...
首页> 外文期刊>Journal of Cryptology >A Practical Forgery Attack on Lilliput-AE
【24h】

A Practical Forgery Attack on Lilliput-AE

机译:对Lilliput-AE的实用伪造攻击

获取原文
获取原文并翻译 | 示例
           

摘要

Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalysis so far suggests that it has a large security margin. In this note, we present an extremely efficient forgery attack on Lilliput-AE: Given a single arbitrary message of length about236bytes, we can instantly produce another valid message that leads to the same tag, along with the corresponding ciphertext. The attack uses a weakness in the tweakey schedule of Lilliput-AE which leads to the existence of a related-tweak differential characteristic with probability 1 in the underlying block cipher. The weakness we exploit, which does not exist in Lilliput, demonstrates the potential security risk in using a very simple tweakey schedule in which the same part of the key/tweak is reused in every round, even when round constants are employed to prevent slide attacks. Following this attack, the Lilliput-AE submission to NIST was tweaked.
机译:Lilliput-AE是一个调节块密码,作为NIST轻量级加密标准化过程的候选者。它基于轻质块密码Lilliput,其密码分析到目前为止表明它具有大的安全保证金。在本说明中,我们对Lilliput-AE提供了一个非常有效的伪造攻击:给定长度约236bytes的单个任意消息,我们可以立即生成另一个有效消息,导致相同的标签,以及相应的密文。该攻击利用Lilliput-AE的Tweakek调度中的弱点,这导致底层块密码中具有概率1的相关调整差分特性。我们利用在Lilliput中的弱点展示了使用一个非常简单的双击时间表的潜在的安全风险,其中在每个回合中重复使用钥匙/调整的相同部分,即使是使用圆形常数以防止幻灯片攻击。在此次攻击之后,调整了对NIST的Lilliput-AE提交。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号