Filters








3 Hits in 1.7 sec

Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed

Mustafa Khairallah
2020 IACR Transactions on Symmetric Cryptology  
Consequently, we show gaps in the security analysis of COMET and mixFeed in the single key setting, which led the designers to provide overly optimistic security claims.  ...  We provide a unified model to study the behavior of the keys used in these schemes, called Rekey-and-Chain (RaC). This model helps understand the design of several AEAD schemes.  ...  I would like to thank Thomas Peyrin, Tetsu Iwata and Kazuhiko Minematsu on many fruitful discussions on topics related to this analysis, including weak keys, birthday bound security and the AES Key Scheduling  ... 
doi:10.13154/tosc.v2019.i4.272-289 dblp:journals/tosc/Khairallah19 fatcat:jhrgmqgyt5fbrkg2abhwe7fjcy

Weak Keys in the Rekeying Paradigm: Application to COMET and mixFeed

Mustafa Khairallah
2020 IACR Transactions on Symmetric Cryptology  
Consequently, we show gaps in the security analysis of COMET and mixFeed in the single key setting, which led the designers to provide overly optimistic security claims.  ...  We provide a unified model to study the behavior of the keys used in these schemes, called Rekey-and-Chain (RaC). This model helps understand the design of several AEAD schemes.  ...  I would like to thank Thomas Peyrin, Tetsu Iwata and Kazuhiko Minematsu on many fruitful discussions on topics related to this analysis, including weak keys, birthday bound security and the AES Key Scheduling  ... 
doi:10.46586/tosc.v2019.i4.272-289 fatcat:rjnn56oh2zbvhptzmauax5c3be

Weak Keys in the Rekeying Paradigm: Attacks on COMET-128 and mixFeed [article]

Mustafa Khairallah
2019 IACR Cryptology ePrint Archive  
Consequently, we show gaps in the security analysis of COMET and mixFeed in the single key setting, which led the designers to provide overly optimistic security claims.  ...  We provide a unified model to study the behavior of the keys used in these schemes, called Rekey-and-Chain (RaC). This model helps understand the design of several AEAD schemes.  ...  Acknowledgment I would like to thank the anonymous reviewers of ToSC for their constructive comments. I would like to thank Thomas Peyrin, Tetsu Iwata and Kazuhiko Minematsu on many  ... 
dblp:journals/iacr/Khairallah19b fatcat:zrwlttotkzcybdfq57qvv4anh4