Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode
Matematičeskie voprosy kriptografii, Tome 10 (2019) no. 2, pp. 47-60 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

We describe an attack on the “$8$ bits” authentication encryption with associated data ($\mathsf{AEAD}$) mode proposed during the $\mathsf{AEAD}$ standardization process. The “$8$ bits” mode is similar to the $\mathrm{CCM}$ mode except for several design features. We show that these distinctive features allow to construct a near birthday attack on “$8$ bits” mode. We also propose countermeasures to resist suggested attack.
@article{MVK_2019_10_2_a3,
     author = {L. R. Ahmetzyanova and G. A. Karpunin and G. K. Sedov},
     title = {Near birthday attack on {{\cyrv}{\CYRDJE}{\cyrnje}}$8$ {bits{\cyrv}{\CYRDJE}{\`\cyrk}} $\mathsf{AEAD}$ mode},
     journal = {Matemati\v{c}eskie voprosy kriptografii},
     pages = {47--60},
     year = {2019},
     volume = {10},
     number = {2},
     language = {en},
     url = {http://geodesic.mathdoc.fr/item/MVK_2019_10_2_a3/}
}
TY  - JOUR
AU  - L. R. Ahmetzyanova
AU  - G. A. Karpunin
AU  - G. K. Sedov
TI  - Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode
JO  - Matematičeskie voprosy kriptografii
PY  - 2019
SP  - 47
EP  - 60
VL  - 10
IS  - 2
UR  - http://geodesic.mathdoc.fr/item/MVK_2019_10_2_a3/
LA  - en
ID  - MVK_2019_10_2_a3
ER  - 
%0 Journal Article
%A L. R. Ahmetzyanova
%A G. A. Karpunin
%A G. K. Sedov
%T Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode
%J Matematičeskie voprosy kriptografii
%D 2019
%P 47-60
%V 10
%N 2
%U http://geodesic.mathdoc.fr/item/MVK_2019_10_2_a3/
%G en
%F MVK_2019_10_2_a3
L. R. Ahmetzyanova; G. A. Karpunin; G. K. Sedov. Near birthday attack on “$8$ bits” $\mathsf{AEAD}$ mode. Matematičeskie voprosy kriptografii, Tome 10 (2019) no. 2, pp. 47-60. http://geodesic.mathdoc.fr/item/MVK_2019_10_2_a3/

[1] M. Bellare, P. Rogaway, D. Wagner, “The EAX mode of operation”, FSE 2004, Lect. Notes Comput. Sci., 3017, 2004, 389–407 | DOI | Zbl

[2] CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness, , 2014 http://competitions.cr.yp.to/caesar.html

[3] 802.11-2016 - IEEE Standard for Information technology - Telecommunications and information exchange between systems. Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, , 14 Dec. 2016 https://ieeexplore.ieee.org/document/7786995/

[4] Information technology. Cryptographic protection of information. Block cipher modes of operation. GOST R 34.13-2015, STANDARTINFORM, M., 2016 (in Russian)

[5] J. Jonsson, “On the security of CTR + CBC-MAC”, SAC 2002, Lect. Notes Comput. Sci., 2595, 2003, 76–93 | DOI | MR | Zbl

[6] E. Rescorla, The transport layer security (TLS) protocol version 1.3, RFC, 8446, Internet Engineering Task Force (IETF), August 2018, 160 pp. https://tools.ietf.org/html/rfc8446

[7] P. Rogaway, T. Shrimpton, “A provable-security treatment of the key-wrap problem”, EUROCRYPT 2006, Lect. Notes Comput. Sci., 4004, 2006, 373–390 | DOI | MR | Zbl

[8] T. Shrimpton, A characterization of authenticated-encryption as a form of chosen-ciphertext security, Report 2004/272, , IACR ePrint Archive, 2004, 7 pp. https://eprint.iacr.org/2004/272.pdf

[9] D. Whiting, R. Housley, N. Ferguson, Counter with CBC-MAC (CCM), RFC, 3610, Internet Engineering Task Force (IETF), September 2003, 26 pp. http://tools.ietf.org/html/rfc3610 | Zbl