2014
DOI: 10.1007/978-3-662-45611-8_4
|View full text |Cite
|
Sign up to set email alerts
|

Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key (Extended Abstract)

Abstract: In this paper we pick up an old challenge to design public key or white-box constructions from symmetric cipher components. We design several encryption schemes based on the ASASA structure ranging from fast and generic symmetric ciphers to compact public key and whitebox constructions based on generic affine transformations combined with specially designed low degree non-linear layers. While explaining our design process we show several instructive attacks on the weaker variants of our schemes 1 .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

1
113
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 85 publications
(114 citation statements)
references
References 44 publications
(61 reference statements)
1
113
0
Order By: Relevance
“…The first attack on an ASASA scheme from [BBK14] was a decomposition attack targeting the expanding public-key scheme [GPT15], as mentioned in the introduction. Our techniques are entirely different, and target all ASASA schemes from [BBK14] except the one already broken in [GPT15].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The first attack on an ASASA scheme from [BBK14] was a decomposition attack targeting the expanding public-key scheme [GPT15], as mentioned in the introduction. Our techniques are entirely different, and target all ASASA schemes from [BBK14] except the one already broken in [GPT15].…”
Section: Related Workmentioning
confidence: 99%
“…Their approach focuses on small-block ASASA instances, and is thus only applicable to the white-box scheme of [BBK14]. Section 5 of [DDKL15] is essentially the same attack as ours, minus the heuristic improvements from our Section 6.3, which allow us, for instance, to break the 20-bit instance in practice with very limited means using this approach.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, the attack targeting the SASAS construction has been recently extended to larger constructions [1]. The ASASA structure, which might look weaker at first glance due to its lower number of non-linear layers, has actually proved to be a challenging target; it was even proposed as the basis for public key encryption and white-box scheme [2]. Attacking this generic structure requires sophisticated methods presented in [3] and [4].…”
Section: Introductionmentioning
confidence: 99%
“…in [5]. In this paper, Biryukov et al describe a memory-hard white-box encryption scheme relying on a SPN with large S-Boxes built like smaller SPN.…”
Section: Introductionmentioning
confidence: 99%