2019
DOI: 10.1007/978-3-030-26951-7_8
|View full text |Cite
|
Sign up to set email alerts
|

Low-Memory Attacks Against Two-Round Even-Mansour Using the 3-XOR Problem

Abstract: The iterated Even-Mansour construction is an elegant construction that idealizes block cipher designs such as the AES. In this work we focus on the simplest variant, the 2-round Even-Mansour construction with a single key. This is the most minimal construction that offers security beyond the birthday bound: there is a security proof up to 2 2n/3 evaluations of the underlying permutations and encryption, and the best known attacks have a complexity of roughly 2 n /n operations. We show that attacking this schem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 20 publications
0
5
0
Order By: Relevance
“…This problem has recently seen a renewed interest because of its potential use in cryptanalysis: it is used as a building block in a generic attack [Nan15] against the COPA [ABL + 13] mode of operation for authenticated encryption. Another recent attack [LS19] against the two-round single-key Even-Mansour cipher [EM91] also works by reducing it to a 3XOR computation. An instance of the 3XOR problem can be solved by several algorithms summarized in Table 1.…”
Section: Context Of This Workmentioning
confidence: 99%
“…This problem has recently seen a renewed interest because of its potential use in cryptanalysis: it is used as a building block in a generic attack [Nan15] against the COPA [ABL + 13] mode of operation for authenticated encryption. Another recent attack [LS19] against the two-round single-key Even-Mansour cipher [EM91] also works by reducing it to a 3XOR computation. An instance of the 3XOR problem can be solved by several algorithms summarized in Table 1.…”
Section: Context Of This Workmentioning
confidence: 99%
“…The first line of work is the quest for designing better algorithms for generalized birthday problems, where the goal is to find a single k-SUM or k-XOR solution out of many. The systematic analysis of this problem was initiated by Wagner [35] in his k-tree algorithm, 2 and has led to numerous refined algorithms and applications thereof [13,22,24,29,31].…”
Section: Related Workmentioning
confidence: 99%
“…Similarly to 3-SUM, a simple filtering algorithm has complexity T = Õ(N/r) for N 1/3 ≤ r ≤ N 1/2 . The dense 3-XOR problem has various applications in cryptography and cryptanalysis [9,14,22,24,31]. While mild (logarithmic in N ) improvements to the simple filtering algorithm are known [22,24,31], any substantial (i.e., polynomial in N ) improvement would be considered a breakthrough.…”
Section: Introduction 1backgroundmentioning
confidence: 99%
See 1 more Smart Citation
“…This attack was later refined in [NS15], using an improved 3-xor algorithm, to 2 n/2− queries and 2 n/2− )operations, for small . In [LS19], the authors attacked the 2-round Even Mansour algorithm using this problem with data and time both lower than 2 n . However, the algorithm we use was proposed by Joux [Jou09, Section 8.3.3.1], which is the best algorithm for the 3-xor problem to this day.…”
Section: Improving Complexities Using the 3-xor Problemmentioning
confidence: 99%