Analyzing the Linear Keystream Biases in AEGIS

Authors

  • Maria Eichlseder Graz University of Technology, Graz, Austria
  • Marcel Nageler Graz University of Technology, Graz, Austria
  • Robert Primas Graz University of Technology, Graz, Austria

DOI:

https://doi.org/10.13154/tosc.v2019.i4.348-368

Keywords:

Authenticated encryption, CAESAR, AEGIS, Linear cryptanalysis

Abstract

AEGIS is one of the authenticated encryption designs selected for the final portfolio of the CAESAR competition. It combines the AES round function and simple Boolean operations to update its large state and extract a keystream to achieve an excellent software performance. In 2014, Minaud discovered slight biases in the keystream based on linear characteristics. For family member AEGIS-256, these could be exploited to undermine the confidentiality faster than generic attacks, but this still requires very large amounts of data. For final portfolio member AEGIS-128, these attacks are currently less efficient than generic attacks. We propose improved keystream approximations for the AEGIS family, but also prove upper bounds below 2−128 for the squared correlation contribution of any single suitable linear characteristic.

Downloads

Published

2020-01-31

Issue

Section

Articles

How to Cite

Analyzing the Linear Keystream Biases in AEGIS. (2020). IACR Transactions on Symmetric Cryptology, 2019(4), 348-368. https://doi.org/10.13154/tosc.v2019.i4.348-368