2019
DOI: 10.1007/978-3-030-35199-1_10
|View full text |Cite
|
Sign up to set email alerts
|

Forgery Attacks on FlexAE and FlexAEAD

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…Bleep64 [5,41], CLAE [38], FlexAEAD [11,12], GAGE and InGAGE [4], HERN and HERON [21], Liliput-AE [9,10], Limdolen [35,36], Qameleon [13], Quartet [33], Remus [14], Simple [23], SIV-Rijndael256 [8], SIV-TEM-PHOTON [8], SNEIK [15], Sycon [24], TGIF [14], Triad [25]…”
Section: Forgery Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…Bleep64 [5,41], CLAE [38], FlexAEAD [11,12], GAGE and InGAGE [4], HERN and HERON [21], Liliput-AE [9,10], Limdolen [35,36], Qameleon [13], Quartet [33], Remus [14], Simple [23], SIV-Rijndael256 [8], SIV-TEM-PHOTON [8], SNEIK [15], Sycon [24], TGIF [14], Triad [25]…”
Section: Forgery Attacksmentioning
confidence: 99%
“…FlexAEAD. Eichlseder et al [11,12] showed a forgery attack on FlexAEAD. Additionally, Mege [20] showed that FlexAEAD is vulnerable against length-extension attacks.…”
Section: CLXmentioning
confidence: 99%
“…The next is the SBox layer, where each quarter suffers a nonlinear transformation using a different SBox. The first SBox is the AES SBox, the other SBoxes are generate using the process as the first (multiplicative inverse on the 2 8 ) using different irreducible polynomial (IP), multiplicative constant (MC) and additive constants (A).…”
Section: Algorithm Descriptionmentioning
confidence: 99%
“…Furthermore, they showed that these attacks can be leveraged into a forgery attack on the entire encryption scheme, with complexity of 2 50 , 2 60 , and 2 80 for FlexAEAD-64, FlexAEAD-128, and FlexAEAD-256 (respectively). In [3] (on which this paper is partially based), Eichlseder et al presented improved forgery attacks on the cryptosystem, with complexities of 2 46 , 2 54 , and 2 70 for FlexAEAD-64, FlexAEAD-128, and FlexAEAD-256 (respectively). Due to these forgery attacks, FlexAEAD was not selected for the second round of evaluation in the NIST LWC standartization project [15].…”
Section: Introductionmentioning
confidence: 99%
“…In this paper we present a practical key recovery attack on FlexAEAD-64. Like in [3,16], the starting point of our attack is a truncated differential of PF K . However, the application of PF K in the mode which we target differs from the application targeted in [3,16].…”
Section: Introductionmentioning
confidence: 99%