You are looking at a specific version 20190805:221810 of this paper.
See the latest version.
Paper 2019/888
Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed
Mustafa Khairallah
Abstract
In this article, we analyze two of the NIST Round 1 Candidates for the Lightweight Cryptography Standardization Process: COMET and mixFeed. We show how AEAD modes that are based on rekeying can be modelled as modes without rekeying in the multi-key setting, where every nonce is treated as a different user. Then we show that the security degradation due to weak keys in the multi-key setting will affect these modes in the single key setting. We show how the weak key analysis of both these modes may be applied.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- weak keysauthenticated encryptioncometmixfeednistforgeryaead
- Contact author(s)
- mustafam001 @ e ntu edu sg
- History
- 2020-10-15: last of 5 revisions
- 2019-08-05: received
- See all versions
- Short URL
- https://ia.cr/2019/888
- License
-
CC BY