Leaked-state-forgery attack against the authenticated encryption algorithm ALE
文献类型:会议论文
作者 | Wu, Shengbao (1) ; Wu, Hongjun (2) ; Huang, Tao (2) ; Wang, Mingsheng (4) ; Wu, Wenling (1) |
出版日期 | 2013 |
会议名称 | 19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013 |
会议日期 | December 1, 2013 - December 5, 2013 |
会议地点 | Bengaluru, India |
页码 | 377-404 |
中文摘要 | ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication component of ALE is based on the strong Pelican MAC, and the authentication security of ALE is claimed to be 128-bit. In this paper, we propose the leaked-state-forgery attack (LSFA) against ALE by exploiting the state information leaked from the encryption of ALE. The LSFA is a new type of differential cryptanalysis in which part of the state information is known and exploited to improve the differential probability. Our attack shows that the authentication security of ALE is only 97-bit. And the results may be further improved to around 93-bit if the whitening key layer is removed. We implemented our attacks against a small version of ALE (using 64-bit block size instead of 128-bit block size). The experimental results match well with the theoretical results. © 2013 Springer-Verlag. |
英文摘要 | ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication component of ALE is based on the strong Pelican MAC, and the authentication security of ALE is claimed to be 128-bit. In this paper, we propose the leaked-state-forgery attack (LSFA) against ALE by exploiting the state information leaked from the encryption of ALE. The LSFA is a new type of differential cryptanalysis in which part of the state information is known and exploited to improve the differential probability. Our attack shows that the authentication security of ALE is only 97-bit. And the results may be further improved to around 93-bit if the whitening key layer is removed. We implemented our attacks against a small version of ALE (using 64-bit block size instead of 128-bit block size). The experimental results match well with the theoretical results. © 2013 Springer-Verlag. |
收录类别 | EI |
会议录出版地 | Springer Verlag, Tiergartenstrasse 17, Heidelberg, D-69121, Germany |
语种 | 英语 |
ISSN号 | 3029743 |
ISBN号 | 9783642420320 |
源URL | [http://ir.iscas.ac.cn/handle/311060/16667] ![]() |
专题 | 软件研究所_软件所图书馆_会议论文 |
推荐引用方式 GB/T 7714 | Wu, Shengbao ,Wu, Hongjun ,Huang, Tao ,et al. Leaked-state-forgery attack against the authenticated encryption algorithm ALE[C]. 见:19th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2013. Bengaluru, India. December 1, 2013 - December 5, 2013. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。