[Resource Topic] 2012/018: Attacks and Security Proofs of EAX-Prime

Welcome to the resource topic for 2012/018

Title:
Attacks and Security Proofs of EAX-Prime

Authors: Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata

Abstract:

EAX$‘ (EAX-prime) is an authenticated encryption (AE) specified by ANSI C12.22 as a standard security function for Smart Grid. EAX is based on EAX proposed by Bellare, Rogaway, and Wagner. While EAX has a proof of security based on the pseudorandomness of the internal blockcipher, no published security result is known for EAX. This paper studies the security of EAX and shows that there is a sharp distinction in security of EAX depending on the input length. EAX encryption takes two inputs, called cleartext and plaintext, and we present various efficient attacks against EAX'$ using single-block cleartext and plaintext. At the same time we prove that if cleartexts are always longer than one block, it is provably secure based on the pseudorandomness of the blockcipher.

ePrint: https://eprint.iacr.org/2012/018

Talk: https://www.youtube.com/watch?v=E2CCrnkUKLs

Slides: https://iacr.org/cryptodb/archive/2013/FSE/presentation/25053.pdf

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .