Ontology type: schema:Chapter Open Access: True
2010
AUTHORSNicky Mouha , Gautham Sekar , Jean-Philippe Aumasson , Thomas Peyrin , Søren S. Thomsen , Meltem Sönmez Turan , Bart Preneel
ABSTRACTESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST’s SHA-3 competition. This paper presents the first known attacks on ESSENCE. We present a semi-free-start collision attack on 31 out of 32 rounds of ESSENCE-512, invalidating the design claim that at least 24 rounds of ESSENCE are secure against differential cryptanalysis. We develop a novel technique to satisfy the first nine rounds of the differential characteristic. Non-randomness in the outputs of the feedback function F is used to construct several distinguishers on a 14-round ESSENCE block cipher and the corresponding compression function, each requiring only 217 output bits. This observation is extended to key-recovery attacks on the block cipher. Next, we show that the omission of round constants allows slid pairs and fixed points to be found. These attacks are independent of the number of rounds. Finally, we suggest several countermeasures against these attacks, while still keeping the design simple and easy to analyze. More... »
PAGES15-34
Information Security and Cryptology
ISBN
978-3-642-16341-8
978-3-642-16342-5
http://scigraph.springernature.com/pub.10.1007/978-3-642-16342-5_2
DOIhttp://dx.doi.org/10.1007/978-3-642-16342-5_2
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1051981001
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Data Format",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium",
"id": "http://www.grid.ac/institutes/grid.56912.39",
"name": [
"Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium",
"Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
],
"type": "Organization"
},
"familyName": "Mouha",
"givenName": "Nicky",
"id": "sg:person.014546777621.78",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014546777621.78"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium",
"id": "http://www.grid.ac/institutes/grid.56912.39",
"name": [
"Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium",
"Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
],
"type": "Organization"
},
"familyName": "Sekar",
"givenName": "Gautham",
"id": "sg:person.011362012455.96",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011362012455.96"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "FHNW, Windisch, Switzerland",
"id": "http://www.grid.ac/institutes/grid.410380.e",
"name": [
"FHNW, Windisch, Switzerland"
],
"type": "Organization"
},
"familyName": "Aumasson",
"givenName": "Jean-Philippe",
"id": "sg:person.012606440341.66",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Ingenico, France",
"id": "http://www.grid.ac/institutes/grid.435187.c",
"name": [
"Ingenico, France"
],
"type": "Organization"
},
"familyName": "Peyrin",
"givenName": "Thomas",
"id": "sg:person.011167161615.31",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011167161615.31"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Department of Mathematics, Technical University of Denmark, Matematiktorvet 303S, DK-2800, Kgs. Lyngby, Denmark",
"id": "http://www.grid.ac/institutes/grid.5170.3",
"name": [
"Department of Mathematics, Technical University of Denmark, Matematiktorvet 303S, DK-2800, Kgs. Lyngby, Denmark"
],
"type": "Organization"
},
"familyName": "Thomsen",
"givenName": "S\u00f8ren S.",
"id": "sg:person.010617664132.88",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010617664132.88"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Computer Security Division, National Institute of Standards and Technology, USA",
"id": "http://www.grid.ac/institutes/grid.94225.38",
"name": [
"Computer Security Division, National Institute of Standards and Technology, USA"
],
"type": "Organization"
},
"familyName": "Turan",
"givenName": "Meltem S\u00f6nmez",
"id": "sg:person.014665266376.28",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014665266376.28"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium",
"id": "http://www.grid.ac/institutes/grid.56912.39",
"name": [
"Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke\u00a0Universiteit\u00a0Leuven, Kasteelpark\u00a0Arenberg\u00a010, B-3001, Heverlee, Belgium",
"Interdisciplinary Institute for BroadBand Technology\u00a0(IBBT), Belgium"
],
"type": "Organization"
},
"familyName": "Preneel",
"givenName": "Bart",
"id": "sg:person.011115044357.39",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
],
"type": "Person"
}
],
"datePublished": "2010",
"datePublishedReg": "2010-01-01",
"description": "ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST\u2019s SHA-3 competition. This paper presents the first known attacks on ESSENCE. We present a semi-free-start collision attack on 31 out of 32 rounds of ESSENCE-512, invalidating the design claim that at least 24 rounds of ESSENCE are secure against differential cryptanalysis. We develop a novel technique to satisfy the first nine rounds of the differential characteristic. Non-randomness in the outputs of the feedback function F is used to construct several distinguishers on a 14-round ESSENCE block cipher and the corresponding compression function, each requiring only 217 output bits. This observation is extended to key-recovery attacks on the block cipher. Next, we show that the omission of round constants allows slid pairs and fixed points to be found. These attacks are independent of the number of rounds. Finally, we suggest several countermeasures against these attacks, while still keeping the design simple and easy to analyze.",
"editor": [
{
"familyName": "Bao",
"givenName": "Feng",
"type": "Person"
},
{
"familyName": "Yung",
"givenName": "Moti",
"type": "Person"
},
{
"familyName": "Lin",
"givenName": "Dongdai",
"type": "Person"
},
{
"familyName": "Jing",
"givenName": "Jiwu",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-642-16342-5_2",
"inLanguage": "en",
"isAccessibleForFree": true,
"isPartOf": {
"isbn": [
"978-3-642-16341-8",
"978-3-642-16342-5"
],
"name": "Information Security and Cryptology",
"type": "Book"
},
"keywords": [
"hash function",
"SHA-3 competition",
"block cipher",
"cryptographic hash functions",
"number of rounds",
"key recovery attack",
"start collision attack",
"compression function",
"design claims",
"collision attack",
"NIST SHA-3 competition",
"feedback function f",
"attacks",
"cipher",
"cryptanalysis",
"differential cryptanalysis",
"output bits",
"round constants",
"novel technique",
"slid pairs",
"bits",
"countermeasures",
"first round",
"essence",
"distinguisher",
"rounds",
"design",
"differential characteristics",
"technique",
"function",
"output",
"family",
"function f",
"number",
"point",
"omission",
"pairs",
"competition",
"characteristics",
"observations",
"claims",
"constants",
"paper"
],
"name": "Cryptanalysis of the ESSENCE Family of Hash Functions",
"pagination": "15-34",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1051981001"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-642-16342-5_2"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-642-16342-5_2",
"https://app.dimensions.ai/details/publication/pub.1051981001"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-06-01T22:28",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_157.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-642-16342-5_2"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16342-5_2'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16342-5_2'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16342-5_2'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-16342-5_2'
This table displays all metadata directly associated to this object as RDF triples.
173 TRIPLES
23 PREDICATES
69 URIs
62 LITERALS
7 BLANK NODES