Diving Deep into the Weak Keys of Round Reduced Ascon
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds Ascon without violating the designer’s security claims of nonce-respecting setting and data limit of 264 blocks per key. So far, these are the best attacks on 7 rounds Ascon. However, the distinguisher...
Main Authors: | Rohit, R. (Author), Sarkar, S. (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universitat Bochum
2021
|
Subjects: | |
Online Access: | View Fulltext in Publisher |
Similar Items
-
Conditional Cube Attack on Round-Reduced ASCON
by: Zheng Li, et al.
Published: (2017-03-01) -
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
by: Raghvendra Rohit, et al.
Published: (2021-03-01) -
Exploring Differential-Based Distinguishers and Forgeries for ASCON
by: David Gerault, et al.
Published: (2021-09-01) -
Weak Keys in Reduced AEGIS and Tiaoxin
by: Fukang Liu, et al.
Published: (2021-06-01) -
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
by: Ling Song, et al.
Published: (2018-09-01)