Cryptanalysis of ARMADILLO2 View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2011

AUTHORS

Mohamed Ahmed Abdelraheem , Céline Blondeau , María Naya-Plasencia , Marion Videau , Erik Zenner

ABSTRACT

ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities.In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2. More... »

PAGES

308-326

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17

DOI

http://dx.doi.org/10.1007/978-3-642-25385-0_17

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1040475127


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computation Theory and Mathematics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Mathematics, Technical University of Denmark, Denmark", 
          "id": "http://www.grid.ac/institutes/grid.5170.3", 
          "name": [
            "Department of Mathematics, Technical University of Denmark, Denmark"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Abdelraheem", 
        "givenName": "Mohamed Ahmed", 
        "id": "sg:person.07422502423.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07422502423.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "INRIA, project-team SECRET, France", 
          "id": "http://www.grid.ac/institutes/grid.5328.c", 
          "name": [
            "INRIA, project-team SECRET, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Blondeau", 
        "givenName": "C\u00e9line", 
        "id": "sg:person.07574220615.95", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07574220615.95"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Versailles, France", 
          "id": "http://www.grid.ac/institutes/grid.12832.3a", 
          "name": [
            "FHNW, Windisch, Switzerland", 
            "University of Versailles, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naya-Plasencia", 
        "givenName": "Mar\u00eda", 
        "id": "sg:person.013206304341.94", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Universit\u00e9 Henri Poincar\u00e9-Nancy\u00a01 / LORIA, France", 
          "id": "http://www.grid.ac/institutes/grid.29172.3f", 
          "name": [
            "Agence nationale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information, France", 
            "Universit\u00e9 Henri Poincar\u00e9-Nancy\u00a01 / LORIA, France"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Videau", 
        "givenName": "Marion", 
        "id": "sg:person.014212436537.35", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014212436537.35"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Applied Sciences, Offenburg, Germany", 
          "id": "http://www.grid.ac/institutes/grid.440974.a", 
          "name": [
            "University of Applied Sciences, Offenburg, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zenner", 
        "givenName": "Erik", 
        "id": "sg:person.011324134425.61", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011324134425.61"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2011", 
    "datePublishedReg": "2011-01-01", 
    "description": "ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities.In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2.", 
    "editor": [
      {
        "familyName": "Lee", 
        "givenName": "Dong Hoon", 
        "type": "Person"
      }, 
      {
        "familyName": "Wang", 
        "givenName": "Xiaoyun", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-25385-0_17", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-25384-3", 
        "978-3-642-25385-0"
      ], 
      "name": "Advances in Cryptology \u2013 ASIACRYPT 2011", 
      "type": "Book"
    }, 
    "keywords": [
      "parallel matching algorithm", 
      "matching algorithm", 
      "cryptographic primitives", 
      "hash function", 
      "key recovery attack", 
      "stream cipher", 
      "recovery attack", 
      "theoretical complexity", 
      "preimage attack", 
      "attacks", 
      "cryptanalysis", 
      "experimental results", 
      "algorithm", 
      "middle technique", 
      "FIL-MAC", 
      "hardware", 
      "primitives", 
      "cipher", 
      "complexity", 
      "technique", 
      "variants", 
      "generalization", 
      "context", 
      "meet", 
      "broader context", 
      "et al", 
      "function", 
      "results", 
      "mode", 
      "addition", 
      "al", 
      "paper"
    ], 
    "name": "Cryptanalysis of ARMADILLO2", 
    "pagination": "308-326", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1040475127"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-25385-0_17"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-25385-0_17", 
      "https://app.dimensions.ai/details/publication/pub.1040475127"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-12-01T06:51", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221201/entities/gbq_results/chapter/chapter_340.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-25385-0_17"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-25385-0_17'


 

This table displays all metadata directly associated to this object as RDF triples.

138 TRIPLES      22 PREDICATES      57 URIs      50 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-25385-0_17 schema:about anzsrc-for:08
2 anzsrc-for:0802
3 schema:author N3091c32dae5a4d349e37d5c28823b387
4 schema:datePublished 2011
5 schema:datePublishedReg 2011-01-01
6 schema:description ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities.In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2.
7 schema:editor Nf8837cddb44947daab06288951b3590e
8 schema:genre chapter
9 schema:isAccessibleForFree true
10 schema:isPartOf N922cb9c6c60549a5b30f5dad9de6e00c
11 schema:keywords FIL-MAC
12 addition
13 al
14 algorithm
15 attacks
16 broader context
17 cipher
18 complexity
19 context
20 cryptanalysis
21 cryptographic primitives
22 et al
23 experimental results
24 function
25 generalization
26 hardware
27 hash function
28 key recovery attack
29 matching algorithm
30 meet
31 middle technique
32 mode
33 paper
34 parallel matching algorithm
35 preimage attack
36 primitives
37 recovery attack
38 results
39 stream cipher
40 technique
41 theoretical complexity
42 variants
43 schema:name Cryptanalysis of ARMADILLO2
44 schema:pagination 308-326
45 schema:productId N525291d03c59434ab324df0c9404d871
46 Na6370625e5834f499fcb14cbafee2340
47 schema:publisher N054dbc0a77a048a9a281cdbdcff58205
48 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040475127
49 https://doi.org/10.1007/978-3-642-25385-0_17
50 schema:sdDatePublished 2022-12-01T06:51
51 schema:sdLicense https://scigraph.springernature.com/explorer/license/
52 schema:sdPublisher N6ba8cf2b53054441abf8f10e5f0f6e1b
53 schema:url https://doi.org/10.1007/978-3-642-25385-0_17
54 sgo:license sg:explorer/license/
55 sgo:sdDataset chapters
56 rdf:type schema:Chapter
57 N054dbc0a77a048a9a281cdbdcff58205 schema:name Springer Nature
58 rdf:type schema:Organisation
59 N1b7b8f24e06a469aba073812f77b759a rdf:first sg:person.07574220615.95
60 rdf:rest N4820ebf1275940dc816a86d80fdf9eb4
61 N1f5f176e0c644732a4a286aff35ecb46 rdf:first sg:person.014212436537.35
62 rdf:rest N92015ec6132144d6aab8826a483d4f77
63 N3091c32dae5a4d349e37d5c28823b387 rdf:first sg:person.07422502423.66
64 rdf:rest N1b7b8f24e06a469aba073812f77b759a
65 N4820ebf1275940dc816a86d80fdf9eb4 rdf:first sg:person.013206304341.94
66 rdf:rest N1f5f176e0c644732a4a286aff35ecb46
67 N525291d03c59434ab324df0c9404d871 schema:name dimensions_id
68 schema:value pub.1040475127
69 rdf:type schema:PropertyValue
70 N6ba8cf2b53054441abf8f10e5f0f6e1b schema:name Springer Nature - SN SciGraph project
71 rdf:type schema:Organization
72 N92015ec6132144d6aab8826a483d4f77 rdf:first sg:person.011324134425.61
73 rdf:rest rdf:nil
74 N922cb9c6c60549a5b30f5dad9de6e00c schema:isbn 978-3-642-25384-3
75 978-3-642-25385-0
76 schema:name Advances in Cryptology – ASIACRYPT 2011
77 rdf:type schema:Book
78 Na1c61660aefb4071a152794d651e0daa schema:familyName Wang
79 schema:givenName Xiaoyun
80 rdf:type schema:Person
81 Na6370625e5834f499fcb14cbafee2340 schema:name doi
82 schema:value 10.1007/978-3-642-25385-0_17
83 rdf:type schema:PropertyValue
84 Nb58830db3c32461bae5523afaab94438 rdf:first Na1c61660aefb4071a152794d651e0daa
85 rdf:rest rdf:nil
86 Ndd8c9b31ab5249a08d7ff163713fb5e1 schema:familyName Lee
87 schema:givenName Dong Hoon
88 rdf:type schema:Person
89 Nf8837cddb44947daab06288951b3590e rdf:first Ndd8c9b31ab5249a08d7ff163713fb5e1
90 rdf:rest Nb58830db3c32461bae5523afaab94438
91 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
92 schema:name Information and Computing Sciences
93 rdf:type schema:DefinedTerm
94 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
95 schema:name Computation Theory and Mathematics
96 rdf:type schema:DefinedTerm
97 sg:person.011324134425.61 schema:affiliation grid-institutes:grid.440974.a
98 schema:familyName Zenner
99 schema:givenName Erik
100 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011324134425.61
101 rdf:type schema:Person
102 sg:person.013206304341.94 schema:affiliation grid-institutes:grid.12832.3a
103 schema:familyName Naya-Plasencia
104 schema:givenName María
105 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013206304341.94
106 rdf:type schema:Person
107 sg:person.014212436537.35 schema:affiliation grid-institutes:grid.29172.3f
108 schema:familyName Videau
109 schema:givenName Marion
110 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014212436537.35
111 rdf:type schema:Person
112 sg:person.07422502423.66 schema:affiliation grid-institutes:grid.5170.3
113 schema:familyName Abdelraheem
114 schema:givenName Mohamed Ahmed
115 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07422502423.66
116 rdf:type schema:Person
117 sg:person.07574220615.95 schema:affiliation grid-institutes:grid.5328.c
118 schema:familyName Blondeau
119 schema:givenName Céline
120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07574220615.95
121 rdf:type schema:Person
122 grid-institutes:grid.12832.3a schema:alternateName University of Versailles, France
123 schema:name FHNW, Windisch, Switzerland
124 University of Versailles, France
125 rdf:type schema:Organization
126 grid-institutes:grid.29172.3f schema:alternateName Université Henri Poincaré-Nancy 1 / LORIA, France
127 schema:name Agence nationale de la sécurité des systèmes d’information, France
128 Université Henri Poincaré-Nancy 1 / LORIA, France
129 rdf:type schema:Organization
130 grid-institutes:grid.440974.a schema:alternateName University of Applied Sciences, Offenburg, Germany
131 schema:name University of Applied Sciences, Offenburg, Germany
132 rdf:type schema:Organization
133 grid-institutes:grid.5170.3 schema:alternateName Department of Mathematics, Technical University of Denmark, Denmark
134 schema:name Department of Mathematics, Technical University of Denmark, Denmark
135 rdf:type schema:Organization
136 grid-institutes:grid.5328.c schema:alternateName INRIA, project-team SECRET, France
137 schema:name INRIA, project-team SECRET, France
138 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...