Linear cryptanalyses of three AEADs with GIFT-128 as underlying primitives

11Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of these proposals take GIFT-128 as underlying primitives. The automatic search with the Boolean satisfiability problem (SAT) method is implemented to search for linear approximations that match the attack settings concerning these primitives. With the newly identified approximations, we launch key-recovery attacks on GIFT-COFB, SUNDAE-GIFT, and HyENA when the underlying primitives are replaced with 16-round, 17-round, and 16-round versions of GIFT-128. The resistance of GIFT-128 against linear cryptanalysis is also evaluated. We present a 24-round key-recovery attack on GIFT-128 with a newly obtained 19-round linear approximation. We note that the attack results in this paper are far from threatening the security of GIFT-COFB, SUNDAE-GIFT, HyENA, and GIFT-128.

Cite

CITATION STYLE

APA

Sun, L., Wang, W., & Wang, M. (2021). Linear cryptanalyses of three AEADs with GIFT-128 as underlying primitives. IACR Transactions on Symmetric Cryptology, 2021(2), 199–221. https://doi.org/10.46586/tosc.v2021.i2.199-221

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free