Cryptanalysis of ARMADILLO2

10Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.
Get full text

Abstract

ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities. In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2. © 2011 International Association for Cryptologic Research.

Cite

CITATION STYLE

APA

Abdelraheem, M. A., Blondeau, C., Naya-Plasencia, M., Videau, M., & Zenner, E. (2011). Cryptanalysis of ARMADILLO2. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7073 LNCS, pp. 308–326). https://doi.org/10.1007/978-3-642-25385-0_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free