Lecture Notes in Computer Science 5665

Similar documents
Lecture Notes in Computer Science 7007

Lecture Notes in Computer Science 4409

Lecture Notes in Computer Science 4593

Lecture Notes in Computer Science 3511

Lecture Notes in Computer Science 3557

Lecture Notes in Computer Science 4728

Lecture Notes in Computer Science 4454

Lecture Notes in Computer Science 5671

Lecture Notes in Computer Science 3819

Lecture Notes in Computer Science 6663

Lecture Notes in Computer Science 7480

Lecture Notes in Computer Science 4214

Lecture Notes in Artificial Intelligence 3176

Lecture Notes in Computer Science 5004

Lecture Notes in Computer Science 4401

Lecture Notes in Computer Science 7118

Lecture Notes in Computer Science 3897

Lecture Notes in Computer Science 4883

Lecture Notes in Computer Science 4797

Lecture Notes in Artificial Intelligence 2155

Advances in Cryptology EUROCRYPT 2001

Lecture Notes in Computer Science 5474

Research Reports ESPRIT

Lecture Notes in Computer Science 7342

Current Position: Andrew and Erna Viterbi Professor of Electrical Engineering and Computer Science Massachusetts Institute of Technology

Lecture Notes in Computer Science 5580

Lecture Notes in Computer Science 6035

Detection of Intrusions and Malware, and Vulnerability Assessment

Lecture Notes in Computer Science 2576 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5587

Lecture Notes in Computer Science 8341

Lecture Notes in Computer Science 3527

Lecture Notes in Computer Science 6037

Lecture Notes in Computer Science 10644

Lecture Notes in Computer Science 2497 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

International Conference on Image and Signal Processing. July 2-4, 2018, Cherbourg, France

Lecture Notes in Computer Science 4449

Lecture Notes in Computer Science 5581

Lecture Notes in Computer Science 3507

Lecture Notes in Computer Science

Lecture Notes in Computer Science 5083

SERGIU KLAINERMAN CURRICULUM VITAE

Lecture Notes in Computer Science 3376

Lecture Notes in Computer Science 4833

Lecture Notes in Computer Science 2386 Edited by G. Goos, J. Hartmanis, and J. van Leeuwen

Lecture Notes in Computer Science 5438

Lecture Notes in Computer Science 7149

Springer Berlin Heidelberg NewYork Barcelona Budapest HongKong London Milan Paris Santa Clara Singapore Tokyo

Lecture Notes in Computer Science 9804

German Yearbook on Business History 1986

Lecture Notes in Computer Science 8036

Lecture Notes in Computer Science 5487

Lecture Notes in Computer Science 7140

Lecture Notes in Computer Science 6280

CURRICULUM VITAE Michael (Michail) Th. Rassias

Automatic Cryptanalysis of Block Ciphers with CP

Lecture Notes in Computer Science 6647

Lecture Notes in Computer Science 5203

Lecture Notes in Artificial Intelligence 4327

Fractals and Chaos. A.J. Crilly R.A. Earnshaw H. Jones Editors. With 146 Figures in 173 Parts, 57 in Color

Higher Densities No Sprawl: Master Plan for the City of Ramat-Gan, Israel

Lecture Notes in Computer Science 3925

Lecture Notes in Computer Science 6055

April 15 19, 2012 Cambridge, UK

Lecture Notes in Computer Science 9211

Lecture Notes in Computer Science 5284

Lecture Notes in Computer Science 3061

Lecture Notes in Computer Science 7679

Early Modern Philosophers and the Renaissance Legacy

Lecture Notes in Computer Science 9249

Lecture Notes in Computer Science 1807 Edited by G. Goos, J. Hartmanis and J. van Leeuwen

Curriculum Vitae Person Education Professional career

Lecture Notes in Computer Science 7896

Lecture Notes in Computer Science 4964

Lecture Notes in Computer Science 6092

CoPDA Barbara Rita Barricelli Ali Gheitasy Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Lecture Notes in Computer Science 7744

A Bibliography of Books about REDUCE

Lecture Notes in Computer Science 6182

Lecture Notes in Computer Science 8031

Lecture Notes in Computer Science 4935

Lecture Notes in Computer Science 7734

Housing markets, wealth and the business cycle

Lecture Notes in Computer Science 4117

Lecture Notes in Computer Science 4355

Lecture Notes in Computer Science 5978

Lecture Notes in Computer Science 4586

CoPDA Barbara Rita Barricelli Gerhard Fischer Anders Mørch Antonio Piccinno Stefano Valtolina (Eds.)

Curriculum Vitae. December 2, 2015

Intelligent Primary School Project in Italy

9.0 SCOR-RELATED MEETINGS

Lecture Notes in Computer Science 6815

Make!t

Lecture Notes in Computer Science 7189

09:00-10:30 am SESSION I: FOOD-MICROBES-HOST INTERACTIONS IN THE HUMAN GUT Chair: R. Balfour Sartor (Chapel Hill, USA)

Curriculum Vitae. September 2005 present : Full time researcher at CNRS affiliated with Paris School of Economics

NCCR Digital Fabrication. Dr. Russell Loveridge. Managing Director NCCR Digital Fabrication

By Bodil Branner and Caroline Series Presented in Barcelona, September 2011.

Lecture Notes in Computer Science 9596

Lecture Notes in Computer Science 6705

Transcription:

Lecture Notes in Computer Science 5665 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Alfred Kobsa University of California, Irvine, CA, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Microsoft Research, Cambridge, MA, USA Demetri Terzopoulos University of California, Los Angeles, CA, USA Doug Tygar University of California, Berkeley, CA, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany

Orr Dunkelman (Ed.) Fast Software Encryption 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers 13

Volume Editor Orr Dunkelman École Normale Supérieure Département d Informatique 45 rue d Ulm, 75230 Paris CEDEX 05, France E-mail: orr.dunkelman@ens.fr Library of Congress Control Number: 2009931058 CR Subject Classification (1998): E.3, I.1, E.2, D.4.6, K.6.5 LNCS Sublibrary: SL 4 Security and Cryptology ISSN 0302-9743 ISBN-10 3-642-03316-4 Springer Berlin Heidelberg New York ISBN-13 978-3-642-03316-2 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable to prosecution under the German Copyright Law. springer.com International Association for Cryptologic Research 2009 Printed in Germany Typesetting: Camera-ready by author, data conversion by Scientific Publishing Services, Chennai, India Printed on acid-free paper SPIN: 12731466 06/3180 543210

Preface Fast Software Encryption 2009 was the 16th in a series of workshops on symmetric key cryptography. Starting from 2002, it is sponsored by the International Association for Cryptologic Research (IACR). FSE 2009 was held in Leuven, Belgium, after previous venues held in Cambridge, UK (1993, 1996), Leuven, Belgium (1994, 2002), Haifa, Israel (1997), Paris, France (1998, 2005), Rome, Italy (1999), New York, USA (2000), Yokohama, Japan (2001), Lund, Sweden (2003), New Delhi, India (2004), Graz, Austria (2006), Luxembourg, Luxembourg (2007), and Lausanne, Switzerland (2008). The workshop s main topic is symmetric key cryptography, including the design of fast and secure symmetric key primitives, such as block ciphers, stream ciphers, hash functions, message authentication codes, modes of operation and iteration, as well as the theoretical foundations of these primitives. This year, 76 papers were submitted to FSE including a large portion of papers on hash functions, following the NIST SHA-3 competition, whose workshop was held just after FSE in the same location. From the 76 papers, 24 were accepted for presentation. It is my pleasure to thank all the authors of all submissions for the high-quality research, which is the base for the scientific value of the workshop. The review process was thorough (each submission received the attention of at least three reviewers), and at the end, besides the accepted papers, the Committee decided that the merits of the paper Blockcipher-Based Hashing Revisited entitled the authors to receive the best paper award. I wish to thank all Committee members and the referees for their hard and dedicated work. The workshop also featured two invited talks. The first was given by Shay Gueron about Intel s New AES Instructions for Enhanced Performance and Security and the second was given by Matt Robshaw about Looking Back at the estream Project. Along the presentation of the papers and the invited talks, the traditional rump session was organized and chaired by Dan J. Bernstein. I would like to thank Thomas Baignères for the ichair review management software, which facilitated a smooth and easy review process, and Shai Halevi for the Web Submission and Review Software for dealing with the proceedings. A special thanks is due to the organizing team. The COSIC team from Katholieke Universiteit Leuven, headed by Program Chair Bart Preneel, did a wonderful job in hosting the workshop. The warm welcome that awaited more than 200 delegates from all over the world was unblemished. The support given to the FSE 2009 workshop by the sponsors Katholieke Universiteit Leuven, Price- WaterhouseCoppers, and Oberthur technologies is also gratefully acknowledged. May 2009 Orr Dunkelman

Fast Software Encryption 2009 Leuven, Belgium, February 22 25, 2009 Sponsored by the International Association for Cryptologic Research (IACR) Program and General Chairs Program Chair General Chair Orr Dunkelman École Normale Supérieure, France Bart Preneel Katholieke Universiteit Leuven, Belgium Program Committee Steve Babbage Alex Biryukov Dan J. Bernstein Joan Daemen Christophe De Cannière Orr Dunkelman (Chair) Henri Gilbert Louis Granboulan Helena Handschuh Tetsu Iwata Nathan Keller Stefan Lucks Mitsuru Matsui Willi Meier Kaisa Nyberg Raphael Phan Bart Preneel Håvard Raddum Christian Rechberger Thomas Ristenpart Greg Rose Serge Vaudenay Yiqun Lisa Yin Vodafone Group R&D, UK University of Luxembourg, Luxembourg University of Illinois at Chicago, USA STMicroelectronics, Belgium École Normale Supérieure, France and Katholieke Universiteit Leuven, Belgium École Normale Supérieure, France Orange Labs, France EADS Innovation Works, France Spansion, France Nagoya University, Japan Hebrew University, Israel Bauhaus-University Weimar, Germany Mitsubishi Electric, Japan FHNW, Switzerland Helsinki University of Technology and NOKIA, Finland Loughborough University, UK Katholieke Universiteit Leuven, Belgium University of Bergen, Norway Graz University of Technology, Austria UC San Diego, USA Qualcomm, Australia EPFL, Switzerland Independent Consultant, USA

VIII Organization Referees Elena Andreeva Kazumaro Aoki Frederik Armknecht Jean-Philippe Aumasson Guido Bertoni Olivier Billet Billy Brumley Rafik Chaabouni Donghoon Chang Joo Yeon Cho Shanshan Duan Baha Dundar Ewan Fleischmann Chistian Forler Pasqualina Fragneto Benedikt Gierlichs Michael Gorski Jian Guo Risto Hakala Miia Hermelin Shoichi Hirose Michael Hutter Sebastiaan Indesteege Kimmo Järvinen Pascal Junod Charanjit Jutla Liam Keliher Shahram Khazaei Dmitry Khovratovich Jongsung Kim Matthias Krause Mario Lamberger Changhoon Lee David McGrew Florian Mendel Nicky Mouha Jorge Nakahara Jr. Maria Naya-Plasencia Ivica Nikolić Khaled Ouafi Matthew Parker Sylvain Pasini Chris Peikert Thomas Peyrin Thomas Roche Martin Schläffer Yannick Seurin Zhijie Shi Thomas Shrimpton Hervé Sibert Dirk Stegemann Daisuke Suzuki Stefano Tessaro Stefan Tillich Elena Trichina Gilles Van Assche Martin Vuagnoux Ralf-Philipp Weinmann Bo-Yin Yang Scott Yilek Erik Zenner Fan Zhang Sponsors Katholieke Universiteit Leuven, Belgium PriceWaterhouseCoppers, Belgium Oberthur technologies, Belgium

Table of Contents Stream Ciphers Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium... 1 Jean-Philippe Aumasson, Itai Dinur, Willi Meier, and Adi Shamir An Efficient State Recovery Attack on X-FCSR-256... 23 Paul Stankovski, Martin Hell, and Thomas Johansson Key Collisions of the RC4 Stream Cipher... 38 Mitsuru Matsui Invited Talk Intel s New AES Instructions for Enhanced Performance and Security... 51 Shay Gueron Theory of Hash Functions Blockcipher-Based Hashing Revisited... 67 Martijn Stam On the Security of Tandem-DM... 84 Ewan Fleischmann, Michael Gorski, and Stefan Lucks Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6... 104 Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, and Emily Shen Hash Functions Analysis I Cryptanalysis of RadioGatún... 122 Thomas Fuhr and Thomas Peyrin Preimage Attacks on Reduced Tiger and SHA-2... 139 Takanori Isobe and Kyoji Shibutani Cryptanalysis of the LAKE Hash Family... 156 Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolić, Josef Pieprzyk, and Huaxiong Wang

X Table of Contents Block Ciphers Analysis New Cryptanalysis of Block Ciphers with Low Algebraic Degree... 180 Bing Sun, Longjiang Qu, and Chao Li Algebraic Techniques in Differential Cryptanalysis... 193 Martin Albrecht and Carlos Cid Multidimensional Extension of Matsui s Algorithm 2... 209 Miia Hermelin, Joo Yeon Cho, and Kaisa Nyberg Hash Functions Analysis II Meet-in-the-Middle Attacks on SHA-3 Candidates... 228 Dmitry Khovratovich, Ivica Nikolić, and Ralf-Philipp Weinmann Practical Collisions for EnRUPT... 246 Sebastiaan Indesteege and Bart Preneel The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl... 260 Florian Mendel, Christian Rechberger, Martin Schläffer, and Søren S. Thomsen Block Ciphers Revisiting the IDEA Philosophy... 277 Pascal Junod and Marco Macchetti Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)... 296 Jean-Philippe Aumasson, Jorge Nakahara Jr., and Pouyan Sepehrdad Beyond-Birthday-Bound Security Based on Tweakable Block Cipher... 308 Kazuhiko Minematsu Theory of Symmetric Key Enhanced Target Collision Resistant Hash Functions Revisited... 327 Mohammad Reza Reyhanitabar, Willy Susilo, and Yi Mu Message Authentication Codes MAC Reforgeability... 345 John Black and Martin Cochran New Distinguishing Attack on MAC Using Secret-Prefix Method... 363 Xiaoyun Wang, Wei Wang, Keting Jia, and Meiqin Wang

Table of Contents XI Fast and Secure CBC-Type MAC Algorithms... 375 Mridul Nandi HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption... 394 Tetsu Iwata and Kan Yasuda Author Index... 417