Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one of the winners of the CAESAR competition and one of the finalists of the NIST lightweight cryptography standardization effort. As this competition comes to an end, we analyse the security of this algorithm against cube attacks. We present a practical cube attack against the full 6-round encryption in Ascon in the nonce-misuse setting. We note right away that this attack does not violate the security claims made by the designers of Ascon, due to this setting.Our cryptanalysis is a conditional cube attack that is capable of recovering the full capacity in practical time; but for Ascon-128, its extension to a key recovery or a forgery is still a...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
Abstract. We present a detailed security analysis of the CAESAR can-didate Ascon. Amongst others, cu...
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds A...
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of t...
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being de...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023)....
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
International audienceAscon is a sponge-based Authenticated Encryption with Associated Data that was...
Ascon is a sponge-based Authenticated Encryption with Associated Data that was selected as both one ...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
This paper evaluates the secure level of authenticated encryption Ascon against cube-like method. As...
Abstract. We present a detailed security analysis of the CAESAR can-didate Ascon. Amongst others, cu...
At ToSC 2021, Rohit et al. presented the first distinguishing and key recovery attacks on 7 rounds A...
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of t...
ASCON is an authenticated encryption algorithm which is recently qualified for the second-round of t...
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being de...
The cube attack was proposed at the 2009 Eurocrypt. The attack derives linear polynomials for specif...
Ascon is the final winner of the lightweight cryptography standardization competition (2018 − 2023)....
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...
Automated methods have become crucial components when searching for distinguishers against symmetric...