Please use this identifier to cite or link to this item: https://hdl.handle.net/11147/12589
Full metadata record
DC FieldValueLanguage
dc.contributor.authorUlusoy, Sırrı Erdemen_US
dc.contributor.authorKara, Orhunen_US
dc.contributor.authorEfe, Mehmet Önderen_US
dc.date.accessioned2022-11-03T11:03:44Z-
dc.date.available2022-11-03T11:03:44Z-
dc.date.issued2022-11-
dc.identifier.issn2214-2134-
dc.identifier.urihttps://doi.org/10.1016/j.jisa.2022.103342-
dc.identifier.urihttps://hdl.handle.net/11147/12589-
dc.description.abstractThere are three main approaches related to cryptanalysis of Authenticated Encryption with Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery attack), simulating the decryption oracle (plaintext recovery attack) and producing the valid tag of a given ciphertext (tag guessing attack). In this work, we analyze the security of COLM in these approaches. COLM is one of the AEAD algorithms chosen in the final portfolio for defense-in-depth use case of the CAESAR competition. The ciphers in this portfolio are supposed to provide robust security with their multiple layered defense mechanisms. The main motivation of this work is to examine if COLM indeed satisfies defense-in-depth security. We make cryptanalysis of COLM, particularly in the chosen ciphertext attack (CCA) scenario, once its secret whitening parameter L=EK(0) is recovered. To the best of our knowledge, we give the first example of querying an EME/EMD (Encrypt-linearMix-Encrypt/Decrypt) AEAD scheme in its decryption direction for arbitrary ciphertexts, not produced previously by the oracle, namely either a forgery or tag guessing attack. We construct SEBC/SDBC (Simulation models of the Encryption/Decryption oracles of the underlying Block Cipher) of COLM, thereby forming the first examples of these models of an authenticated EME scheme simultaneously. The combination of our SEBC/SDBC is a powerful tool to mount a universal forgery attack, a tag guessing attack and a plaintext recovery attack. All of these attacks have polynomial time complexities once L is recovered in the offline phase, indicating that the security of COLM against plaintext recovery and tag guessing attacks is limited by the birthday bound. Apart from exploiting SEBC/SDBC, we mount a pair of plaintext recovery attacks and another universal forgery attack. Finally, we make some suggestions to prevent our attacks.en_US
dc.language.isoenen_US
dc.publisherElsevieren_US
dc.relation.ispartofJournal of Information Security and Applicationsen_US
dc.rightsinfo:eu-repo/semantics/embargoedAccessen_US
dc.subjectPlaintext recoveryen_US
dc.subjectAEADen_US
dc.subjectTag guessingen_US
dc.subjectCOLMen_US
dc.subjectUniversal forgeryen_US
dc.subjectImpossible differentialen_US
dc.titlePlaintext recovery and tag guessing attacks on authenticated encryption algorithm COLMen_US
dc.typeArticleen_US
dc.authorid0000-0002-9685-6625en_US
dc.institutionauthorKara, Orhunen_US
dc.departmentİzmir Institute of Technology. Mathematicsen_US
dc.identifier.wosWOS:000871857600001en_US
dc.identifier.scopus2-s2.0-85139999636en_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.identifier.doi10.1016/j.jisa.2022.103342-
dc.relation.issn2214-2134en_US
dc.description.volume70en_US
dc.identifier.wosqualityN/A-
dc.identifier.scopusqualityQ1-
item.fulltextWith Fulltext-
item.grantfulltextembargo_20250101-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.openairetypeArticle-
crisitem.author.dept04.02. Department of Mathematics-
Appears in Collections:Mathematics / Matematik
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection
Files in This Item:
File Description SizeFormat 
1-s2.0-S2214212622001879-main.pdf
  Until 2025-01-01
Article (Makale)1.19 MBAdobe PDFView/Open    Request a copy
Show simple item record



CORE Recommender

Page view(s)

232
checked on Nov 18, 2024

Download(s)

4
checked on Nov 18, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.