Our attack works in the nonce misuse model. The attack exploits the slow propagation of message differences. The attack is very close to the universal forgery attack. As long as the target message is not too short, {\it e.g.} more than 10 blocks (160 bytes), a tag is forged only with $2^{11}$ encryption oracle calls, $2^{11}$ computational cost, and negligible memory.
Category / Keywords: secret-key cryptography / PAES, Universal Forgery Attack, Nonce Misuse Date: received 24 Mar 2014 Contact author: sasaki yu at lab ntt co jp Available format(s): PDF | BibTeX Citation Version: 20140324:154455 (All versions of this report) Short URL: ia.cr/2014/218 Discussion forum: Show discussion | Start new discussion