Forgery Attacks on FlexAE and FlexAEAD

Maria Eichlseder, Daniel Kales, Markus Schofnegger

Research output: Chapter in Book/Report/Conference proceedingConference paperpeer-review

Abstract

FlexAEAD is one of the round-1 candidates in the ongoing NIST Lightweight Cryptography standardization project. In this note, we show several forgery attacks on FlexAEAD with complexity less than the security bound given by the designers, such as a block reordering attack on full FlexAEAD-128 with estimated success probability about 2^54. Additionally, we show some trivial forgeries and point out domain separation issues.
Original languageEnglish
Title of host publicationCryptography and Coding - IMACC 2019
PublisherSpringer, Cham
Pages200-214
Number of pages15
DOIs
Publication statusPublished - Nov 2019
EventIMACC 2019: 17th IMA International Conference on Cryptography and Coding - Oxford, United Kingdom
Duration: 16 Dec 201918 Dec 2019

Publication series

NameLecture Notes in Computer Science
Volume11929

Conference

ConferenceIMACC 2019
Country/TerritoryUnited Kingdom
CityOxford
Period16/12/1918/12/19

Keywords

  • authenticated encryption
  • forgery attack
  • NIST LWC

Fingerprint

Dive into the research topics of 'Forgery Attacks on FlexAE and FlexAEAD'. Together they form a unique fingerprint.

Cite this