z-logo
open-access-imgOpen Access
Understanding RUP Integrity of COLM
Author(s) -
Nilanjan Datta,
Atul Luykx,
Bart Mennink,
Mridul Nandi
Publication year - 2017
Publication title -
iacr transaction on symmetric cryptology
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.715
H-Index - 10
ISSN - 2519-173X
DOI - 10.46586/tosc.v2017.i2.143-161
Subject(s) - cryptographic nonce , mixing (physics) , authenticated encryption , computer science , parallelizable manifold , invertible matrix , function (biology) , encryption , mathematics , algorithm , computer security , physics , pure mathematics , quantum mechanics , evolutionary biology , biology
The authenticated encryption scheme COLM is a third-round candidate in the CAESAR competition. Much like its antecedents COPA, ELmE, and ELmD, COLM consists of two parallelizable encryption layers connected by a linear mixing function. While COPA uses plain XOR mixing, ELmE, ELmD, and COLM use a more involved invertible mixing function. In this work, we investigate the integrity of the COLM structure when unverified plaintext is released, and demonstrate that its security highly depends on the choice of mixing function. Our results are threefold. First, we discuss the practical nonce-respecting forgery by Andreeva et al. (ASIACRYPT 2014) against COPA’s XOR mixing. Then we present a noncemisusing forgery against arbitrary mixing functions with practical time complexity. Finally, by using significantly larger queries, we can extend the previous forgery to be nonce-respecting.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here