CryptoDB
Hongjun Wu
Publications
Year
Venue
Title
2018
TOSC
Distinguishing Attack on NORX Permutation
Abstract
NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ongoing CAESAR competition. The security bound of NORX is derived from the sponge construction applied to an ideal underlying permutation. In this paper, we show that the NORX core permutation is non-ideal with a new distinguishing attack. More specifically, we can distinguish NORX64 permutation with 248.5 queries and distinguish NORX32 permutation with 264.7 queries using carefully crafted differential-linear attacks. We have experimentally verified the distinguishing attack on NORX64 permutation. Although the distinguishing attacks reveal the weakness of the NORX permutation, it does not directly threat the security of the NORX authenticated encryption scheme.
Service
- Asiacrypt 2015 Program committee
- Asiacrypt 2013 Program committee
- Asiacrypt 2012 Program committee
- Asiacrypt 2010 Program committee
Coauthors
- Feng Bao (4)
- Robert H. Deng (4)
- Willi Geiselmann (1)
- Tao Huang (4)
- Jun Kitahara (1)
- Özgül Küçük (1)
- San Ling (1)
- Phuong Ha Nguyen (1)
- Katsuyuki Okeya (1)
- Bart Preneel (5)
- Claus-Peter Schnorr (1)
- Rainer Steinwandt (1)
- Ivan Tjuawinata (1)
- Mingsheng Wang (1)
- Huaxiong Wang (1)
- Dai Watanabe (1)
- Shengbao Wu (1)
- Hongjun Wu (14)
- Wenling Wu (1)
- Qin-Zhong Ye (2)
- Hirotaka Yoshida (1)