Paper 2024/1324

CLAASPing ARADI: Automated Analysis of the ARADI Block Cipher

Emanuele Bellini, Technology Innovation Institute
Mattia Formenti, Technology Innovation Institute
David Gérault, Technology Innovation Institute
Juan Grados, Technology Innovation Institute
Anna Hambitzer, Technology Innovation Institute
Yun Ju Huang, Technology Innovation Institute
Paul Huynh, Technology Innovation Institute
Mohamed Rachidi, Technology Innovation Institute
Raghvendra Rohit, Technology Innovation Institute
Sharwan K. Tiwari, Technology Innovation Institute
Abstract

In early August 2024, three NSA researchers -- Patricia Greene, Mark Motley, and Bryan Weeks -- published the technical specifications for a new low-latency block cipher, ARADI, along with its corresponding authenticated encryption mode, LLAMA, which is specifically designed for memory encryption applications. Their manuscript offered minimal security analysis of the design, only briefly discussing the differential, linear and algebraic properties of cipher's underlying components. In this work, we present a set of distinguishers for the round reduced ARADI block cipher, discovered using the automated cryptanalysis tool CLAASP. More precisely, using CLAASP, we evaluate the resistance of ARADI against avalanche, statistical and continuous diffusion tests, differential and linear distinguishers, impossible differentials, algebraic attacks, and neural distinguishers. Accordingly, we give distinguishers that reach up to 9 out of 16 rounds of ARADI. We hope these preliminary findings will encourage further in-depth cryptanalysis of the cipher to enhance confidence in its security.

Note: Fixed typos and updated the differential and linear trails bounds.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
ARADICLAASPlow-latency ciphersdifferential cryptanalysislinear cryptanalysisstatistical testsneural distinguishers
Contact author(s)
eemanuele bellini @ gmail com
mattia formenti @ tii ae
david gerault @ tii ae
juan grados @ tii ae
anna hambitzer @ tii ae
yunju huang @ tii ae
paul huynh @ tii ae
mohamed rachidi @ tii ae
raghvendra rohit @ tii ae
sharwan tiwari @ tii ae
History
2024-08-29: revised
2024-08-23: received
See all versions
Short URL
https://ia.cr/2024/1324
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2024/1324,
      author = {Emanuele Bellini and Mattia Formenti and David Gérault and Juan Grados and Anna Hambitzer and Yun Ju Huang and Paul Huynh and Mohamed Rachidi and Raghvendra Rohit and Sharwan K. Tiwari},
      title = {{CLAASPing} {ARADI}: Automated Analysis of the {ARADI} Block Cipher},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1324},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1324}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.