The first way is by modifying nonce and last message block size. Chosen appropriately, we can ensure two COFFE instantiations with different nonce and different last message block size can have exactly the same intermediate state value. This hence leads to a valid ciphertext to be generated. Another way is by considering two different COFFE instantiations with different message block size despite same key. In this case, we will use the existence of consecutive zero in the binary representation the initial value to achieve identical intermediate state value on two different COFFE instantiations. Having the state collisions, the forgery attack is then conducted by choosing two different plaintexts with appropriate nonce and tag size to query. Having this fact, without knowing the secret key, we can then validly encrypt another plaintext with probability equal to 1.
Category / Keywords: secret-key cryptography / COFFE, Authenticated cipher, Forgery Attack Original Publication (with minor differences): SAC 2015 Date: received 6 Aug 2015 Contact author: s120015 at e ntu edu sg Available format(s): PDF | BibTeX Citation Version: 20150806:143928 (All versions of this report) Short URL: ia.cr/2015/783 Discussion forum: Show discussion | Start new discussion