New cryptanalysis of the authenticated cipher model JAMBU
Based on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2017-07-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00177 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530216328986624 |
---|---|
author | Yu-dan TIAN Yong-zhuang WEI |
author_facet | Yu-dan TIAN Yong-zhuang WEI |
author_sort | Yu-dan TIAN |
collection | DOAJ |
description | Based on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>chosen plaintext,and a time complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mn>4</mn><mo>×</mo><msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>encryptions.Compared with the previous attack,this attack is more favorable. |
format | Article |
id | doaj-art-6feb900cec3741c98386a1b9f1a33121 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2017-07-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-6feb900cec3741c98386a1b9f1a331212025-01-15T03:05:55ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-07-013535759551001New cryptanalysis of the authenticated cipher model JAMBUYu-dan TIANYong-zhuang WEIBased on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>chosen plaintext,and a time complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mn>4</mn><mo>×</mo><msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>encryptions.Compared with the previous attack,this attack is more favorable.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00177JAMBUforgery attackCAESARauthenticated encryption |
spellingShingle | Yu-dan TIAN Yong-zhuang WEI New cryptanalysis of the authenticated cipher model JAMBU 网络与信息安全学报 JAMBU forgery attack CAESAR authenticated encryption |
title | New cryptanalysis of the authenticated cipher model JAMBU |
title_full | New cryptanalysis of the authenticated cipher model JAMBU |
title_fullStr | New cryptanalysis of the authenticated cipher model JAMBU |
title_full_unstemmed | New cryptanalysis of the authenticated cipher model JAMBU |
title_short | New cryptanalysis of the authenticated cipher model JAMBU |
title_sort | new cryptanalysis of the authenticated cipher model jambu |
topic | JAMBU forgery attack CAESAR authenticated encryption |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00177 |
work_keys_str_mv | AT yudantian newcryptanalysisoftheauthenticatedciphermodeljambu AT yongzhuangwei newcryptanalysisoftheauthenticatedciphermodeljambu |