Abstract
Sablier is an authenticated cipher submitted by B. Zhang et al to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we first present a state recovery attack against the encryption Sablier v1 with time complexity about 244 operations and data complexity about 24 of 16-bit key words, which is practical in a small workstation. Based on the above attack, we further deduce a key recovery attack and a forgery attack against Sablier. The results show that Sablier is far from the goal of its security design (80-bits security level).
This work was supported by the Natural Science Foundation of China (Grant No. 61121062, 11071285), the 973 Program (Grant No. 2011CB302401).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Frier, A., Karlton, P., Kocher, P.: The SSL 3.0 Protocol, Netscape Communications Corp. (1996), http://home.netscape.com/eng/ssl3/ssl-toc.html
Dierks, T., Allen, C.: The TLS Protocol, RFC 2246 (1999)
Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol, RFC 2401 (1998)
Zhang, B., Shi, Z.Q., Xu, C., Yao, Y., Li, Z.Q.: Sablier v1, submission to CAESAR, http://competitions.cr.yp.to/round1/sablierv1.pdf
Mansour, Y., Nisan, N., Tiwari, P.: The computational complexity of universal hash functions. Theoretical Computer Science 107(1), 121–133 (1993)
3GPP TS 35.221, Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 specification (2010)
Agren, M., Hell, M., Johansson, T., Meier, W.: Grain-128a: A New Version of Grain-128 with Optional Authentication, http://lup.lub.lu.se/record/2296437/file/2296485.pdf
De Canniere, C., Preneel, B.: Trivium specifications, eSTREAM Project, http://www.ecrypt.eu.org/stream/e2-trivium.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Feng, X., Zhang, F. (2014). Cryptanalysis on the Authenticated Cipher Sablier. In: Au, M.H., Carminati, B., Kuo, CC.J. (eds) Network and System Security. NSS 2015. Lecture Notes in Computer Science, vol 8792. Springer, Cham. https://doi.org/10.1007/978-3-319-11698-3_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-11698-3_15
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11697-6
Online ISBN: 978-3-319-11698-3
eBook Packages: Computer ScienceComputer Science (R0)