New cryptanalysis of the authenticated cipher model JAMBU

Based on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"...

Full description

Saved in:
Bibliographic Details
Main Authors: Yu-dan TIAN, Yong-zhuang WEI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2017-07-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00177
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530216328986624
author Yu-dan TIAN
Yong-zhuang WEI
author_facet Yu-dan TIAN
Yong-zhuang WEI
author_sort Yu-dan TIAN
collection DOAJ
description Based on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>chosen plaintext,and a time complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mn>4</mn><mo>×</mo><msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>encryptions.Compared with the previous attack,this attack is more favorable.
format Article
id doaj-art-6feb900cec3741c98386a1b9f1a33121
institution Kabale University
issn 2096-109X
language English
publishDate 2017-07-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-6feb900cec3741c98386a1b9f1a331212025-01-15T03:05:55ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2017-07-013535759551001New cryptanalysis of the authenticated cipher model JAMBUYu-dan TIANYong-zhuang WEIBased on the characteristic of JAMBU,a forgery attack by using the principle,where the associated data can be transformed into the plaintext was proposed.It is shown that the attack requires a data complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>chosen plaintext,and a time complexity of about <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML"> <mn>4</mn><mo>×</mo><msup> <mn>2</mn> <mrow> <mfrac> <mi>n</mi> <mn>2</mn> </mfrac> </mrow> </msup> </math></inline-formula>encryptions.Compared with the previous attack,this attack is more favorable.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00177JAMBUforgery attackCAESARauthenticated encryption
spellingShingle Yu-dan TIAN
Yong-zhuang WEI
New cryptanalysis of the authenticated cipher model JAMBU
网络与信息安全学报
JAMBU
forgery attack
CAESAR
authenticated encryption
title New cryptanalysis of the authenticated cipher model JAMBU
title_full New cryptanalysis of the authenticated cipher model JAMBU
title_fullStr New cryptanalysis of the authenticated cipher model JAMBU
title_full_unstemmed New cryptanalysis of the authenticated cipher model JAMBU
title_short New cryptanalysis of the authenticated cipher model JAMBU
title_sort new cryptanalysis of the authenticated cipher model jambu
topic JAMBU
forgery attack
CAESAR
authenticated encryption
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2017.00177
work_keys_str_mv AT yudantian newcryptanalysisoftheauthenticatedciphermodeljambu
AT yongzhuangwei newcryptanalysisoftheauthenticatedciphermodeljambu