[Resource Topic] 2019/408: Forgery Attack on SNEIKEN

Welcome to the resource topic for 2019/408

Title:
Forgery Attack on SNEIKEN

Authors: Mustafa Khairallah

Abstract:

This document includes a collision/forgery attack against SNEIKEN128/192/256, where every message with more than 128 bytes of associated data can be converted into another message with different associated data and the same ciphertext/tag. The attack is a direct application of the probability 1 differential of the SNEIK permutation found by Léo Perrin in [Per19]. We verify the attack using the reference implementation of SNEIKEN128 provided by the designers, providing an example of such collisions.

ePrint: https://eprint.iacr.org/2019/408

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .