2014
DOI: 10.1007/978-3-319-13051-4_14
|View full text |Cite
|
Sign up to set email alerts
|

Practical Cryptanalysis of PAES

Abstract: Abstract. We present two practical attacks on the CAESAR candidate PAES. The first attack is a universal forgery for any plaintext with at least 240 bytes. It works for the nonce-repeating variant of PAES and in a nutshell it is a state recovery based on solving differential equations for the S-box leaked throught the ciphertext that arise when the plaintext has a certain difference. We show that to produce the forgery based on this method the attacker needs only 2 11 time and data. The second attack is a dist… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 3 publications
(4 reference statements)
0
2
0
Order By: Relevance
“…Such problems are avoided when round constants are introduced: this breaks the symmetry inside every round, as well as the symmetry between rounds. Several ciphers are vulnerable to attacks resulting from this property, such as the CAESAR candidate PAES [52,53] and the first version of Haraka [51]. The aforementioned design criterion, already present in Simpira v1, excludes the round constants of these designs.…”
Section: Design Rationale Of Simpiramentioning
confidence: 99%
“…Such problems are avoided when round constants are introduced: this breaks the symmetry inside every round, as well as the symmetry between rounds. Several ciphers are vulnerable to attacks resulting from this property, such as the CAESAR candidate PAES [52,53] and the first version of Haraka [51]. The aforementioned design criterion, already present in Simpira v1, excludes the round constants of these designs.…”
Section: Design Rationale Of Simpiramentioning
confidence: 99%
“…The main observation for both attacks uses symmetric properties of the keyless AES round function that are not prevented in Haraka due to highly structured round constants. This kind of structural weakness has already been used in the past against some primitives, for instance the submission PAES [JNSW14] to the CAESAR competition [Ber] in [JNSW16], or the lightweight block cipher Midori [BBI + 15] in [GJN + 15].…”
Section: Introductionmentioning
confidence: 99%