Publication: Research - peer-review › Article in proceedings – Annual report year: 2011
ARMADILLO2 is the recommended variant of a multi-purpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in . In this paper, we describe a meet-in-themiddle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function.We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities. In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2.
|Title of host publication||Advances in Cryptology|
|Editors||Dong Hoon Lee, Xiaoyun Wang|
|State||Published - 2011|
|Event||17th International Conference on the Theory and Application of Cryptology and Information Security - Seoul, South Korea|
|Conference||17th International Conference on the Theory and Application of Cryptology and Information Security|
|City||Seoul, South Korea|
|Period||01/01/2011 → …|
|Name||Lecture Notes in Computer Science|
|Citations||Web of Science® Times Cited: No match on DOI|
- Preimage attack, Parallel matching algorithm, Meet-in-the-middle, ARMADILLO2, Key recovery attack
Loading map data...
No data available