Paper 2019/539
Cryptanalysis of Internal Keyed Permutation of FlexAEAD
Mostafizar Rahman and Dhiman Saha and Goutam Paul
Abstract
In this paper, the internal keyed permutation of FlexAEAD is analysed. In our analysis, we report an iterated truncated differential for one round which holds with a probability of $2^{-7}$ and can penetrate the same number of rounds as claimed by the designers with much less complexity and can be easily converted to a key-recovery attack. We further report a Super-Sbox construction in the internal permutation, which is exploited using the Yoyo game to devise a 6-round deterministic distinguisher and a 7-round key recovery attack for 128-bit internal permutation. Similar attacks can be mounted for the 64-bit and 256-bit variants. Success probabilities of all the reported distinguishing attacks are shown to be high. All practical attacks are experimentally verified.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- DistinguisherFlexAEADIterated DifferentialKey RecoveryNIST lightweight cryptography projectYoyo
- Contact author(s)
-
mrahman454 @ gmail com
dhiman @ iitbhilai ac in - History
- 2020-05-11: last of 5 revisions
- 2019-05-22: received
- See all versions
- Short URL
- https://ia.cr/2019/539
- License
-
CC BY