Distinguishing and Key-recovery Attacks against Wheesht - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Pré-Publication, Document De Travail Année : 2014

Distinguishing and Key-recovery Attacks against Wheesht

Anne Canteaut
Gaëtan Leurent
  • Fonction : Auteur
  • PersonId : 951331

Résumé

Wheesht is one of the candidates to the CAESAR competition. In this note we present several attacks on Wheesht, showing that it is far from the advertised security level of 256 bits. In particular we describe a distinguishing attack with $2^{70.3}$ known plaintext words for any number of rounds of Wheesht, and a key-recovery attack (recovering the encryption key) for versions of Wheesht with a single finalization round with very little data and time complexity $2^{192}$.
Fichier principal
Vignette du fichier
wheesht.pdf (307.44 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-00966346 , version 1 (26-03-2014)
hal-00966346 , version 2 (26-03-2014)

Identifiants

  • HAL Id : hal-00966346 , version 2

Citer

Anne Canteaut, Gaëtan Leurent. Distinguishing and Key-recovery Attacks against Wheesht. 2014. ⟨hal-00966346v2⟩

Collections

INRIA INRIA2
174 Consultations
94 Téléchargements

Partager

Gmail Facebook X LinkedIn More