Truncated, Impossible, and Improbable Differential Analysis of ASCON
Cihangir Tezcan
2016
Abstract
Ascon is an authenticated encryption algorithm which is recently qualified for the second-round of the Competition for Authenticated Encryption: Security, Applicability, and Robustness. So far, successful differential, differential-linear, and cube-like attacks on the reduced-round Ascon are provided. In this work, we provide the inverse of Ascon's linear layer in terms of rotations which can be used for constructing impossible differentials. We show that Ascon's S-box contains 35 undisturbed bits and we use them to construct 4 and 5-round truncated, impossible, and improbable differential distinguishers. Our results include practical 4-round truncated, impossible, and improbable differential attacks on Ascon. Our best attacks using these techniques break 5 out of 12 rounds. These are the first successful truncated, impossible, and improbable differential attacks on the reduced-round Ascon.
DownloadPaper Citation
in Harvard Style
Tezcan C. (2016). Truncated, Impossible, and Improbable Differential Analysis of ASCON . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 325-332. DOI: 10.5220/0005689903250332
in Bibtex Style
@conference{icissp16,
author={Cihangir Tezcan},
title={Truncated, Impossible, and Improbable Differential Analysis of ASCON},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={325-332},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005689903250332},
isbn={978-989-758-167-0},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Truncated, Impossible, and Improbable Differential Analysis of ASCON
SN - 978-989-758-167-0
AU - Tezcan C.
PY - 2016
SP - 325
EP - 332
DO - 10.5220/0005689903250332