Paper 2014/258
A realtime key recovery attack on the authenticated cipher FASER128
Xiutao FENG and Fan ZHANG
Abstract
FASER is a family of authenticated ciphers submitted to the CAESAR competition, which contains two parent ciphers: FASER128 and FASER256. In this work we only focus on FASER128 and present a key recovery attack to FASER128, which needs at most 64 key words and is realtime in a PC. The result shows that FASER128 is very insecure. What's more, our attack can be easily applied to FASER256 and break it entirely.
Metadata
- Available format(s)
- Publication info
- Preprint. MINOR revision.
- Keywords
- CAESARstream ciphersFASER128key recovery attack
- Contact author(s)
- fengxt @ amss ac cn
- History
- 2014-04-20: received
- Short URL
- https://ia.cr/2014/258
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2014/258, author = {Xiutao FENG and Fan ZHANG}, title = {A realtime key recovery attack on the authenticated cipher {FASER128}}, howpublished = {Cryptology {ePrint} Archive, Paper 2014/258}, year = {2014}, url = {https://eprint.iacr.org/2014/258} }