Visible to the public State Recovery Attacks Against \$\textbackslashpi\$-cipher

TitleState Recovery Attacks Against \$\textbackslashpi\$-cipher
Publication TypeConference Paper
Year of Publication2016
AuthorsAlley, Joseph, Pieprzyk, Josef
Conference NameProceedings of the Australasian Computer Science Week Multiconference
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4042-7
KeywordsARX, Caesar, cryptanalysis, divide and conquer attack, Lightweight Ciphers, pubcrawl, Resiliency, sponge construction, π-cipher
Abstract

p-Cipher is one of the twenty-nine candidates in the second round of the CAESAR competition for authenticated ciphers. p-Cipher uses a parallel sponge construction, based upon an ARX permutation. This work shows several state recovery attacks, on up to three rounds. These attacks use known values in the function's bitrate, combined with values found through exhaustive search, to retrieve the remaining values in the internal state. These attacks can break one round, for any variant of p-Cipher, in negligible time. They can also break two or three rounds much faster than exhaustive search on the key, for some variants. However, these attacks only work against version 1 of p-Cipher, due to the differences in the padding function for version 2.0. To fill this gap, this work also includes a one round attack against version 2.0, building upon the distinguisher present in the p-Cipher submission document.

URLhttp://doi.acm.org/10.1145/2843043.2843361
DOI10.1145/2843043.2843361
Citation Keyalley_state_2016