Paper 2014/258

A realtime key recovery attack on the authenticated cipher FASER128

Xiutao FENG and Fan ZHANG

Abstract

FASER is a family of authenticated ciphers submitted to the CAESAR competition, which contains two parent ciphers: FASER128 and FASER256. In this work we only focus on FASER128 and present a key recovery attack to FASER128, which needs at most 64 key words and is realtime in a PC. The result shows that FASER128 is very insecure. What's more, our attack can be easily applied to FASER256 and break it entirely.

Metadata
Available format(s)
PDF
Publication info
Preprint. Minor revision.
Keywords
CAESARstream ciphersFASER128key recovery attack
Contact author(s)
fengxt @ amss ac cn
History
2014-04-20: received
Short URL
https://ia.cr/2014/258
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/258,
      author = {Xiutao FENG and Fan ZHANG},
      title = {A realtime key recovery attack on the authenticated cipher FASER128},
      howpublished = {Cryptology ePrint Archive, Paper 2014/258},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/258}},
      url = {https://eprint.iacr.org/2014/258}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.