In this work we study the security of Chaskey, a recent lightweight MAC designed by Mouha et al., currently being considered for standardisation by ISO/IEC and ITU-T. Chaskey uses an ARX structure very similar to SipHash. We present the first cryptanalysis of Chaskey in the single user setting, with a differential-linear attack against 6 and 7 rounds, hinting that the full version of Chaskey with 8 rounds has a rather small security margin. In response to these attacks, a 12-round version has been proposed by the designers. To improve the complexity of the differential-linear cryptanalysis, we refine a partitioning technique recently proposed by Biham and Carmeli to improve the linear cryptanalysis of addition operations. We also propose a...
The Chaskey MAC algorithm was presented by Mouha et al. at SAC 2014. It is designed for real-world a...
The Chaskey MAC algorithm was presented by Mouha et al. at SAC 2014. It is designed for real-world a...
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a nu...
International audienceIn this work we study the security of Chaskey, a recent lightweight MAC design...
In this work, we refine a partitioning technique recently proposed by Biham and Carmeli to improve t...
Abstract. In this work, we refine a partitioning technique recently proposed by Biham and Carmeli to...
We present several improvements to the framework of differential-linear attacks with a special focus...
Differential-linear attacks are a cryptanalysis family that has recently benefited from various tech...
The differential-linear attack is one of the most effective attacks against ARX ciphers. However, tw...
Abstract This work concentrates on differential-linear distinguishing attacks on the prominent ARX-b...
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher....
The rotational differential-linear attacks, proposed at EUROCRYPT 2021, is a generalization of diffe...
Differential-Linear (DL) cryptanalysis is a well known cryptanalytic technique that combines differe...
ChaCha has been one of the prominent ARX designs of the last few years because of its use in several...
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation, exclusiv...
The Chaskey MAC algorithm was presented by Mouha et al. at SAC 2014. It is designed for real-world a...
The Chaskey MAC algorithm was presented by Mouha et al. at SAC 2014. It is designed for real-world a...
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a nu...
International audienceIn this work we study the security of Chaskey, a recent lightweight MAC design...
In this work, we refine a partitioning technique recently proposed by Biham and Carmeli to improve t...
Abstract. In this work, we refine a partitioning technique recently proposed by Biham and Carmeli to...
We present several improvements to the framework of differential-linear attacks with a special focus...
Differential-linear attacks are a cryptanalysis family that has recently benefited from various tech...
The differential-linear attack is one of the most effective attacks against ARX ciphers. However, tw...
Abstract This work concentrates on differential-linear distinguishing attacks on the prominent ARX-b...
In this paper, we present an improved differential-linear cryptanalysis of the ChaCha stream cipher....
The rotational differential-linear attacks, proposed at EUROCRYPT 2021, is a generalization of diffe...
Differential-Linear (DL) cryptanalysis is a well known cryptanalytic technique that combines differe...
ChaCha has been one of the prominent ARX designs of the last few years because of its use in several...
In the last few years a new design paradigm, the so-called ARX (modular addition, rotation, exclusiv...
The Chaskey MAC algorithm was presented by Mouha et al. at SAC 2014. It is designed for real-world a...
The Chaskey MAC algorithm was presented by Mouha et al. at SAC 2014. It is designed for real-world a...
Multidimensional linear cryptanalysis of block ciphers is improved in this work by introducing a nu...