2020
DOI: 10.1007/978-3-030-56877-1_13
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis Results on Spook

Abstract: Spook [BBB + 19] is one of the 32 candidates that has made it to the second round of the NIST Lightweight Cryptography Standardization process, and is particularly interesting since it proposes differential side channel resistance. In this paper, we present practical distinguishers of the full 6-step version of the underlying permutations of Spook, namely Shadow-512 and Shadow-384, solving challenges proposed by the designers on the permutation. We also propose practical forgeries with 4-step Shadow for the S1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(7 citation statements)
references
References 15 publications
(4 reference statements)
0
7
0
Order By: Relevance
“…Though our results do not pose a direct threat to the Gimli NIST candidate, low-complexity full-round distinguishers on the permutation or reduced-round attacks for a high proportion of the rounds (specially when not predicted by the designers) have been considered in some cases as an issue worth countering by proposing a tweak, as can be seen for instance in the modification [3] recently proposed by the Spook team [2] to protect against the cryptanalysis results from [15].…”
Section: Resultsmentioning
confidence: 89%
See 4 more Smart Citations
“…Though our results do not pose a direct threat to the Gimli NIST candidate, low-complexity full-round distinguishers on the permutation or reduced-round attacks for a high proportion of the rounds (specially when not predicted by the designers) have been considered in some cases as an issue worth countering by proposing a tweak, as can be seen for instance in the modification [3] recently proposed by the Spook team [2] to protect against the cryptanalysis results from [15].…”
Section: Resultsmentioning
confidence: 89%
“…3. We now guess 15 . Given this, and 15 , and the output 13 that must be met, we obtain the whole state by solving another simple SP-Box equation (which is not Equation ( 10), but has a similar form).…”
Section: Semi-free Start Collisions On Reduced-round Gimlimentioning
confidence: 95%
See 3 more Smart Citations