Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security

R Takeuchi, Y Todo, T Iwata - IACR Transactions on Symmetric …, 2024 - tosc.iacr.org
This paper examines the security of Rocca, an authenticated encryption algorithm designed
for Beyond 5G/6G contexts. Rocca has been revised multiple times in the initialization and …

Key committing attacks against AES-based AEAD schemes

P Derbez, PA Fouque, T Isobe, M Rahman… - IACR Transactions on …, 2024 - tosc.iacr.org
Recently, there has been a surge of interest in the security of authenticated encryption with
associated data (AEAD) within the context of key commitment frameworks. Security within …

Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers—Rocca, Rocca-S and AEGIS

R Anand, T Isobe, AK Kundu, M Rahman… - Journal of Cryptographic …, 2024 - Springer
Abstract The beyond 5G (B5G)/6G eras promise to revolutionize wireless communication
with unprecedented speeds. However, ensuring security across hardware and software is a …

Practical Committing Attacks against Rocca-S

R Takeuchi, Y Todo, T Iwata - Cryptology ePrint Archive, 2024 - eprint.iacr.org
This note shows practical committing attacks against Rocca-S, an authenticated encryption
with associated data scheme designed for 6G applications. Previously, the best complexity …

Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes

T Shiraya, K Sakamoto, T Isobe - International Workshop on Security, 2024 - Springer
We examine the security of AES-based authenticated encryption schemes, including the
AEGIS family, Tiaoxin-346, Rocca and Rocca-S. Existing studies evaluated the security …