[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2017/034

Analysis of the NORX Core Permutation

Alex Biryukov, Aleksei Udovenko, and Vesselin Velichkov

Abstract

NORX is one of the fifteen authenticated encryption algorithms that have reached the third round of the CAESAR competition. NORX is built using the sponge-based Monkey Duplex construction. In this note we analyze the core permutation $F$. We show that it has rotational symmetries on different structure levels. This yields simple distinguishing properties for the permutation, which propagate with very high probability or even probability one. We also investigate differential symmetries in NORX at the word level. A new type of truncated differentials called symmetric truncated differentials (STD) is proposed. It is shown that, under the Markov assumption, up to $2.125$ rounds of the $F$ function of NORX32 and NORX64 can be distinguished using STD. Finally, we note that our analysis covers only the permutation $F$ and does not immediately threaten the security claims of the designers.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
NORXCAESARauthenticated encryptionspongecryptanalysis
Contact author(s)
aleksei udovenko @ uni lu
History
2017-01-13: received
Short URL
https://ia.cr/2017/034
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2017/034,
      author = {Alex Biryukov and Aleksei Udovenko and Vesselin Velichkov},
      title = {Analysis of the {NORX} Core Permutation},
      howpublished = {Cryptology {ePrint} Archive, Paper 2017/034},
      year = {2017},
      url = {https://eprint.iacr.org/2017/034}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.