In this paper, we present several attacks on general ASASA schemes that significantly outperform the analysis of Biryukov et al. As a result, we are able to break all the proposed concrete ASASA constructions with practical complexity. For example, we can decompose an ASASA structure that was supposed to provide $64$-bit security in roughly $2^{28}$ steps, and break the scheme that supposedly provides $128$-bit security in about $2^{41}$ time. Whenever possible, our findings are backed up with experimental verifications.
Category / Keywords: secret-key cryptography / Block cipher, ASASA, white-box cryptography, integral cryptanalysis, differential cryptanalysis, Boomerang attack Date: received 27 May 2015 Contact author: thorsten kranz at rub de Available format(s): PDF | BibTeX Citation Version: 20150527:192238 (All versions of this report) Short URL: ia.cr/2015/507 Discussion forum: Show discussion | Start new discussion