State-Recovery Attacks on Modified Ketje Jr

In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash function. Several versions of Ketje have been s...

Full description

Bibliographic Details
Main Authors: Thomas Fuhr, María Naya-Plasencia, Yann Rotella
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2018-03-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/843
id doaj-b023db0acf994e7bb17dfc737cbb2e1d
record_format Article
spelling doaj-b023db0acf994e7bb17dfc737cbb2e1d2021-03-02T10:47:54ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2018-03-01295610.13154/tosc.v2018.i1.29-56843State-Recovery Attacks on Modified Ketje JrThomas Fuhr0María Naya-Plasencia1Yann Rotella2ANSSI Crypto Lab 51, boulevard de La Tour-Maubourg 75700 Paris 07 SPInria ParisInria ParisIn this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash function. Several versions of Ketje have been submitted, with different sizes for its internal state. We describe several state-recovery attacks on the smaller variant, called Ketje Jr. We show that if one increases the amount of keystream output after each round from 16 bits to 40 bits, Ketje Jr becomes vulnerable to divide-and-conquer attacks with time complexities 271.5 for the original version and 282.3 for the current tweaked version, both with a key of 96 bits. We also propose a similar attack when considering rates of 32 bits for the non-tweaked version. Our findings do not threaten the security of Ketje, but should be taken as a warning against potential future modifications that would aim at increasing the performance of the algorithm.https://tosc.iacr.org/index.php/ToSC/article/view/843KetjeAuthenticated Encryptioncryptanalysisdivide-and-conquernonlinear sieving
collection DOAJ
language English
format Article
sources DOAJ
author Thomas Fuhr
María Naya-Plasencia
Yann Rotella
spellingShingle Thomas Fuhr
María Naya-Plasencia
Yann Rotella
State-Recovery Attacks on Modified Ketje Jr
IACR Transactions on Symmetric Cryptology
Ketje
Authenticated Encryption
cryptanalysis
divide-and-conquer
nonlinear sieving
author_facet Thomas Fuhr
María Naya-Plasencia
Yann Rotella
author_sort Thomas Fuhr
title State-Recovery Attacks on Modified Ketje Jr
title_short State-Recovery Attacks on Modified Ketje Jr
title_full State-Recovery Attacks on Modified Ketje Jr
title_fullStr State-Recovery Attacks on Modified Ketje Jr
title_full_unstemmed State-Recovery Attacks on Modified Ketje Jr
title_sort state-recovery attacks on modified ketje jr
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2018-03-01
description In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash function. Several versions of Ketje have been submitted, with different sizes for its internal state. We describe several state-recovery attacks on the smaller variant, called Ketje Jr. We show that if one increases the amount of keystream output after each round from 16 bits to 40 bits, Ketje Jr becomes vulnerable to divide-and-conquer attacks with time complexities 271.5 for the original version and 282.3 for the current tweaked version, both with a key of 96 bits. We also propose a similar attack when considering rates of 32 bits for the non-tweaked version. Our findings do not threaten the security of Ketje, but should be taken as a warning against potential future modifications that would aim at increasing the performance of the algorithm.
topic Ketje
Authenticated Encryption
cryptanalysis
divide-and-conquer
nonlinear sieving
url https://tosc.iacr.org/index.php/ToSC/article/view/843
work_keys_str_mv AT thomasfuhr staterecoveryattacksonmodifiedketjejr
AT marianayaplasencia staterecoveryattacksonmodifiedketjejr
AT yannrotella staterecoveryattacksonmodifiedketjejr
_version_ 1724236119239819264