Abstract

This paperdescribes a symmetrical block cipher family – FlexAEAD v1.1. This is an updated version of the work presented as round 1 candidate on the contest for NIST lightweight crypto standardization process. It was engineered to be lightweight, consuming less computational resources than other ciphers and to work with different block and key sizes. Other important characteristic is to integrate the authentication on its basic algorithm. This approach is helps to reduce the resource needs. The algorithm capacity to resist against linear and different cryptanalysis attacks was evaluated. The FlexAEAD also supports the authentication of the Associated Data (AD). The version 1.1 makes the algorithm resistant to iterated differential attacks. It also resolves a padding attack on the AD that allowed messages to have the same tag if the last AD block was filled with zeros.

Highlights

  • O N August 2018, the National Institute of Standards and Technology (NIST) published call for algorithm (NIST, 2018) describing the contest and requirements for a new lightweight authenticated encryption with associated data (AEAD) algorithm and an optional hash algorithm.The FleaxAEAD algorithm family was inscribed in the contest and analyzed by several researchers

  • The cipher family is an evolution of the FlexAE algorithm presented at IEEE ICC2017 (Paris – France) and SBSEG2018 (Natal – Brazil)

  • During NIST contest first round, independent researchers found a weakness related to the associated data padding and an iterated differential attack

Read more

Summary

ALGORITHM DESCRIPTION

The FleaxAEAD algorithm uses as a main component a key dependable permutation function (PFK). On this function, the block is XORed with a key KA at the beginning and with a key KB at the end of the process. The block is XORed with a key KA at the beginning and with a key KB at the end of the process This function (PFK) is invertible (INVPFK), so the process can be reversed (1)

INTRODUCTION
KEY AND BLOCK SIZE SELECTION
DIFFERENTIAL CRYPTANALYSIS
USING THE CIPHER TO GENERATE A PSEUDORANDOM
LINEAR CRYPTANALYSIS
VIII. CONCLUSION
CDAD1 CA9 BE 7 1 4 2 7-CA8 2 2 5 7 1 9 3 2 1 9 E 1 F

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.