Paper 2024/901

Practical Committing Attacks against Rocca-S

Ryunosuke Takeuchi, Nagoya University
Yosuke Todo, NTT Social Informatics Laboratories
Tetsu Iwata, Nagoya University
Abstract

This note shows practical committing attacks against Rocca-S, an authenticated encryption with associated data scheme designed for 6G applications. Previously, the best complexity of the attack was $2^{64}$ by Derbez et al. in ToSC 2024(1)/FSE 2024. We show that the committing attack against Rocca by Takeuchi et al. in ToSC 2024(2)/FSE 2025 can be applied to Rocca-S, where Rocca is an earlier version of Rocca-S. We show a concrete test vector of our attack. We also point out a committing attack that exploits equivalent keys.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
Rocca-SCommitting securityEquivalent keysPractical attack
Contact author(s)
takeuchi ryunosuke u2 @ s mail nagoya-u ac jp
yosuke todo @ ntt com
tetsu iwata @ nagoya-u jp
History
2024-06-06: approved
2024-06-06: received
See all versions
Short URL
https://ia.cr/2024/901
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/901,
      author = {Ryunosuke Takeuchi and Yosuke Todo and Tetsu Iwata},
      title = {Practical Committing Attacks against Rocca-S},
      howpublished = {Cryptology ePrint Archive, Paper 2024/901},
      year = {2024},
      note = {\url{https://eprint.iacr.org/2024/901}},
      url = {https://eprint.iacr.org/2024/901}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.