Paper 2015/159

Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm ALE

Shengbao Wu, Hongjun Wu, Tao Huang, Mingsheng Wang, and Wenling Wu

Abstract

ALE is a new authenticated encryption algorithm published at FSE 2013. The authentication component of ALE is based on the strong Pelican MAC, and the authentication security of ALE is claimed to be 128-bit. In this paper, we propose the leaked-state-forgery attack (LSFA) against ALE by exploiting the state information leaked from the encryption of ALE. The LSFA is a new type of differential cryptanalysis in which part of the state information is known and exploited to improve the differential probability. Our attack shows that the authentication security of ALE is only 97-bit. And the results may be further improved to around 93-bit if the whitening key layer is removed. We implemented our attacks against a small version of ALE (using 64-bit block size instead of 128-bit block size). The experimental results match well with the theoretical results.

Metadata
Available format(s)
PDF
Publication info
Published by the IACR in ASIACRYPT 2013
Keywords
authenticated encryptionforgery attackALE
Contact author(s)
huangtao @ ntu edu sg
History
2015-02-27: received
Short URL
https://ia.cr/2015/159
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/159,
      author = {Shengbao Wu and Hongjun Wu and Tao Huang and Mingsheng Wang and Wenling Wu},
      title = {Leaked-State-Forgery Attack Against The Authenticated Encryption Algorithm {ALE}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/159},
      year = {2015},
      url = {https://eprint.iacr.org/2015/159}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.