• Skip to content (access key 1)
  • Skip to search (access key 7)
FWF — Austrian Science Fund
  • Go to overview page Discover

    • Research Radar
      • Research Radar Archives 1974–1994
    • Discoveries
      • Emmanuelle Charpentier
      • Adrian Constantin
      • Monika Henzinger
      • Ferenc Krausz
      • Wolfgang Lutz
      • Walter Pohl
      • Christa Schleper
      • Elly Tanaka
      • Anton Zeilinger
    • Impact Stories
      • Verena Gassner
      • Wolfgang Lechner
      • Birgit Mitter
      • Oliver Spadiut
      • Georg Winter
    • scilog Magazine
    • Austrian Science Awards
      • FWF Wittgenstein Awards
      • FWF ASTRA Awards
      • FWF START Awards
      • Award Ceremony
    • excellent=austria
      • Clusters of Excellence
      • Emerging Fields
    • In the Spotlight
      • 40 Years of Erwin Schrödinger Fellowships
      • Quantum Austria
    • Dialogs and Talks
      • think.beyond Summit
    • Knowledge Transfer Events
    • E-Book Library
  • Go to overview page Funding

    • Portfolio
      • excellent=austria
        • Clusters of Excellence
        • Emerging Fields
      • Projects
        • Principal Investigator Projects
        • Principal Investigator Projects International
        • Clinical Research
        • 1000 Ideas
        • Arts-Based Research
        • FWF Wittgenstein Award
      • Careers
        • ESPRIT
        • FWF ASTRA Awards
        • Erwin Schrödinger
        • doc.funds
        • doc.funds.connect
      • Collaborations
        • Specialized Research Groups
        • Special Research Areas
        • Research Groups
        • International – Multilateral Initiatives
        • #ConnectingMinds
      • Communication
        • Top Citizen Science
        • Science Communication
        • Book Publications
        • Digital Publications
        • Open-Access Block Grant
      • Subject-Specific Funding
        • AI Mission Austria
        • Belmont Forum
        • ERA-NET HERA
        • ERA-NET NORFACE
        • ERA-NET QuantERA
        • Alternative Methods to Animal Testing
        • European Partnership BE READY
        • European Partnership Biodiversa+
        • European Partnership BrainHealth
        • European Partnership ERA4Health
        • European Partnership ERDERA
        • European Partnership EUPAHW
        • European Partnership FutureFoodS
        • European Partnership OHAMR
        • European Partnership PerMed
        • European Partnership Water4All
        • Gottfried and Vera Weiss Award
        • LUKE – Ukraine
        • netidee SCIENCE
        • Herzfelder Foundation Projects
        • Quantum Austria
        • Rückenwind Funding Bonus
        • WE&ME Award
        • Zero Emissions Award
      • International Collaborations
        • Belgium/Flanders
        • Germany
        • France
        • Italy/South Tyrol
        • Japan
        • Korea
        • Luxembourg
        • Poland
        • Switzerland
        • Slovenia
        • Taiwan
        • Tyrol–South Tyrol–Trentino
        • Czech Republic
        • Hungary
    • Step by Step
      • Find Funding
      • Submitting Your Application
      • International Peer Review
      • Funding Decisions
      • Carrying out Your Project
      • Closing Your Project
      • Further Information
        • Integrity and Ethics
        • Inclusion
        • Applying from Abroad
        • Personnel Costs
        • PROFI
        • Final Project Reports
        • Final Project Report Survey
    • FAQ
      • Project Phase PROFI
      • Project Phase Ad Personam
      • Expiring Programs
        • Elise Richter and Elise Richter PEEK
        • FWF START Awards
  • Go to overview page About Us

    • Mission Statement
    • FWF Video
    • Values
    • Facts and Figures
    • Annual Report
    • What We Do
      • Research Funding
        • Matching Funds Initiative
      • International Collaborations
      • Studies and Publications
      • Equal Opportunities and Diversity
        • Objectives and Principles
        • Measures
        • Creating Awareness of Bias in the Review Process
        • Terms and Definitions
        • Your Career in Cutting-Edge Research
      • Open Science
        • Open-Access Policy
          • Open-Access Policy for Peer-Reviewed Publications
          • Open-Access Policy for Peer-Reviewed Book Publications
          • Open-Access Policy for Research Data
        • Research Data Management
        • Citizen Science
        • Open Science Infrastructures
        • Open Science Funding
      • Evaluations and Quality Assurance
      • Academic Integrity
      • Science Communication
      • Philanthropy
      • Sustainability
    • History
    • Legal Basis
    • Organization
      • Executive Bodies
        • Executive Board
        • Supervisory Board
        • Assembly of Delegates
        • Scientific Board
        • Juries
      • FWF Office
    • Jobs at FWF
  • Go to overview page News

    • News
    • Press
      • Logos
    • Calendar
      • Post an Event
      • FWF Informational Events
    • Job Openings
      • Enter Job Opening
    • Newsletter
  • Discovering
    what
    matters.

    FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

    SOCIAL MEDIA

    • LinkedIn, external URL, opens in a new window
    • , external URL, opens in a new window
    • Facebook, external URL, opens in a new window
    • Instagram, external URL, opens in a new window
    • YouTube, external URL, opens in a new window

    SCILOG

    • Scilog — The science magazine of the Austrian Science Fund (FWF)
  • elane login, external URL, opens in a new window
  • Scilog external URL, opens in a new window
  • de Wechsle zu Deutsch

  

Advancing in Authenticated Encryption

Advancing in Authenticated Encryption

Christoph Erwin Dobraunig (ORCID: 0000-0002-3816-0187)
  • Grant DOI 10.55776/J4277
  • Funding program Erwin Schrödinger
  • Status ended
  • Start December 1, 2018
  • End August 31, 2020
  • Funding amount € 82,548
  • Project website

Disciplines

Computer Sciences (100%)

Keywords

    Cryptanalysis, Authenticated Encryption, Symmertic Cryptography

Abstract Final report

Today, we stand at a point, where countless devices are communicating over publicly accessible networks. One basic need that occurs in such a scenario is the need that messages exchanged between two communicating parties (usually named Alice and Bob) are kept confidential and authentic. In this context, confidentiality means that no one except Alice and Bob should be able to read the message and authenticity means that an alteration of the sent message maliciously, or unintentionally can be detected. Both goals can be achieved by using authenticated encryption (AE). AE fulfills a crucial need because for most applications that we use every day there is not much value in just ensuring that a message is kept confidential. This includes applications with a sole private purpose like instant messaging, but also commercial applications like e-commerce, or online banking. Due to its practical importance, AE is a very active research topic, having a steady stream of new ideas and new designs. So the big question is, which out of the many proposed designs is secure? At the moment, the answer to this question is cryptanalysis. During cryptanalysis, researchers try to find ways to attack the scheme itself, but also weakened versions of it. In this way, the insight into the security of the designs grows over the years. This leaves us with another question, which of the secure designs should be used in practice? In symmetric cryptography, one useful answer is public and open cryptographic competitions. Here, researchers from all over the world submit their best designs and scrutinize the other submissions. Examples of such competitions are the ongoing CAESAR competition and the NIST lightweight call, both searching for AE schemes. In this project, we want to provide advancements to the state-of-the-art in AE. We do this by further scrutinizing the security of the AE scheme Ascon. Ascon, which we co-designed, is one of the seven (out of 57) finalists of CAESAR. Furthermore, the research in the security of Ascon should lead to a submission to the NIST lightweight call. Also, we plan to analyze other design ideas, like parallel permutation-based cryptography or schemes that are resilient against certain classes of side-channel attacks. Analysis of such schemes allows for a better quantification of their strengths and weaknesses, which in turn leads to a better understanding on the design of AE schemes that can potentially be used in further refinements of existing schemes, or even new designs. The fellowship will fund the work of Christoph Dobraunig, which will be mainly conducted at the Radboud University (the Netherlands). There, Christoph will work together with Joan Daemen, a co- designer of AES and SHA-3.

Today, we stand at a point where countless devices are communicating over publicly accessible networks. One basic need that occurs in such a scenario is that messages exchanged between two communicating parties (usually named Alice and Bob) are kept confidential and authentic. In this context, confidentiality means that no one except Alice and Bob can read the message, and authenticity means that an alteration of the sent message - maliciously or unintentionally - can be detected. Both goals can be achieved by using authenticated encryption (AE). AE fulfills a crucial need because, for most applications that we use every day, there is not much value in just ensuring that a message is kept confidential. This includes applications with a sole private purpose like instant messaging and commercial applications like e-commerce or online banking. However, the question is, how do we ensure that the AE-schemes we use are useful and secure? In symmetric cryptography, one answer is a public and open cryptographic competition. Here, researchers from all over the world submit their best designs and scrutinize the other submissions. This project enabled us to contribute to three submissions for the ongoing lightweight cryptography standardization process organized by NIST. At the time of writing (October 2020), all three submissions, Ascon, Elephant, and Isap v2.0, are still participating in the process's second round. From the first to the second round, the initial 56 candidates have been reduced down to 32. In addition, the research conducted in this project aided the standardization process by publishing cryptanalysis of third-party schemes. Naturally, these results do not only help the lightweight cryptography standardization process but also help to grow the insight into the security of AE-designs. However, for many use-cases of AE, cryptanalytic security is not enough. In particular, implementations of AE often have to withstand side-channel attacks (e.g., attacks that aim to extract the secret key from a device using its power consumption) and fault attacks (attacks that induce faults during the computation). In this project, we researched and published implementation-level countermeasures against such side-channel and fault attacks. In particular, those countermeasures are able to provide protection against a new category of fault attacks called statistical ineffective fault attacks and are applicable to a wide-range of AE-schemes. Considering that the AE-scheme Isap v2.0 has been designed to provide increased resilience against certain classes of side-channel attacks, we investigated the leakage resilience of the duplex and the suffix keyed sponge construction. These results are applicable but not limited to Isap v2.0.

Research institution(s)
  • Radboud University Nijmegen - 100%
  • Technische Universität Graz - 100%

Research Output

  • 306 Citations
  • 19 Publications
Publications
  • 2022
    Title Leakage and Tamper Resilient Permutation-Based Cryptography
    DOI 10.1145/3548606.3560635
    Type Conference Proceeding Abstract
    Author Dobraunig C
    Pages 859-873
    Link Publication
  • 2021
    Title Ascon v1.2: Lightweight Authenticated Encryption and Hashing
    DOI 10.1007/s00145-021-09398-9
    Type Journal Article
    Author Dobraunig C
    Journal Journal of Cryptology
    Pages 33
    Link Publication
  • 2020
    Title Practical forgeries for ORANGE
    DOI 10.1016/j.ipl.2020.105961
    Type Journal Article
    Author Dobraunig C
    Journal Information Processing Letters
    Pages 105961
    Link Publication
  • 2019
    Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    DOI 10.5281/zenodo.2593577
    Type Other
    Author Ankele R
    Link Publication
  • 2019
    Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    DOI 10.5281/zenodo.2593578
    Type Other
    Author Ankele R
    Link Publication
  • 2019
    Title Leakage Resilience of the Duplex Construction
    DOI 10.1007/978-3-030-34618-8_8
    Type Book Chapter
    Author Dobraunig C
    Publisher Springer Nature
    Pages 225-255
  • 2019
    Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    DOI 10.46586/tosc.v2019.i1.192-235
    Type Journal Article
    Author Ankele R
    Journal IACR Transactions on Symmetric Cryptology
    Pages 192-235
    Link Publication
  • 0
    DOI 10.1145/3548606
    Type Other
  • 2022
    Title Multi-user Security of the Elephant v2 Authenticated Encryption Mode
    DOI 10.1007/978-3-030-99277-4_8
    Type Book Chapter
    Author Beyne T
    Publisher Springer Nature
    Pages 155-178
  • 2019
    Title Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion
    DOI 10.13154/tosc.v2019.i1.192-235
    Type Journal Article
    Author Ankele R
    Journal IACR Transactions on Symmetric Cryptology
    Pages 192-235
    Link Publication
  • 2020
    Title Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96
    DOI 10.13154/tosc.v2020.i1.289-312
    Type Other
    Author Dobraunig C
    Link Publication
  • 2020
    Title Isap v2.0
    DOI 10.13154/tosc.v2020.is1.390-416
    Type Other
    Author Dobraunig C
    Link Publication
  • 2020
    Title Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
    DOI 10.13154/tosc.v2020.is1.5-30
    Type Other
    Author Beyne T
    Link Publication
  • 2020
    Title Tightness of the Suffix Keyed Sponge Bound
    DOI 10.46586/tosc.v2020.i4.195-212
    Type Journal Article
    Author Dobraunig C
    Journal IACR Transactions on Symmetric Cryptology
  • 2020
    Title Security of the Suffix Keyed Sponge
    DOI 10.13154/tosc.v2019.i4.223-248
    Type Other
    Author Dobraunig C
    Link Publication
  • 2020
    Title Dumbo, Jumbo, and Delirium: Parallel Authenticated Encryption for the Lightweight Circus
    DOI 10.46586/tosc.v2020.is1.5-30
    Type Journal Article
    Author Beyne T
    Journal IACR Transactions on Symmetric Cryptology
    Pages 5-30
    Link Publication
  • 2020
    Title Security of the Suffix Keyed Sponge
    DOI 10.46586/tosc.v2019.i4.223-248
    Type Journal Article
    Author Dobraunig C
    Journal IACR Transactions on Symmetric Cryptology
    Pages 223-248
    Link Publication
  • 2020
    Title Protecting against Statistical Ineffective Fault Attacks
    DOI 10.46586/tches.v2020.i3.508-543
    Type Journal Article
    Author Daemen J
    Journal IACR Transactions on Cryptographic Hardware and Embedded Systems
    Pages 508-543
    Link Publication
  • 2020
    Title Protecting against Statistical Ineffective Fault Attacks
    DOI 10.13154/tches.v2020.i3.508-543
    Type Journal Article
    Author Daemen J
    Journal IACR Transactions on Cryptographic Hardware and Embedded Systems
    Pages 508-543
    Link Publication

Discovering
what
matters.

Newsletter

FWF-Newsletter Press-Newsletter Calendar-Newsletter Job-Newsletter scilog-Newsletter

Contact

Austrian Science Fund (FWF)
Georg-Coch-Platz 2
(Entrance Wiesingerstraße 4)
1010 Vienna

office(at)fwf.ac.at
+43 1 505 67 40

General information

  • Job Openings
  • Jobs at FWF
  • Press
  • Philanthropy
  • scilog
  • FWF Office
  • Social Media Directory
  • LinkedIn, external URL, opens in a new window
  • , external URL, opens in a new window
  • Facebook, external URL, opens in a new window
  • Instagram, external URL, opens in a new window
  • YouTube, external URL, opens in a new window
  • Cookies
  • Whistleblowing/Complaints Management
  • Accessibility Statement
  • Data Protection
  • Acknowledgements
  • IFG-Form
  • Social Media Directory
  • © Österreichischer Wissenschaftsfonds FWF
© Österreichischer Wissenschaftsfonds FWF