Paper 2022/1456
Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting
Abstract
Ascon family is one of the finalists of the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. The family includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary), Ascon-128a, and Ascon-80pq. In this paper, we study the resistance of the Ascon~family against conditional cube attacks in nonce-misuse setting, and present new state- and key-recovery attacks. Our attack recovers the full state information and the secret key of Ascon-128a using 7-round Ascon-permutation for the encryption phase, with
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint.
- Keywords
- Ascon Conditional cube attack Lightweight cryptography State recovery Key recovery
- Contact author(s)
-
donghoon chang @ nist gov
deukjo hong @ jbnu ac kr
jinkeon kang @ nist gov
meltem turan @ nist gov - History
- 2022-10-25: approved
- 2022-10-25: received
- See all versions
- Short URL
- https://ia.cr/2022/1456
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1456, author = {Donghoon Chang and Deukjo Hong and Jinkeon Kang and Meltem Sönmez Turan}, title = {Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1456}, year = {2022}, url = {https://eprint.iacr.org/2022/1456} }