State Recovery Attacks Against \$\textbackslashpi\$-cipher
Title | State Recovery Attacks Against \$\textbackslashpi\$-cipher |
Publication Type | Conference Paper |
Year of Publication | 2016 |
Authors | Alley, Joseph, Pieprzyk, Josef |
Conference Name | Proceedings of the Australasian Computer Science Week Multiconference |
Publisher | ACM |
Conference Location | New York, NY, USA |
ISBN Number | 978-1-4503-4042-7 |
Keywords | ARX, Caesar, cryptanalysis, divide and conquer attack, Lightweight Ciphers, pubcrawl, Resiliency, sponge construction, π-cipher |
Abstract | p-Cipher is one of the twenty-nine candidates in the second round of the CAESAR competition for authenticated ciphers. p-Cipher uses a parallel sponge construction, based upon an ARX permutation. This work shows several state recovery attacks, on up to three rounds. These attacks use known values in the function's bitrate, combined with values found through exhaustive search, to retrieve the remaining values in the internal state. These attacks can break one round, for any variant of p-Cipher, in negligible time. They can also break two or three rounds much faster than exhaustive search on the key, for some variants. However, these attacks only work against version 1 of p-Cipher, due to the differences in the padding function for version 2.0. To fill this gap, this work also includes a one round attack against version 2.0, building upon the distinguisher present in the p-Cipher submission document. |
URL | http://doi.acm.org/10.1145/2843043.2843361 |
DOI | 10.1145/2843043.2843361 |
Citation Key | alley_state_2016 |