Abstract. ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication component of ALE is based on the strong Pelican MAC, and the authentication security of ALE is claimed to be 128-bit. In this paper, we propose the leaked-state-forgery attack (LSFA) against ALE by exploiting the state information leaked from the encryption of ALE. The LSFA is a new type of differential cryptanalysis in which part of the state information is known and exploited to improve the differential probability. Our attack shows that the authentication security of ALE is only 97-bit. And the results may be further improved to around 93-bit if the whitening key layer is removed. We implemented our attacks against a small version of ALE (...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic co...
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was desi...
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was desi...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
Abstract. The security of two message authentication code (MAC) al-gorithms is considered: the MD5-b...
Although AES is designed to be secure against a wide variety of linear and differential attacks, sec...
The security of the ISO banking standard Message Authenticator Algorithm (ISO 8731-2), also known as...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
Abstract. PAES is an authenticated encryption scheme designed by Ye et al., and submitted to the CAE...
Rocca is an authenticated encryption with associated data scheme for beyond 5G/6G systems. It was pr...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
In this paper, we analyse a block cipher mode of operation submitted in 2014 to the cryptographic co...
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was desi...
In this paper, a new lightweight authenticated encryption scheme AESLBBB is proposed, which was desi...
The security of two message authentication code (MAC) al- gorithms is considered: the MD5-based enve...
Abstract. The security of two message authentication code (MAC) al-gorithms is considered: the MD5-b...
Although AES is designed to be secure against a wide variety of linear and differential attacks, sec...
The security of the ISO banking standard Message Authenticator Algorithm (ISO 8731-2), also known as...
Abstract. COPA is a block-cipher-based authenticated encryption mode with a provable birthday-bound ...
Abstract. PAES is an authenticated encryption scheme designed by Ye et al., and submitted to the CAE...
Rocca is an authenticated encryption with associated data scheme for beyond 5G/6G systems. It was pr...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
An algorithm substitution attack (ASA) can undermine the security of cryptographic primitives by sub...