CryptoDB
Tyge Tiessen
Publications
Year
Venue
Title
2025
EUROCRYPT
Cryptanalysis of Full SCARF
Abstract
SCARF is a tweakable block cipher dedicated to cache address
randomization, proposed at the USENIX Security conference. It has a
10-bit block, 48-bit tweak, and 240-bit key. SCARF is aggressively
optimized to meet the harsh latency constraints of cache address
randomization, and uses a dedicated model for its security claim.
The full version of SCARF has 8 rounds, and its designers claim security
up to $2^{40}$ queries and $2^{80}$ computations. In this work we
present a distinguisher against 6-round SCARF under the collision model
with complexity $2^{30}$, and a key-recovery attack against the full
8-round SCARF under the encryption-decryption model with $2^{39}$
queries and time $2^{76.2}$.
2022
TOSC
A Formal Analysis of Boomerang Probabilities
📺
Abstract
In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying differential trails that are not well-founded. We underline the problems inherent in these independence assumptions by using them to prove that for any boomerang there exists a differential trail over the entire cipher with a higher probability than the boomerang.While cryptanalysts today have a clear understanding that the trails can be dependent, the focus of previous research has mostly gone into using these dependencies to improve attacks but little effort has been put into giving boomerangs and their success probabilities a stronger theoretical underpinning. With this publication, we provide such a formalization.We provide a framework which allows us to formulate and prove rigorous statements about the probabilities involved in boomerang attacks without relying on independence assumptions of the trails. Among these statements is a proof that two-round boomerangs on SPNs with differentially 4-uniform S-boxes always deviate from the classical probability estimate to the largest degree possible.We applied the results of this formalization to analyze the validity of some of the first boomerang attacks. We show that the boomerang constructed in the amplified boomerang attack on Serpent by Kelsey, Kohno, and Schneier has probability zero. For the rectangle attack on Serpent by Dunkelman, Biham, and Keller, we demonstrate that a minuscule fraction of only 2−43.4 of all differential trail combinations used in the original attack have a non-zero probability. In spite of this, the probability of the boomerang is in fact a little higher than the original estimate suggests as the non-zero trails have a vastly higher probability than the classical estimate predicts.
2018
TOSC
Cryptanalysis of Low-Data Instances of Full LowMCv2
📺
Abstract
LowMC is a family of block ciphers designed for a low multiplicative complexity. The specification allows a large variety of instantiations, differing in block size, key size, number of S-boxes applied per round and allowed data complexity. The number of rounds deemed secure is determined by evaluating a number of attack vectors and taking the number of rounds still secure against the best of these. In this paper, we demonstrate that the attacks considered by the designers of LowMC in the version 2 of the round-formular were not sufficient to fend off all possible attacks. In the case of instantiations of LowMC with one of the most useful settings, namely with few applied S-boxes per round and only low allowable data complexities, efficient attacks based on difference enumeration techniques can be constructed. We show that it is most effective to consider tuples of differences instead of simple differences, both to increase the range of the distinguishers and to enable key recovery attacks. All applications for LowMC we are aware of, including signature schemes like Picnic and more recent (ring/group) signature schemes have used version 3 of the roundformular for LowMC, which takes our attack already into account.
2016
ASIACRYPT
Service
- FSE 2025 Program committee
- FSE 2024 Program committee
- FSE 2023 Program committee
Coauthors
- Martin R. Albrecht (2)
- Antonio Flórez-Gutiérrez (1)
- Lorenzo Grassi (1)
- Andreas B. Kidmose (1)
- Lars R. Knudsen (1)
- Stefan Kölbl (2)
- Eran Lambooij (1)
- Martin M. Lauridsen (1)
- Gregor Leander (1)
- Gaëtan Leurent (1)
- Håvard Raddum (1)
- Christian Rechberger (3)
- Arnab Roy (1)
- Thomas Schneider (1)
- Hadi Soleimany (1)
- Tyge Tiessen (8)
- Michiel Verbauwhede (1)
- Michael Zohner (1)