z-logo
open-access-imgOpen Access
D inamite : internal differential match‐in‐the‐end attack on eight‐round PAEQ
Author(s) -
Saha Dhiman,
Kakarla Sourya,
Roy Chowdhury Dipanwita
Publication year - 2019
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2018.5033
Subject(s) - block cipher , cryptographic nonce , computer science , cryptanalysis , slide attack , differential cryptanalysis , differential (mechanical device) , ciphertext , key (lock) , algorithm , theoretical computer science , computer security , cryptography , encryption , engineering , aerospace engineering
The authors explore a cryptanalysis strategy which seems to be particularly applicable to parallelisable ciphers where the key forms a part of the internal state. The proposed technique combines internal differentials with guess and determine analysis to come up with what is referred to as the match‐in‐the‐end attack. The notion of difference here deviates from the classical differential where the difference is controllable via the plaintext/ciphertext. Here, they exploit the Hamming distance between parallel branches to devise the differential trail. They apply the strategy on full eight (out of 20) rounds of parallelisable authenticated cipher [parallelisable AE based on quadrupled AES ( PAEQ )] to devise key recovery attacks with practical time complexities. They first show an initial attack on paeq‐64/80/128 and then devise improvements which give us the best key‐recovery attacks with time complexities of 2 33 , 2 48 , and 2 64 , respectively. While the best reported attacks on eight‐round paeq‐64/80/128 have a data complexity of 2 89blocks, the result improves their time complexities by factors of 2 , 2 18 , and 2 34 , while preserving the data complexity. Finally, they present a nonce‐based differential attack which works on paeq‐128‐t with 2 64time complexity but uses just two single block known plaintexts making it the most practical attack on any round‐reduced PAEQ variant reported so far.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here