Please use this identifier to cite or link to this item:
https://hdl.handle.net/11147/12589
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Ulusoy, Sırrı Erdem | en_US |
dc.contributor.author | Kara, Orhun | en_US |
dc.contributor.author | Efe, Mehmet Önder | en_US |
dc.date.accessioned | 2022-11-03T11:03:44Z | - |
dc.date.available | 2022-11-03T11:03:44Z | - |
dc.date.issued | 2022-11 | - |
dc.identifier.issn | 2214-2134 | - |
dc.identifier.uri | https://doi.org/10.1016/j.jisa.2022.103342 | - |
dc.identifier.uri | https://hdl.handle.net/11147/12589 | - |
dc.description.abstract | There are three main approaches related to cryptanalysis of Authenticated Encryption with Associated Data (AEAD) algorithms: Simulating the encryption oracle (universal forgery attack), simulating the decryption oracle (plaintext recovery attack) and producing the valid tag of a given ciphertext (tag guessing attack). In this work, we analyze the security of COLM in these approaches. COLM is one of the AEAD algorithms chosen in the final portfolio for defense-in-depth use case of the CAESAR competition. The ciphers in this portfolio are supposed to provide robust security with their multiple layered defense mechanisms. The main motivation of this work is to examine if COLM indeed satisfies defense-in-depth security. We make cryptanalysis of COLM, particularly in the chosen ciphertext attack (CCA) scenario, once its secret whitening parameter L=EK(0) is recovered. To the best of our knowledge, we give the first example of querying an EME/EMD (Encrypt-linearMix-Encrypt/Decrypt) AEAD scheme in its decryption direction for arbitrary ciphertexts, not produced previously by the oracle, namely either a forgery or tag guessing attack. We construct SEBC/SDBC (Simulation models of the Encryption/Decryption oracles of the underlying Block Cipher) of COLM, thereby forming the first examples of these models of an authenticated EME scheme simultaneously. The combination of our SEBC/SDBC is a powerful tool to mount a universal forgery attack, a tag guessing attack and a plaintext recovery attack. All of these attacks have polynomial time complexities once L is recovered in the offline phase, indicating that the security of COLM against plaintext recovery and tag guessing attacks is limited by the birthday bound. Apart from exploiting SEBC/SDBC, we mount a pair of plaintext recovery attacks and another universal forgery attack. Finally, we make some suggestions to prevent our attacks. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Elsevier | en_US |
dc.relation.ispartof | Journal of Information Security and Applications | en_US |
dc.rights | info:eu-repo/semantics/embargoedAccess | en_US |
dc.subject | Plaintext recovery | en_US |
dc.subject | AEAD | en_US |
dc.subject | Tag guessing | en_US |
dc.subject | COLM | en_US |
dc.subject | Universal forgery | en_US |
dc.subject | Impossible differential | en_US |
dc.title | Plaintext recovery and tag guessing attacks on authenticated encryption algorithm COLM | en_US |
dc.type | Article | en_US |
dc.authorid | 0000-0002-9685-6625 | en_US |
dc.institutionauthor | Kara, Orhun | en_US |
dc.department | İzmir Institute of Technology. Mathematics | en_US |
dc.identifier.wos | WOS:000871857600001 | en_US |
dc.identifier.scopus | 2-s2.0-85139999636 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.identifier.doi | 10.1016/j.jisa.2022.103342 | - |
dc.relation.issn | 2214-2134 | en_US |
dc.description.volume | 70 | en_US |
dc.identifier.wosquality | N/A | - |
dc.identifier.scopusquality | Q1 | - |
item.fulltext | With Fulltext | - |
item.grantfulltext | embargo_20250101 | - |
item.languageiso639-1 | en | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.cerifentitytype | Publications | - |
item.openairetype | Article | - |
crisitem.author.dept | 04.02. Department of Mathematics | - |
Appears in Collections: | Mathematics / Matematik Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection WoS İndeksli Yayınlar Koleksiyonu / WoS Indexed Publications Collection |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
1-s2.0-S2214212622001879-main.pdf Until 2025-01-01 | Article (Makale) | 1.19 MB | Adobe PDF | View/Open Request a copy |
CORE Recommender
Page view(s)
232
checked on Nov 18, 2024
Download(s)
4
checked on Nov 18, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.