目前正在进行的NIST LWC项目旨在为带有关联数据的轻量级身份验证加密(AEAD)和(可选的)轻量级加密散列确定新的标准化目标。NIST认为在相关平台上优化性能和成本非常重要,特别是对于短消息。Reyhanitabar、Vaudenay和Vizár (Asiacrypt 2016)对基于非整数的可变伸缩AEAD的安全性进行了正式处理,即在不更改密钥的情况下,在两次加密之间更改身份验证标签的长度。他们认为,由于能够灵活地交换通信开销和完整性水平,支持可变拉伸的AEAD对于受限应用具有实际意义,特别是由电池操作的低功耗设备。在这项工作中,我们以肯定的结果调查了这一假设。我们提出了vCCM,一种标准CCM的可变伸缩变体,并证明了它与可变伸缩一起使用时是安全的。然后,我们通过实验测量了使用vCCM和CCM分别加密和发送消息时实际无线传感器节点的能耗。我们的预测表明,在某些情况下,完整性水平和密文扩展的灵活交易可以导致总能耗降低21%。由于vCCM是通过黑盒转换从广泛使用的CCM获得的,允许按原样重用任何现有的CCM实现,因此我们的结果可以立即在实践中使用。vCCM更加重要,因为NIST LWC项目和任何候选项目都没有考虑对可变拉伸的支持和相关的完整性开销权衡。
{"title":"Power Yoga: Variable-Stretch Security of CCM for Energy-Efficient Lightweight IoT","authors":"Emiljano Gjiriti, Reza Reyhanitabar, Damian Vizár","doi":"10.46586/tosc.v2021.i2.446-468","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.446-468","url":null,"abstract":"The currently ongoing NIST LWC project aims at identifying new standardization targets for lightweight authenticated encryption with associated data (AEAD) and (optionally) lightweight cryptographic hashing. NIST has deemed it important for performance and cost to be optimized on relevant platforms, especially for short messages. Reyhanitabar, Vaudenay and Vizár (Asiacrypt 2016) gave a formal treatment for security of nonce-based AEAD with variable stretch, i.e., when the length of the authentication tag is changed between encryptions without changing the key. They argued that AEAD supporting variable stretch is of practical interest for constrained applications, especially low-power devices operated by battery, due to the ability to flexibly trade communication overhead and level of integrity.In this work, we investigate this hypothesis with affirmative results. We present vCCM, a variable-stretch variant of the standard CCM and prove it is secure when used with variable stretch. We then experimentally measure the energy consumption of a real-world wireless sensor node when encrypting and sending messages with vCCM and CCM, respectively. Our projections show that the flexible trade of integrity level and ciphertext expansion can lead up to 21% overall energy consumption reduction in certain scenarios. As vCCM is obtained from the widely-used CCM by a black-box transformation, allowing any existing CCM implementations to be reused as-is, our results can be immediately put to use in practice. vCCM is all the more relevant because neither the NIST LWC project, nor any of the candidates give a consideration for the support of variable stretch and the related integrity-overhead trade-off.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"59 1","pages":"446-468"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78129193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G 罗卡:一种高效的基于aes的超5G加密方案
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.1-30
Kosei Sakamoto, Fukang Liu, Yuto Nakano, S. Kiyomoto, Takanori Isobe
In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the speed and security in 6G systems. To achieve ultra-fast software implementations, the basic design strategy is to take full advantage of the AES-NI and SIMD instructions as that of the AEGIS family and Tiaoxin-346. Although Jean and Nikolić have generalized the way to construct efficient round functions using only one round of AES (aesenc) and 128-bit XOR operation and have found several efficient candidates, there still seems to exist potential to further improve it regarding speed and state size. In order to minimize the critical path of one round, we remove the case of applying both aesenc and XOR in a cascade way for one round. By introducing a cost-free block permutation in the round function, we are able to search for candidates in a larger space without sacrificing the performance. Consequently, we obtain more efficient constructions with a smaller state size than candidates by Jean and Nikolić. Based on the newly-discovered round function, we carefully design the corresponding AEAD scheme with 256-bit security by taking several reported attacks on the AEGIS family and Tiaxion-346 into account. Our AEAD scheme can reach 138Gbps which is 4 times faster than the AEAD scheme of SNOW-V. Rocca is also much faster than other efficient schemes with 256-bit key length, e.g. AEGIS-256 and AES-256-GCM. As far as we know, Rocca is the first dedicated cryptographic algorithm targeting 6 systems, i.e., 256-bit key length and the speed of more than 100 Gbps.
为了满足6G系统对速度和安全性的要求,本文提出了一种基于aes的关联数据认证加密方案——Rocca。为了实现超快速的软件实现,基本的设计策略是充分利用AES-NI和SIMD指令,就像AEGIS系列和调新-346一样。尽管Jean和nikoliki已经推广了仅使用一轮AES (aesenc)和128位异或运算来构建有效的轮函数的方法,并找到了几种有效的候选方法,但在速度和状态大小方面似乎仍然存在进一步改进的潜力。为了最小化一轮的关键路径,我们删除了在一轮中以级联方式同时应用aesenc和XOR的情况。通过在round函数中引入无成本的块排列,我们能够在不牺牲性能的情况下在更大的空间中搜索候选对象。因此,我们获得了比Jean和nikoliki的候选更小的状态大小的更有效的结构。基于新发现的round函数,我们结合多次报道的针对AEGIS家族和Tiaxion-346的攻击,精心设计了相应的256位安全性的AEAD方案。我们的AEAD方案可以达到138Gbps,比SNOW-V的AEAD方案快4倍。Rocca也比其他256位密钥长度的高效方案快得多,例如AEGIS-256和AES-256-GCM。据我们所知,Rocca是第一个针对6个系统的专用加密算法,即256位密钥长度和超过100gbps的速度。
{"title":"Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G","authors":"Kosei Sakamoto, Fukang Liu, Yuto Nakano, S. Kiyomoto, Takanori Isobe","doi":"10.46586/tosc.v2021.i2.1-30","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.1-30","url":null,"abstract":"In this paper, we present an AES-based authenticated-encryption with associated-data scheme called Rocca, with the purpose to reach the requirements on the speed and security in 6G systems. To achieve ultra-fast software implementations, the basic design strategy is to take full advantage of the AES-NI and SIMD instructions as that of the AEGIS family and Tiaoxin-346. Although Jean and Nikolić have generalized the way to construct efficient round functions using only one round of AES (aesenc) and 128-bit XOR operation and have found several efficient candidates, there still seems to exist potential to further improve it regarding speed and state size. In order to minimize the critical path of one round, we remove the case of applying both aesenc and XOR in a cascade way for one round. By introducing a cost-free block permutation in the round function, we are able to search for candidates in a larger space without sacrificing the performance. Consequently, we obtain more efficient constructions with a smaller state size than candidates by Jean and Nikolić. Based on the newly-discovered round function, we carefully design the corresponding AEAD scheme with 256-bit security by taking several reported attacks on the AEGIS family and Tiaxion-346 into account. Our AEAD scheme can reach 138Gbps which is 4 times faster than the AEAD scheme of SNOW-V. Rocca is also much faster than other efficient schemes with 256-bit key length, e.g. AEGIS-256 and AES-256-GCM. As far as we know, Rocca is the first dedicated cryptographic algorithm targeting 6 systems, i.e., 256-bit key length and the speed of more than 100 Gbps.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"8 1","pages":"1-30"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89793087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny 面向线性密钥调度密码上的密钥恢复的自动搜索:在SKINNY和ForkSkinny中回旋镖的应用
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.249-291
Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu
Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today. In those models, the optimizing objective is usually the probability or the number of rounds of the distinguishers. If we want to recover the secret key for a round-reduced block cipher, there are usually two phases, i.e., finding an efficient distinguisher and performing key-recovery attack by extending several rounds before and after the distinguisher. The total number of attacked rounds is not only related to the chosen distinguisher, but also to the extended rounds before and after the distinguisher. In this paper, we try to combine the two phases in a uniform automatic model.Concretely, we apply this idea to automate the related-key rectangle attacks on SKINNY and ForkSkinny. We propose some new distinguishers with advantage to perform key-recovery attacks. Our key-recovery attacks on a few versions of round-reduced SKINNY and ForkSkinny cover 1 to 2 more rounds than the best previous attacks.
以高概率搜索尽可能多轮的区分词的自动建模,如MILP、SAT/SMT、CP模型等,已成为当今密码分析的热门课题。在这些模型中,优化目标通常是区分器的概率或轮数。如果我们想要恢复一个轮精简分组密码的秘密密钥,通常有两个阶段,即找到一个有效的区分符,并通过在区分符前后延长几轮进行密钥恢复攻击。攻击的总回合数不仅与所选择的区分者有关,还与区分者前后的延长回合数有关。在本文中,我们试图将这两个阶段结合在一个统一的自动模型中。具体来说,我们将这个想法应用于对SKINNY和ForkSkinny的相关密钥矩形攻击的自动化。我们提出了一些新的区分符,它们具有执行密钥恢复攻击的优势。我们在几个版本的减圆SKINNY和ForkSkinny上的键恢复攻击比之前最好的攻击多了1到2个回合。
{"title":"Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny","authors":"Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang, Keting Jia, Yunwen Liu","doi":"10.46586/tosc.v2021.i2.249-291","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.249-291","url":null,"abstract":"Automatic modelling to search distinguishers with high probability covering as many rounds as possible, such as MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today. In those models, the optimizing objective is usually the probability or the number of rounds of the distinguishers. If we want to recover the secret key for a round-reduced block cipher, there are usually two phases, i.e., finding an efficient distinguisher and performing key-recovery attack by extending several rounds before and after the distinguisher. The total number of attacked rounds is not only related to the chosen distinguisher, but also to the extended rounds before and after the distinguisher. In this paper, we try to combine the two phases in a uniform automatic model.Concretely, we apply this idea to automate the related-key rectangle attacks on SKINNY and ForkSkinny. We propose some new distinguishers with advantage to perform key-recovery attacks. Our key-recovery attacks on a few versions of round-reduced SKINNY and ForkSkinny cover 1 to 2 more rounds than the best previous attacks.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"3 1","pages":"656"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76729711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications 算法替代攻击:状态重置检测和非对称修改
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-06-11 DOI: 10.46586/tosc.v2021.i2.389-422
Philip Hodges, D. Stebila
In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic scheme is substituted for a subverted version. First, we formalize and study the use of state resets to detect ASAs, and show that many published stateful ASAs are detectable with simple practical methods relying on state resets. Second, we introduce two asymmetric ASAs on symmetric encryption, which are undetectable or unexploitable even by an adversary who knows the embedded subversion key. We also generalize this result, allowing for any symmetric ASA (on any cryptographic scheme) satisfying certain properties to be transformed into an asymmetric ASA. Our work demonstrates the broad application of the techniques first introduced by Bellare, Paterson, and Rogaway (Crypto 2014) and Bellare, Jaeger, and Kane (CCS 2015) and reinforces the need for precise definitions surrounding detectability of stateful ASAs.
在本文中,我们研究了算法替换攻击(ASAs),其中加密方案中的算法被替换为被破坏的版本。首先,我们形式化并研究了使用状态重置来检测asa,并表明许多已发布的有状态asa可以通过依赖于状态重置的简单实用方法进行检测。其次,我们在对称加密上引入了两个非对称asa,即使知道嵌入的subversion密钥的攻击者也无法检测或利用它们。我们还推广了这一结果,允许将满足某些属性的任何对称ASA(在任何加密方案上)转换为非对称ASA。我们的工作展示了Bellare, Paterson, and Rogaway (Crypto 2014)和Bellare, Jaeger, and Kane (CCS 2015)首次引入的技术的广泛应用,并加强了对有状态asa可检测性的精确定义的需求。
{"title":"Algorithm Substitution Attacks: State Reset Detection and Asymmetric Modifications","authors":"Philip Hodges, D. Stebila","doi":"10.46586/tosc.v2021.i2.389-422","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i2.389-422","url":null,"abstract":"In this paper, we study algorithm substitution attacks (ASAs), where an algorithm in a cryptographic scheme is substituted for a subverted version. First, we formalize and study the use of state resets to detect ASAs, and show that many published stateful ASAs are detectable with simple practical methods relying on state resets. Second, we introduce two asymmetric ASAs on symmetric encryption, which are undetectable or unexploitable even by an adversary who knows the embedded subversion key. We also generalize this result, allowing for any symmetric ASA (on any cryptographic scheme) satisfying certain properties to be transformed into an asymmetric ASA. Our work demonstrates the broad application of the techniques first introduced by Bellare, Paterson, and Rogaway (Crypto 2014) and Bellare, Jaeger, and Kane (CCS 2015) and reinforces the need for precise definitions surrounding detectability of stateful ASAs.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"7 1","pages":"389-422"},"PeriodicalIF":3.5,"publicationDate":"2021-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85235948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
IACR Transactions on Symmetric Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1