2018
DOI: 10.46586/tosc.v2018.i1.29-56
|View full text |Cite
|
Sign up to set email alerts
|

State-Recovery Attacks on Modified Ketje Jr

Abstract: In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash function. Several versions of Ketje have been submitted, with different sizes for its internal state. We describe several state-recovery attacks on the smaller variant, called Ketje Jr. We show that if one increases the amount of keystream output after each roun… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(12 citation statements)
references
References 12 publications
0
12
0
Order By: Relevance
“…In the squeezing phase, Subterranean 2.0 outputs a block of 32 bits, each of which is the sum of two state bits: Z i = s 12 4i + s −12 4i , for 0 ≤ i < 32. Instead of outputting state bits directly, this extraction function is meant to frustrate state recovery attacks [10] in the nonce respected setting. In our one-round differential analysis, this extraction function allows more state bits…”
Section: Relation To the Extraction Functionmentioning
confidence: 99%
“…In the squeezing phase, Subterranean 2.0 outputs a block of 32 bits, each of which is the sum of two state bits: Z i = s 12 4i + s −12 4i , for 0 ≤ i < 32. Instead of outputting state bits directly, this extraction function is meant to frustrate state recovery attacks [10] in the nonce respected setting. In our one-round differential analysis, this extraction function allows more state bits…”
Section: Relation To the Extraction Functionmentioning
confidence: 99%
“…The security claimed by the authors for KETJE JR is determined by (96 ) for a key of size k. Based on the idea of meet-in-the-middle and the divide-and-conquer strategy, Ref. [12] gives state-recovery attacks on modified KETJE JR whose computation complexities are lower than exhaustive attack by using several consecutive blocks of keystream. The following is a brief introduction to the basic idea of this attack.…”
Section: State-recovery Attacks On Ketje Jr Based On Divide-and-conquer Strategymentioning
confidence: 99%
“…For details, please refer to Ref. [12]. Assume that the size of each keystream block is 40 bits, i.e.…”
Section: State-recovery Attacks On Ketje Jr Based On Divide-and-conquer Strategymentioning
confidence: 99%
See 2 more Smart Citations