You are looking at a specific version 20190802:121405 of this paper. See the latest version.

Paper 2019/539

Cryptanalysis of Internal Keyed Permutation of FlexAEAD

Mostafizar Rahman and Dhiman Saha and Goutam Paul

Abstract

In this paper, the internal keyed permutation of FlexAEAD is analysed. In our analysis, we report an iterated truncated differential for one round which holds with a probability of $2^{-7}$ and can penetrate the same number of rounds as claimed by the designers with much less complexity and can be easily converted to a key-recovery attack. We further report a Super-Sbox construction in the internal permutation, which is exploited using the Yoyo game to devise a 6-round deterministic distinguisher and a 7-round key recovery attack for 128-bit internal permutation. Similar attacks can be mounted for the 64-bit and 256-bit variants. Success probabilities of all the reported distinguishing attacks are shown to be high. All practical attacks are experimentally verified.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
DistinguisherFlexAEADIterated DifferentialKey RecoveryNIST lightweight cryptography projectYoyo
Contact author(s)
mrahman454 @ gmail com
dhiman @ iitbhilai ac in
History
2020-05-11: last of 5 revisions
2019-05-22: received
See all versions
Short URL
https://ia.cr/2019/539
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.