Isap

Publications

In the following we first list publications on Isap's design. We then list Isap-related publications on:




On the Design of Isap


Design rationale and designers’ results on Isap security (NIST submission):

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas and Thomas Unterluggauer. ISAP v2.0 Submission to the NIST Lightweight Cryptography competition [spec|code]

NIST update on Isap v2.0:

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas and Thomas Unterluggauer. NIST Update: ISAP v2.0 [pdf]

In-depth analysis of the Isap v2.0 mode and extensive implementation overview:

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel, Bart Mennink, Robert Primas and Thomas Unterluggauer. ISAP v2.0 . IACR Transactions of Symmetric Cryptology 2020 - Special Issue on Designs for the NIST Lightweight Standardisation Process [doi]

Original publication of Isap at FSE 2017:

Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, Florian Mendel and Thomas Unterluggauer. ISAP - Towards Side-Channel Secure Authenticated Encryption . FSE 2017 [doi]




Analysis of the Isap Mode


Christoph Dobraunig and Bart Mennink. Leakage Resilient Value Comparison With Application to Message Authentication. EUROCRYPT 2021 [eprint]

Davide Bellizia, Olivier Bronchain, Gaëtan Cassiers, Vincent Grosso, Chun Guo, Charles Momin, Olivier Pereira, Thomas Peters and François-Xavier Standaert. Mode-Level vs. Implementation-Level Physical Security in Symmetric Cryptography - A Practical Guide Through the Leakage-Resistance Jungle. CRYPTO 2020 [doi]

Christoph Dobraunig, Bart Mennink and Robert Primas. Exploring the Golden Mean Between Leakage and Fault Resilience and Practice. IACR Cryptol. ePrint Arch. 2020 [eprint]

Christoph Dobraunig and Bart Mennink. Tightness of the Suffix Keyed Sponge Bound. IACR Trans. Symmetric Cryptol. 2020 [doi]

Christoph Dobraunig and Bart Mennink. Security of the Suffix Keyed Sponge. IACR Trans. Symmetric Cryptol. 2019 [doi]

Jean Paul Degabriele, Christian Janson and Patrick Struck. Sponges Resist Leakage: The Case of Authenticated Encryption. ASIACRYPT 2019 [doi]

Christoph Dobraunig and Bart Mennink. Leakage Resilience of the Duplex Construction. ASIACRYPT 2019 [doi]

Christoph Dobraunig and Bart Mennink. Leakage Resilience of the ISAP Mode: a Vulgarized Summary. NIST Lightweight Cryptography Workshop 2019 [pdf]

Chun Guo, François-Xavier Standaert, Weijia Wang and Yu Yu. Efficient Side-Channel Secure Message Authentication with Better Bounds. IACR Trans. Symmetric Cryptol. 2019 [eprint]

Chun Guo, Olivier Pereira, Thomas Peters and François-Xavier Standaert. Towards Low-Energy Leakage-Resistant Authenticated Encryption from the Duplex Sponge Construction. ePrint 2019 [eprint]

Joan Daemen, Bart Mennink and Gilles Van Assche. Full-State Keyed Duplex with Built-In Multi-user Support. ASIACRYPT 2017 [doi]

Yusuke Naito and Kan Yasuda. New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length. FSE 2016 [doi]

Peter Gazi, Krzysztof Pietrzak and Stefano Tessaro. The Exact PRF Security of Truncation: Tight Bounds for Keyed Sponges and Truncated CBC. CRYPTO 2015 [doi]

Bart Mennink, Reza Reyhanitabar and Damian Vizar. Security of Full-State Keyed Sponge and Duplex: Applications to Authenticated Encryption. ASIACRYPT 2015 [doi]

Yu Sasaki and Kan Yasuda. How to Incorporate Associated Data in Sponge-Based Authenticated Encryption. CT-RSA 2015 [doi]

Elena Andreeva, Joan Daemen, Bart Mennink and Gilles Van Assche. Security of Keyed Sponge Constructions Using a Modular Proof Approach. FSE 2015 [doi]

Philipp Jovanovic, Atul Luykx and Bart Mennink. Beyond 2^c/2 Security in Sponge-Based Authenticated Encryption Modes. ASIACRYPT 2014 [doi]

Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche. Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications. SAC 2011 [doi]

Guido Bertoni, Joan Daemen, Michaël Peeters and Gilles Van Assche. On the Indifferentiability of the Sponge Construction. EUROCRYPT 2008 [doi]




Analysis of the Ascon Permutation


Hailun Yan, Xuejia Lai, Lei Wang, Yu Yu and Yiran Xing. New zero-sum distinguishers on full 24-round Keccak-f using the division property. IET Inf. Secur. 2019 [doi]

CihangirTezcan. Distinguishers for Reduced Round Ascon, DryGASCON, and Shamash Permutations. 2019 [web]

Rui Zong, Xiaoyang Dong and Xiaoyun Wang. Collision Attacks on Round-Reduced Gimli-Hash/Ascon-Xof/Ascon-Hash. ePrint 2019 [eprint]

Christoph Dobraunig, Maria Eichlseder, Florian Mendel and Martin Schläffer. Preliminary Analysis of Ascon-Xof and Ascon-Hash (version 0.1). 2019 [web]

Achiya Bar-On, Orr Dunkelman, Nathan Keller and Ariel Weizman. DLCT: A New Tool for Differential-Linear Cryptanalysis. ePrint 2019 [eprint]

Gregor Leander, Cihangir Tezcan and Friedrich Wiemer. Searching for Subspace Trails and Truncated Differentials. IACR Transactions on Symmetric Cryptology 2018 [doi]

Zheng Li, Xiaoyang Dong and Xiaoyun Wang. Conditional Cube Attack on Round-Reduced ASCON. IACR Transactions on Symmetric Cryptology 2017 [doi]

Yanbin Li, Guoyan Zhang, Wei Wang and Meiqin Wang. Cryptanalysis of round-reduced ASCON. Sci. China Inf. Sci. 2017 [web]

Ashutosh Dhar Dwivedi, Milos Kloucek, Pawel Morawiecki, Ivica Nikolic, Josef Pieprzyk and Sebastian Wojtowicz. SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition. SECRYPT ICETE 2017 [doi]

Cihangir Tezcan. Truncated, Impossible, and Improbable Differential Analysis of Ascon. ICISSP 2016 [doi]

Faruk Göloglu, Vincent Rijmen and Qingju Wang. On the division property of S-boxes. ePrint 2016 [eprint]

Christoph Dobraunig, Maria Eichlseder and Florian Mendel. Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. ASIACRYPT 2015 [doi]

Yosuke Todo. Structural Evaluation by Generalized Integral Property. EUROCRYPT 2015 [doi]

Christoph Dobraunig, Maria Eichlseder, Florian Mendel and Martin Schläffer. Cryptanalysis of Ascon. CT-RSA 2015 [doi]




Analysis of Keccak Permutations and Modes


Rachelle Heim Boissier, Camille Nous and Yann Rotella. Algebraic Collision Attacks on Keccak. IACR Trans. Symmetric Cryptol. 2021 [doi]

Haibo Zhou, Zheng Li, Xiaoyang Dong, Keting Jia and Willi Meier. Practical Key-recovery Attacks on Round-Reduced Ketje Jr, Xoodoo-AE and Xoodyak. ePrint 2019 [eprint]

Zheng Li, Xiaoyang Dong, Wenquan Bi, Keting Jia, Xiaoyun Wang and Willi Meier. New Conditional Cube Attack on Keccak Keyed Modes. IACR Transactions of Symmetric Cryptology 2019 [doi]

Ting Li and Yao Sun. Preimage Attacks on Round-Reduced Keccak-224/256 via an Allocating Approach. EUROCRYPT 2019 [doi]

Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong and Xiaoyun Wang. MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. Des. Codes Cryptography 2019 [doi]

Fukang Liu, Zhenfu Cao and Gaoli Wang. Finding Ordinary Cube Variables for Keccak-MAC with Greedy Algorithm. IWSEC [doi]

Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li and Xiaoyun Wang. Conditional cube attack on round-reduced River Keyak. Designs, Codes and Cryptography 2018 [doi]

Thomas Fuhr, Maria Naya-Plasencia and Yann Rotella. State-Recovery Attacks on Modified Ketje Jr. IACR Transactions of Symmetric Cryptology 2018 [doi]

Ling Song and Jian Guo. Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. IACR Transactions of Symmetric Cryptology 2018 [doi]

Ling Song, Jian Guo, Danping Shi and San Ling. New MILP Modeling: Improved Conditional Cube Attacks on Keccak-Based Constructions. ASIACRYPT 2018 [doi]

Xiaoyang Dong, Zheng Li, Xiaoyun Wang and Ling Qin. Cube-like Attack on Round-Reduced Initialization of Ketje Sr. IACR Transactions of Symmetric Cryptology 2017 [doi]

Ting Li, Yao Sun, Maodong Liao and Dingkang Wang. Preimage Attacks on the Round-reduced Keccak with Cross-linear Structures. IACR Transactions of Symmetric Cryptology 2017 [doi]

Silvia Mella, Joan Daemen and Gilles Van Assche. New techniques for trail bounds and application to differential trails in Keccak. IACR Transactions of Symmetric Cryptology 2017 [doi]

Zheng Li, Wenquan Bi, Xiaoyang Dong and Xiaoyun Wang. Improved Conditional Cube Attacks on Keccak Keyed Modes with MILP Method. ASIACRYPT 2017 [doi]

Maolin Li and Lu Cheng. Distinguishing Property for Full Round KECCAK-f Permutation. CISIS 2017 [doi]

Ling Song, Guohong Liao and Jian Guo. Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced Keccak. CRYPTO 2017 [doi]

Senyang Huang, Xiaoyun Wang, Guangwu Xu, Meiqin Wang and Jingyuan Zhao. Conditional Cube Attack on Reduced-Round Keccak Sponge Function. EUROCRYPT 2017 [doi]

Kexin Qiao, Ling Song, Meicheng Liu and Jian Guo. New Collision Attacks on Round-Reduced Keccak. EUROCRYPT 2017 [doi]

Jian Guo, Meicheng Liu and Ling Song. Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak. ASIACRYPT 2016 [doi]

Itai Dinur, Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny and Michal Straus. Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function. EUROCRYPT 2015 [doi]

Jeremy Jean and Ivica Nikolic. Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak-f Permutation. FSE 2015 [doi]

Sourav Das and Willi Meier. Differential Biases in Reduced-Round Keccak. AFRICACRYPT 2014 [doi]

Sukhendu Kuila, Dhiman Saha, Madhumangal Pal and Dipanwita Roy Chowdhury. Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry. AFRICACRYPT 2014 [doi]

Pawel Morawiecki and Marian Srebrny. A SAT-based preimage analysis of reduced Keccak hash functions. Information Processing Letters 2013 [doi]

Pawel Morawiecki, Josef Pieprzyk and Marian Srebrny. Rotational Cryptanalysis of Round-Reduced Keccak. FSE 2013 [doi]

Stefan Kölbl, Florian Mendel, Tomislav Nad and Martin Schläffer. Differential Cryptanalysis of Keccak Variants. IMA 2013 [doi]

Itai Dinur, Orr Dunkelman and Adi Shamir. Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. FSE 2013 [doi]

Joan Daemen and Gilles Van Assche. Differential Propagation Analysis of Keccak. FSE 2012 [doi]

Itai Dinur, Orr Dunkelman and Adi Shamir. New Attacks on Keccak-224 and Keccak-256. FSE 2012 [doi]

Alexandre Duc, Jian Guo, Thomas Peyrin and Lei Wei. Unaligned Rebound Attack: Application to Keccak. FSE 2012 [doi]

Christina Boura, Anne Canteaut and Christophe De Canniere. Higher-Order Differential Properties of Keccak and Luffa. FSE 2011 [doi]

Maria Naya-Plasencia, Andrea Röck and Willi Meier. Practical Analysis of Reduced-Round Keccak. INDOCRYPT 2011 [doi]

Christina Boura and Anne Canteaut. A zero-sum property for the Keccak-f permutation with 18 rounds. ISIT 2010 [doi]

Christina Boura and Anne Canteaut. Zero-Sum Distinguishers for Iterated Permutations and Application to Keccak-f and Hamsi-256. SAC 2010 [doi]




Implementations and Benchmarks


Mark D. Aagaard and Nusa Zidaric. ASIC Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process. ePrint 2021 [eprint]

NIST LWC Team. Benchmarking of Lightweight Cryptographic Algorithms on Microcontrollers. 2021 [web]

Kamyar Mohajerani, Richard Haeussler, Rishub Nagpal, Farnoud Farahmand, Abubakr Abdulgadir, Jens-Peter Kaps and Kris Gaj. FPGA Benchmarking of Round 2 Candidates in the NIST Lightweight Cryptography Standardization Process: Methodology, Metrics, Tools, and Results. ePrint 2020 [eprint]

Stefan Steinegger and Robert Primas. A Fast and Compact RISC-V Accelerator for Ascon and Friends. CARDIS 2020 [eprint]

Mustafa Khairallah, Thomas Peyrin and Anupam Chattopadhyay. Preliminary Hardware Benchmarking of a Group of Round 2 NIST Lightweight AEAD Candidates. ePrint 2020 [eprint]

Fabio Campos, Lars Jellema, Mauk Lemmen, Lars Müller, Daan Sprenkels and Benoit Viguier. RISC-V Benchmarking. 2020 [web]

Rhys Weatherley. AVR/ARM Microcontroller Benchmarking. 2020 [web]

Sebastian Renner, Enrico Pozzobon and Jürgen Mottok. AVR/ARM/RISC-V Microcontroller Benchmarking. 2020 [web]