2019
DOI: 10.1007/978-3-030-10970-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes

Abstract: This paper studies security of a family of lightweight permutations sLiSCP that was proposed by AlTawy et al. at SAC 2017. sLiSCP also specifies an authenticated encryption (AE) mode and a hashing mode based on the sponge framework, however the designers' analysis focuses on the indistinguishability of the permutation, and there is no analysis for those modes. This paper presents the first analysis of reduced-step sLiSCP in the AE and hashing modes fully respecting the recommended parameters and usage by the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 25 publications
0
5
0
Order By: Relevance
“…It occurs when the mechanism is prone to causing message payload manipulation but the message tag is accepted as valid [46]. The attack exploits the algorithm leaked state information to improve the differential success [74,75] and modify message payload and its packet header [76]. The adverse H launches a chosen plaintext forgery by obtaining the corresponding ciphertext of different consecutive blocks of the last algorithm block.…”
Section: Threat Modelingmentioning
confidence: 99%
“…It occurs when the mechanism is prone to causing message payload manipulation but the message tag is accepted as valid [46]. The attack exploits the algorithm leaked state information to improve the differential success [74,75] and modify message payload and its packet header [76]. The adverse H launches a chosen plaintext forgery by obtaining the corresponding ciphertext of different consecutive blocks of the last algorithm block.…”
Section: Threat Modelingmentioning
confidence: 99%
“…Liu et al [LSSW18] analyzed the differential properties of the sLiSCP permutation and presented a 15-step distinguisher for sLiSCP-192 and sLiSCP-256. They first focused on a 6-step iterative differential characteristic that maps a difference (0, 0, 0, α) to a difference (0, 0, 0, α).…”
Section: Previous Analysis On Sliscpmentioning
confidence: 99%
“…According to the designers, the best distinguisher for sLiSCP-light is a zero-sum distinguisher for 14 steps. The designers of Spix and SpoC cited the work by Liu et al [LSSW18] but did not mention the possibility of applying the rebound attack on sLiSCP to sLiSCP-light.…”
Section: Application To 15-step Lbd For Sliscp-lightmentioning
confidence: 99%
See 2 more Smart Citations