搜索结果: 1-15 共查到“forgery”相关记录36条 . 查询时间(0.1 秒)
Practical Forgery Attacks on Limdolen and HERN
NIST lightweight cryptography standardization project AEAD Limdolen
2019/8/8
In this paper, we investigate the security of Limdolen and HERN which are Round 1 submissions of the ongoing NIST Lightweight Cryptography Standardization Project. We show that some non-conservative d...
Lilliput-AE is a tweakable block cipher submitted as a candidate to the NIST lightweight cryptography standardization process. It is based upon the lightweight block cipher Lilliput, whose cryptanalys...
FlexAEAD is one of the round-1 candidates in the ongoing NIST Lightweight Cryptography standardization project. In this note, we show several forgery attacks on FlexAEAD with complexity less than the ...
mixFeed [CN19] is a round 1 candidate for the NIST Lightweight Cryptography Standardization Project. It is a single-pass, nonce-based, AES-based authenticated encryption algorithms. The authors claim ...
This document includes a collision/forgery attack against SNEIKEN128/192/256, where every message with more than 128 bytes of associated data can be converted into another message with different assoc...
Side-channel Assisted Existential Forgery Attack on Dilithium - A NIST PQC candidate
Dilithium Lattice based cryptography Digital Signatures
2018/11/19
The recent lattice-based signature scheme Dilithium, submitted as part of the CRYSTALS (Cryptographic Suite for Algebraic Lattices) package, is one of a number of strong candidates submitted for the N...
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions
MergeMAC universal forgery multiple forgeries
2018/9/6
This article presents universal forgery and multiple forgeries against MergeMAC that has been recently proposed to fit scenarios where bandwidth is limited and where strict time constraints apply. Mer...
Tweaking Generic OTR to Avoid Forgery Attacks
Authenticated encryption OTR confidentiality
2018/1/19
This paper considers the security of the Offset Two-Round (OTR) authenticated encryption mode \cite{cryptoeprint:2013:628} with respect to forgery attacks. The current version of OTR gives a security ...
In the quantum model, by utilizing the Simon's algorithm, we propose an efficient universal forgery attack to FKS, FKD and Keyak with complexity of O(c)O(c). Moreover, we also propose an efficient key...
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions
Universal forgery birthday attack CBC-MAC
2017/7/6
We also propose another some generic universal forgery attacks using collision finding with structural input messages, by birthday paradox in the classic setting. Since our attacks are based on the co...
HANUMAN is a mode of operation of a keyless cryptographic permutation for nonce-based authenticated encryption with associated data, included among the modes bundled in the PRIMATEs candidate in the c...
Breaking Into the KeyStore: A Practical Forgery Attack Against Android KeyStore
Android KeyStore authenticated encryption integrity
2016/7/7
We analyze the security of Android KeyStore, a system service whose purpose is to shield users credentials and cryptographic keys. The KeyStore protects the integrity and the confidentiality of keys b...
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
Authenticated encryption CAESAR ELmD
2016/6/22
In this paper, we provide a security analysis of ELmD: a block cipher based Encrypt-Linear-mix-Decrypt authentication mode. As being one of the second-round CAESAR candidate, it is claimed to provide ...
We investigate nonce reuse issues with the GCM block cipher mode as used in TLS and focus in particular on AES-GCM, the most widely deployed variant. With an Internet-wide scan we identified 184 HTTPS...
Twisted Polynomials and Forgery Attacks on GCM
Authenticated encryption polynomial hashing twisted polynomial ring (Ore ring)
2016/1/27
Polynomial hashing as an instantiation of universal hashing
is a widely employed method for the construction of MACs and authenticated
encryption (AE) schemes, the ubiquitous GCM being a prominent
...