TEDT, a Leakage-Resilient AEAD mode for High (Physical) Security Applications [PDF]
We propose TEDT, a new Authenticated Encryption with Associated Data (AEAD) mode leveraging Tweakable Block Ciphers (TBCs). TEDT provides the following features: (i) It offers asymptotically optimal security in the multi-user setting.
Chun Guo +4 more
core
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC [PDF]
In this paper, we study the relation of single-key impossible differentials with the related-tweakey/key ones and propose an interesting algorithm that can efficiently derive longer related-tweakey/key impossible differentials from single-key ones.
Rui Zong, Xiaoyang Dong
core
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers [PDF]
We analyze the multi-user (mu) security of a family of nonce-based authentication encryption (nAE) schemes based on a tweakable block cipher (TBC). The starting point of our work is an analysis of the mu security of the SCT-II mode which underlies the ...
Benoît Cogliati +3 more
core +1 more source
Optimally Secure TBC Based Accordion Mode [PDF]
The design of tweakable wide block ciphers has advanced significantly over the past two decades. This evolution began with the approach of designing a wide block cipher by Naor and Reingold.
Avijit Dutta +3 more
core
General Classification of the Authenticated Encryption Schemes for the CAESAR Competition [PDF]
An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the ``Competition for Authenticated Encryption: Security, Applicability, and Robustness\u27\u27) was co-founded by NIST and Dan ...
Christian Forler +2 more
core
Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC [PDF]
Kiasu-BC is a tweakable block cipher proposed by Jean et al. at ASIACRYPT 2014 alongside their TWEAKEY framework. The cipher is almost identical to the AES-128 except for the tweak, which renders it an attractive primitive for various modes of operation ...
Christoph Dobraunig, Eik List
core
A Note on the use of the Double Boomerang Connectivity Table (DBCT) for Spotting Impossibilities [PDF]
In this short note we examine one of the impossible boomerang distinguishers of Skinny-128-384 provided by Zhang, Wang and Tang at ToSC 2024 Issue 2 and disprove it.
Virginie Lallemand, Xavier Bonnetain
core
Towards Optimally Secure Deterministic Authenticated Encryption Schemes [PDF]
The public comments received for the review process for NIST (SP) 800-38A pointed out two important issues that most companies face: (1) the limited security that AES can provide due to its 128-bit block size and (2) the problem of nonce-misuse in ...
Ashwin Jha +3 more
core
Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security [PDF]
A rugged pseudorandom permutation (RPRP) is a security notion for variable-length tweakable ciphers that is strictly weaker than the traditional notion of a strong pseudorandom permutation.
Avijit Dutta +4 more
core
New Exchanged Boomerang Distinguishers for 5-Round AES [PDF]
In block ciphers, the attacker should not be able to distinguish a block cipher from a random permutation, making the existence of a distinguisher important.
Deukjo Hong +5 more
core

