classification of the caesar candidates
play

Classification of the CAESAR Candidates Farzaneh Abed Christian - PowerPoint PPT Presentation

Introduction Design Approaches Functional Features Masking Methods Security Conclusion Classification of the CAESAR Candidates Farzaneh Abed Christian Forler Stefan Luck Bauhaus-Universit at Weimar ESC 2015, Luxembourg Jan, 2015


  1. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Classification of the CAESAR Candidates Farzaneh Abed Christian Forler Stefan Luck Bauhaus-Universit¨ at Weimar ESC 2015, Luxembourg Jan, 2015 Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  2. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Outline 1 Introduction 2 Design Approaches 3 Functional Features 4 Masking Methods 5 Security 6 Conclusion Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  3. Introduction Design Approaches Functional Features Masking Methods Security Conclusion CAESAR What is CAESAR? Competition for Authenticated Encryption: Security, Applicability, and Robustness Goal? Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  4. Introduction Design Approaches Functional Features Masking Methods Security Conclusion CAESAR What is CAESAR? Competition for Authenticated Encryption: Security, Applicability, and Robustness Goal? New authenticated encryption schemes which: Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  5. Introduction Design Approaches Functional Features Masking Methods Security Conclusion CAESAR What is CAESAR? Competition for Authenticated Encryption: Security, Applicability, and Robustness Goal? New authenticated encryption schemes which: Offer advantages over AES-GCM Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  6. Introduction Design Approaches Functional Features Masking Methods Security Conclusion CAESAR What is CAESAR? Competition for Authenticated Encryption: Security, Applicability, and Robustness Goal? New authenticated encryption schemes which: Offer advantages over AES-GCM Suitable for widespread adoption Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  7. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Time Schedule Announced at ESC 2013 Co-funded by US NIST?! Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  8. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Time Schedule Announced at ESC 2013 Co-funded by US NIST?! First round submission: March 2014 Reference software implementation: May 2014 Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  9. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Time Schedule Announcement of second round candidates: Jan 2015 Second round tweak, software and hardware implementation: Feb, March, April 2015 Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  10. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Time Schedule Announcement of second round candidates: Jan 2015 Second round tweak, software and hardware implementation: Feb, March, April 2015 Announcement of third round candidates: Dec 2015 Third round tweak, software and hardware implementation: Jan, Feb, March 2016 Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  11. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Time Schedule Announcement of second round candidates: Jan 2015 Second round tweak, software and hardware implementation: Feb, March, April 2015 Announcement of third round candidates: Dec 2015 Third round tweak, software and hardware implementation: Jan, Feb, March 2016 Announcement of finalist: Dec 2016 Final tweak, software and hardware implementation: Jan, Feb, March 2017 Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  12. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Time Schedule Announcement of second round candidates: Jan 2015 Second round tweak, software and hardware implementation: Feb, March, April 2015 Announcement of third round candidates: Dec 2015 Third round tweak, software and hardware implementation: Jan, Feb, March 2016 Announcement of finalist: Dec 2016 Final tweak, software and hardware implementation: Jan, Feb, March 2017 Announcement of final portfolio: Dec 2017 Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  13. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Classification Candidates 57 candidates for the first round! 8 candidates are broken Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  14. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Classification Candidates 57 candidates for the first round! 8 candidates are broken What to compare: Design approach Functional features Security Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  15. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Block Cipher Keyed family of permutation to encrypt message under a secret key. Full AES Round reduced AES New block cipher: KIASU, Deoxys, Joltik Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  16. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Block Cipher Keyed family of permutation to encrypt message under a secret key. Full AES Round reduced AES New block cipher: KIASU, Deoxys, Joltik Design #Candidates #Attacked AES Blockcipher-based 17 7 Round reduced/Modified AES 2 0 New block cipher 5 2 Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  17. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Candidates AES-based COPA,CFPB,CLOC,ELmD,iFeed, OCB,SILC,SHELL,YAES ++AE,CMCC,AVALANCHE JAMBU,CBA,POET,Julius R-reduced-AES AEZ,Silver New BC Deoxys,Joltik,KIASU,SCREAM,L-Block Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  18. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Stream Cipher Symmetric pseudo-random bit generator: takes fixed key and generates keystream of variable length. Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  19. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Stream Cipher Symmetric pseudo-random bit generator: takes fixed key and generates keystream of variable length. 8 Number of candidates: 5 Number of attacked candidates: Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  20. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Stream Cipher Symmetric pseudo-random bit generator: takes fixed key and generates keystream of variable length. 8 Number of candidates: 5 Number of attacked candidates: Candidates: Enchilada,HS1-SIV,Raviyoyla Acorn,Sablier,Calico,Trivia-ck,Wheesht Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  21. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Permutation Bijective mapping on fixed-length string. 3 Number of candidates: 1 Number of attacked candidates: Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  22. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Permutation Bijective mapping on fixed-length string. 3 Number of candidates: 1 Number of attacked candidates: Candidates: Minalpher,PAEQ,Prøst Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  23. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Sponge Iterated function with variable length input/output from a permutation which operates on fixed length state. Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  24. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Sponge Iterated function with variable length input/output from a permutation which operates on fixed length state. 9 Number of candidates: 3 Number of attacked candidates: Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

  25. Introduction Design Approaches Functional Features Masking Methods Security Conclusion Design Approach Sponge Iterated function with variable length input/output from a permutation which operates on fixed length state. 9 Number of candidates: 3 Number of attacked candidates: Candidates: Artemia,Ascon,Ketje,Keyak,NORX,STRIBOB PRIMATE,ICEPOLE, π -Cipher Farzaneh Abed, Christian Forler, Stefan Luck Classification of the CAESAR Candidates

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend