State-Recovery Attacks on Modified Ketje Jr
In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash function. Several versions of Ketje have been s...
Main Authors: | Thomas Fuhr, María Naya-Plasencia, Yann Rotella |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2018-03-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/843 |
Similar Items
-
Cube-like Attack on Round-Reduced Initialization of Ketje Sr
by: Xiaoyang Dong, et al.
Published: (2017-03-01) -
Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach
by: Chunning Zhou, et al.
Published: (2020-01-01) -
Is AEZ v4.1 Sufficiently Resilient Against Key-Recovery Attacks?
by: Colin Chaigneau, et al.
Published: (2016-12-01) -
Analyzing the Linear Keystream Biases in AEGIS
by: Maria Eichlseder, et al.
Published: (2020-01-01) -
New Conditional Cube Attack on Keccak Keyed Modes
by: Zheng Li, et al.
Published: (2019-06-01)