Truncated boomerang attacks and application to AES-based ciphers

A Bariant, G Leurent - Annual International Conference on the Theory and …, 2023 - Springer
The boomerang attack is a cryptanalysis technique that combines two short differentials
instead of using a single long differential. It has been applied to many primitives, and results …

The qarmav2 family of tweakable block ciphers

R Avanzi, S Banik, O Dunkelman… - Cryptology ePrint …, 2023 - eprint.iacr.org
We introduce the QARMAv2 family of tweakable block ciphers. It is a redesign of QARMA
(from FSE 2017) to improve its security bounds and allow for longer tweaks, while keeping …

Orthros: a low-latency PRF

S Banik, T Isobe, F Liu, K Minematsu… - IACR Transactions on …, 2021 - tosc.iacr.org
We present Orthros, a 128-bit block pseudorandom function. It is designed with primary
focus on latency of fully unrolled circuits. For this purpose, we adopt a parallel structure …

Tight security of TNT and beyond: Attacks, proofs and possibilities for the cascaded LRW paradigm

A Jha, M Khairallah, M Nandi, A Saha - … on the Theory and Applications of …, 2024 - Springer
Abstract Liskov, Rivest and Wagner laid the theoretical foundations for tweakable block
ciphers (TBC). In a seminal paper, they proposed two (up to) birthday-bound secure design …

Partial sums meet FFT: Improved attack on 6-round AES

O Dunkelman, S Ghosh, N Keller, G Leurent… - … Conference on the …, 2024 - Springer
The partial sums cryptanalytic technique was introduced in 2000 by Ferguson et al., who
used it to break 6-round AES with time complexity of 2 52 S-box computations–a record that …

Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher

Z Zhang, Z Qin, C Guo - Designs, Codes and Cryptography, 2023 - Springer
Recent work of Bao et al.(in: Canteaut and Ishai (eds) EUROCRYPT 2020, Part II. LNCS.
Springer, Heidelberg 2020) repopularized tweakable blockciphers minimizing the overhead …

CLRW1 is not Secure Beyond the Birthday Bound: Breaking TNT with queries

M Khairallah - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this paper, we present a new distinguisher for the Tweak-aNd-Tweak (TNT) tweakable
block cipher with $ O (2^{n/2}) $ complexity. The distinguisher is an adaptive chosen …

Tight Security of TNT: Reinforcing Khairallah's Birthday-bound Attack

A Jha, M Nandi, A Saha - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In a recent paper, Khairallah demonstrated a birthday-bound attack on TNT, thereby
invalidating its (beyond-the-birthday-bound) CCA security claims. In this short note, we …

Tweakable SM4: How to tweak SM4 into tweakable block ciphers?

Z Guo, G Wang, O Dunkelman, Y Pan, S Liu - Journal of Information …, 2023 - Elsevier
SM4 is China's commercial block cipher standard and an ISO/IEC international standard.
While SM4 withstood a great deal of analysis, its non-tweakable structure makes it inflexible …

On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing

B Cogliati, J Ethan, A Jha, SK Saha - IACR Transactions on Symmetric …, 2023 - tosc.iacr.org
In this paper, we provide the first analysis of the Iterated Tweakable Even-Mansour cipher
with linear tweak and key (or tweakey) mixing, henceforth referred as TEML, for an arbitrary …