Cryptanalysis of ARMADILLO2 View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2011

AUTHORS

Mohamed Ahmed Abdelraheem , Céline Blondeau , María Naya-Plasencia , Marion Videau , Erik Zenner

ABSTRACT

ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities.In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2. More... »

PAGES

308-326

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17

DOI

http://dx.doi.org/10.1007/978-3-642-25385-0_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1040475127


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Mathematics, Technical University of Denmark, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.5170.3", 
          "name": [
            "Department of Mathematics, Technical University of Denmark, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Abdelraheem", 
        "givenName": "Mohamed Ahmed", 
        "id": "sg:person.07422502423.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07422502423.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "INRIA, project-team SECRET, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "INRIA, project-team SECRET, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Blondeau", 
        "givenName": "C\u00e9line", 
        "id": "sg:person.07574220615.95", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07574220615.95"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Versailles, France", 
          "id": "http://www.grid.ac/institutes/grid.12832.3a", 
          "name": [
            "FHNW, Windisch, Switzerland", 
            "University of Versailles, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Universit\u00e9 Henri Poincar\u00e9-Nancy\u00a01 / LORIA, France", 
          "id": "http://www.grid.ac/institutes/grid.29172.3f", 
          "name": [
            "Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, France", 
            "Universit\u00e9 Henri Poincar\u00e9-Nancy\u00a01 / LORIA, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Videau", 
        "givenName": "Marion", 
        "id": "sg:person.014212436537.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014212436537.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Applied Sciences, Offenburg, Germany", 
          "id": "http://www.grid.ac/institutes/grid.440974.a", 
          "name": [
            "University of Applied Sciences, Offenburg, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zenner", 
        "givenName": "Erik", 
        "id": "sg:person.011324134425.61", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011324134425.61"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2011", 
    "datePublishedReg": "2011-01-01", 
    "description": "ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities.In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2.", 
    "editor": [
      {
        "familyName": "Lee", 
        "givenName": "Dong Hoon", 
        "type": "Person"
      }, 
      {
        "familyName": "Wang", 
        "givenName": "Xiaoyun", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-25385-0_17", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-25384-3", 
        "978-3-642-25385-0"
      ], 
      "name": "Advances in Cryptology \u2013 ASIACRYPT 2011", 
      "type": "Book"
    }, 
    "keywords": [
      "parallel matching algorithm", 
      "matching algorithm", 
      "cryptographic primitives", 
      "hash function", 
      "key recovery attack", 
      "stream cipher", 
      "recovery attack", 
      "theoretical complexity", 
      "preimage attack", 
      "attacks", 
      "cryptanalysis", 
      "experimental results", 
      "algorithm", 
      "middle technique", 
      "FIL-MAC", 
      "hardware", 
      "primitives", 
      "cipher", 
      "complexity", 
      "technique", 
      "variants", 
      "generalization", 
      "context", 
      "meet", 
      "broader context", 
      "et al", 
      "function", 
      "results", 
      "mode", 
      "addition", 
      "al", 
      "paper"
    ], 
    "name": "Cryptanalysis of ARMADILLO2", 
    "pagination": "308-326", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1040475127"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-25385-0_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-25385-0_17", 
      "https://app.dimensions.ai/details/publication/pub.1040475127"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-09-02T16:17", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220902/entities/gbq_results/chapter/chapter_425.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-25385-0_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'


 

This table displays all metadata directly associated to this object as RDF triples.

138 TRIPLES      22 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-25385-0_17 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N410d5d3e1e034d5d9d1c91acfb14f33b
4 schema:datePublished 2011
5 schema:datePublishedReg 2011-01-01
6 schema:description ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities.In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2.
7 schema:editor N5bd2463e68bb4a60b9d45a49c51852f6
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N6f77f88ed04340ecb27ffe3ec213c91e
11 schema:keywords FIL-MAC
12 addition
13 al
14 algorithm
15 attacks
16 broader context
17 cipher
18 complexity
19 context
20 cryptanalysis
21 cryptographic primitives
22 et al
23 experimental results
24 function
25 generalization
26 hardware
27 hash function
28 key recovery attack
29 matching algorithm
30 meet
31 middle technique
32 mode
33 paper
34 parallel matching algorithm
35 preimage attack
36 primitives
37 recovery attack
38 results
39 stream cipher
40 technique
41 theoretical complexity
42 variants
43 schema:name Cryptanalysis of ARMADILLO2
44 schema:pagination 308-326
45 schema:productId Na5933f58d64a46d6b67a401336b2fe0b
46 Nc7c5c4ee54ef462190a63f405761d416
47 schema:publisher N02746703dc8d4a81aca21622dedcdf52
48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040475127
49 https://doi.org/10.1007/978-3-642-25385-0_17
50 schema:sdDatePublished 2022-09-02T16:17
51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
52 schema:sdPublisher N904ca2bb245047e3b753e29f5081c7b3
53 schema:url https://doi.org/10.1007/978-3-642-25385-0_17
54 sgo:license sg:explorer/license/
55 sgo:sdDataset chapters
56 rdf:type schema:Chapter
57 N02746703dc8d4a81aca21622dedcdf52 schema:name Springer Nature
58 rdf:type schema:Organisation
59 N134aa1ee6a814916896a1d61e8e5a6fd rdf:first sg:person.013206304341.94
60 rdf:rest N6d81173edd3741fe8c6a8ad2694b1f06
61 N3d6db50d5dd64a7c8a864a74909710e2 schema:familyName Lee
62 schema:givenName Dong Hoon
63 rdf:type schema:Person
64 N410d5d3e1e034d5d9d1c91acfb14f33b rdf:first sg:person.07422502423.66
65 rdf:rest Ne70bfd947ae3493d8301b30b7eb86872
66 N5bd2463e68bb4a60b9d45a49c51852f6 rdf:first N3d6db50d5dd64a7c8a864a74909710e2
67 rdf:rest Nfc0e5c43bd554d25bfa9ee7a1b9abca3
68 N6d81173edd3741fe8c6a8ad2694b1f06 rdf:first sg:person.014212436537.35
69 rdf:rest Nd49c63d58846477abc4c3ee2101b4abd
70 N6f77f88ed04340ecb27ffe3ec213c91e schema:isbn 978-3-642-25384-3
71 978-3-642-25385-0
72 schema:name Advances in Cryptology – ASIACRYPT 2011
73 rdf:type schema:Book
74 N904ca2bb245047e3b753e29f5081c7b3 schema:name Springer Nature - SN SciGraph project
75 rdf:type schema:Organization
76 N95680c70fb7f499cbc71eab720cfe559 schema:familyName Wang
77 schema:givenName Xiaoyun
78 rdf:type schema:Person
79 Na5933f58d64a46d6b67a401336b2fe0b schema:name doi
80 schema:value 10.1007/978-3-642-25385-0_17
81 rdf:type schema:PropertyValue
82 Nc7c5c4ee54ef462190a63f405761d416 schema:name dimensions_id
83 schema:value pub.1040475127
84 rdf:type schema:PropertyValue
85 Nd49c63d58846477abc4c3ee2101b4abd rdf:first sg:person.011324134425.61
86 rdf:rest rdf:nil
87 Ne70bfd947ae3493d8301b30b7eb86872 rdf:first sg:person.07574220615.95
88 rdf:rest N134aa1ee6a814916896a1d61e8e5a6fd
89 Nfc0e5c43bd554d25bfa9ee7a1b9abca3 rdf:first N95680c70fb7f499cbc71eab720cfe559
90 rdf:rest rdf:nil
91 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
92 schema:name Information and Computing Sciences
93 rdf:type schema:DefinedTerm
94 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
95 schema:name Computation Theory and Mathematics
96 rdf:type schema:DefinedTerm
97 sg:person.011324134425.61 schema:affiliation grid-institutes:grid.440974.a
98 schema:familyName Zenner
99 schema:givenName Erik
100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011324134425.61
101 rdf:type schema:Person
102 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.12832.3a
103 schema:familyName Naya-Plasencia
104 schema:givenName María
105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
106 rdf:type schema:Person
107 sg:person.014212436537.35 schema:affiliation grid-institutes:grid.29172.3f
108 schema:familyName Videau
109 schema:givenName Marion
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014212436537.35
111 rdf:type schema:Person
112 sg:person.07422502423.66 schema:affiliation grid-institutes:grid.5170.3
113 schema:familyName Abdelraheem
114 schema:givenName Mohamed Ahmed
115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07422502423.66
116 rdf:type schema:Person
117 sg:person.07574220615.95 schema:affiliation grid-institutes:grid.5328.c
118 schema:familyName Blondeau
119 schema:givenName Céline
120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07574220615.95
121 rdf:type schema:Person
122 grid-institutes:grid.12832.3a schema:alternateName University of Versailles, France
123 schema:name FHNW, Windisch, Switzerland
124 University of Versailles, France
125 rdf:type schema:Organization
126 grid-institutes:grid.29172.3f schema:alternateName Université Henri Poincaré-Nancy 1 / LORIA, France
127 schema:name Agence nationale de la sécurité des systèmes d’information, France
128 Université Henri Poincaré-Nancy 1 / LORIA, France
129 rdf:type schema:Organization
130 grid-institutes:grid.440974.a schema:alternateName University of Applied Sciences, Offenburg, Germany
131 schema:name University of Applied Sciences, Offenburg, Germany
132 rdf:type schema:Organization
133 grid-institutes:grid.5170.3 schema:alternateName Department of Mathematics, Technical University of Denmark, Denmark
134 schema:name Department of Mathematics, Technical University of Denmark, Denmark
135 rdf:type schema:Organization
136 grid-institutes:grid.5328.c schema:alternateName INRIA, project-team SECRET, France
137 schema:name INRIA, project-team SECRET, France
138 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...