Cryptanalysis of flexaead

1Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper analyzes the internal keyed permutation of FlexAEAD which is a round-1 candidate of the NIST LightWeight Cryptography Competition. In our analysis, we report an iterated truncated differential leveraging on a particular property of the AES S-box that becomes useful due to the particular nature of the diffusion layer of the round function. The differential holds with a low probability of $$2^{-7}$$ for one round which allows it to penetrate the same number of rounds as claimed by the designers, but with a much lower complexity. Moreover, it can be easily extended to a key-recovery attack at a little extra cost. We further report a Super-Sbox construction in the internal permutation, which is exploited using the Yoyo game to devise a 6-round deterministic distinguisher and a 7-round key recovery attack for the 128-bit internal permutation. Similar attacks can be mounted for the 64-bit and 256-bit variants. All these attacks outperform the existing results of the designers as well as other third-party results. The iterated truncated differentials can be tweaked to mount forgery attacks similar to the ones given by Eichlseder $$et$$ $$al.$$ Success probabilities of all the reported distinguishing attacks are shown to be high. All practical attacks have been experimentally verified. To the best of our knowledge, this work reports the first key-recovery attack on the internal keyed permutation of FlexAEAD.

References Powered by Scopus

PRESENT: An ultra-lightweight block cipher

2200Citations
613Readers

This article is free to access.

KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers

563Citations
180Readers

This article is free to access.

Yoyo tricks with AES

50Citations
27Readers

This article is free to access.

Cited by Powered by Scopus

0Citations
6Readers
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Rahman, M., Saha, D., & Paul, G. (2020). Cryptanalysis of flexaead. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12174 LNCS, pp. 152–171). Springer. https://doi.org/10.1007/978-3-030-51938-4_8

Readers over time

‘20‘21‘2302468

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 7

78%

Researcher 2

22%

Readers' Discipline

Tooltip

Computer Science 8

89%

Physics and Astronomy 1

11%

Save time finding and organizing research with Mendeley

Sign up for free
0