2894 results sorted by ID

2026/386 (PDF) Last updated: 2026-02-25
Determining those Boolean functions whose restrictions to affine spaces are plateaued
Claude Carlet, Darrion Thornburgh
Secret-key cryptography

Quadratic Boolean functions (that is, Boolean functions of algebraic degree at most 2), bent Boolean functions (i.e. maximally nonlinear Boolean functions in even numbers of variables) and, as we prove in this paper, partially-bent Boolean functions (i.e. affine extensions of bent functions to linear super-spaces), share a strong property: all their restrictions to affine hyperplanes are plateaued (i.e. have a Walsh transform valued in a set of the form $\{0,\pm \lambda\}$, where $\lambda$...

2026/383 (PDF) Last updated: 2026-02-24
HCTR$^{++}$ : A Beyond Birthday Bound Secure HCTR2 Variant
Gülnihal Öztürk, Onur Koçak, Oğuz Yayla
Secret-key cryptography

Current industry-standard block cipher modes of operation, such as CBC and GCM, are fundamentally limited by the birthday bound $O(2^{n/2})$, a constraint that has evolved from a theoretical concern into a practical security bottleneck in contemporary high-throughput, high-data-volume environments. To address this, the cryptographic community and NIST are prioritizing Beyond Birthday Bound (BBB) security to extend the operational security margin toward the full block size $O(2^n)$. Achieving...

2026/382 (PDF) Last updated: 2026-02-24
Multi-key Security in the Quantum World: Revisiting Tweakable Even-Mansour and FX
Rentaro Shiba, Tetsu Iwata
Secret-key cryptography

In this paper, we prove the security of symmetric-key constructions in an adversary model called the Q1MK model, which combines the Q1 model, where the adversary makes classical online queries and quantum offline queries, and the multi-key (multi-user) setting. Specifically, under this model, we prove the security of two symmetric-key constructions: the tweakable Even-Mansour cipher (TEM) and the FX construction (FX), as starting points for understanding the post-quantum security of...

2026/365 (PDF) Last updated: 2026-02-23
Cube and Integral Attacks on ChiLow-32
Shuo Peng, Akram Khalesi, Zahra Ahmadian, Hosein Hadipour, Jiahui He, Kai Hu, Zhongfeng Niu, Shahram Rasoolzadeh, Meiqin Wang
Secret-key cryptography

The protection of executable code in embedded systems requires efficient mechanisms that ensure confidentiality and integrity. Belkheyar \emph{et al.} recently proposed the Authenticated Code Encryption (ACE) framework, with \chilow as the first ACE-2 instantiation at EUROCRYPT~2025. \chilow-(32 + $\tau$) is a 32-bit tweakable block cipher combined with a pseudorandom function, featuring quadratic nonlinear layers called ChiChi (\dchi) and a nested tweak/key schedule optimized for...

2026/349 (PDF) Last updated: 2026-02-23
Multipath PA-PUFs generate all Boolean functions
R Radheshwar, Dibyendu Roy, Pantelimon Stanica
Secret-key cryptography

In this paper, we propose a generalized model of Priority Arbiter-based Physical Unclonable Function (PA-PUF) with an arbitrary number of paths inside each switch. We first develop a mathematical model for this generalized model. Experimentally, we observed that the class of Boolean functions generated from our model of PA-PUF increases proportionally with the number of paths inside each switch, and that motivated us to attempt one of the open challenges proposed by Kansal et al. [DAM...

2026/336 (PDF) Last updated: 2026-02-23
How to Build a Short-Input Random Oracle from Public Random Permutations
Ritam Bhaumik, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Bart Mennink, Hrithik Nandi, Yaobin Shen
Secret-key cryptography

A vast body of work studies how to build a pseudorandom function (PRF) from a pseudorandom permutation (PRP) with beyond-the-birthday-bound (BBB) security. Often, such constructions are also expected to offer some security in keyless settings, for example in the context of committing security or to substitute a parallelizable short-input random oracle (RO) if used in counter mode. This has spurred several works on keyless variants of PRP-to-PRF constructions. However, recent works (Gunsing...

2026/314 (PDF) Last updated: 2026-02-18
Understanding Multi-Query Attacks on Key-Then-Hash Functions
Jonathan Fuchs
Secret-key cryptography

We present multi-query attacks on key-then-hash (KTH) functions in the blinded keyed hash model that achieve an advantage growing quadratically in the number of queries up to a small constant factor from the information-theoretic upper bound. We introduce three families of attacks. Catch attacks exploit the group structure of the digest space and achieve deterministic success with $2\sqrt{\varepsilon^{-1}}$ queries. Group attacks embed high-probability differentials into subgroups of the...

2026/313 (PDF) Last updated: 2026-02-18
On the Equivalence of Forgery and Key Recovery in Key-Then-Hash Functions
Jonathan Fuchs
Secret-key cryptography

For any key-then-hash function, there is no security gap between key recovery and forgery. The expected cost of recovering the key given differential-based forgery, in the information-theoretic setting, is logarithmic in the number of solutions to the underlying differential equation. The notion of weak-key classes as defined by Handschuh and Preneel in their CRYPTO 2008 paper does not apply to key-then-hash functions. Every key is equally vulnerable, and the attack complexity is entirely...

2026/309 (PDF) Last updated: 2026-02-18
Hash Function Constructions from Lightweight Block Ciphers for Fully Homomorphic Encryption
Olivier Bernard, Marc Joye
Secret-key cryptography

This paper investigates hash-function constructions derived from lightweight block ciphers, that are suitable for evaluation in fully homomorphic encryption (FHE) settings. We focus on PRINCEv2, a 64-bit lightweight block cipher with 128-bit keys and low algebraic complexity, which is particularly amenable to FHE evaluation. However, the small block size of such ciphers limits the applicability of standard hash-function transforms. Indeed, achieving 128-bit collision resistance in the (n,...

2026/286 (PDF) Last updated: 2026-02-17
Upper Bound on Information-Theoretic Security of Permutation-Based Pseudorandom Functions
Chun Guo, Jian Guo, Xinnian Li, Wenjie Nan
Secret-key cryptography

We present the first general upper bound on permutation-based pseudorandom functions in the information-theoretic setting. We show that any non-compressing PRF, with input and output domain at least \([N]\), making \(t\) black-box calls to any \(t\) public permutations on \([N]\), can be distinguished from a random function over the output domain with at most \(\widetilde{O}\big(N^{t/(t+1)}\big)\) total queries to the PRF and the permutations. Our results suggest that the designs of Chen et...

2026/271 (PDF) Last updated: 2026-02-16
Defining Quantum-Secure Message Authentication
Ashwin Jha, Mustafa Khairallah, Jannis Leuther, Stefan Lucks
Secret-key cryptography

The classical EUF-CMA notion for the security of message authentication codes (MACs) is based on "freshness": messages chosen by the adversary are authenticated, and then the adversary has to authenticate a fresh message on its own. In a quantum setting, where classical messages are authenticated but adversaries can make queries in superposition, "freshness" is undefinable. Instead of requiring the adversary to be unable to forge a fresh message, one can require "stability" (the adversary...

2026/254 (PDF) Last updated: 2026-02-13
Key Committing Security of HCTR2, Revisited
Donghoon Chang, Yu Long Chen, Yukihito Hiraga, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Yu Sasaki, Takeshi Sugawara
Secret-key cryptography

This paper presents improved attacks and proofs for the key committing security of EtE-HCTR2, a robust authenticated encryption scheme constructed from HCTR2 and the Encode-then-Encipher (EtE) framework, in light of the ongoing standardization effort of cryptographic accordions by NIST. We improve attacks on the instantiations with two common encodings, where zeros are either appended or prepended to the message, namely EtE_A-HCTR2 and EtE_P-HCTR2. Compared with the state-of-the-art attack...

2026/250 (PDF) Last updated: 2026-02-13
On the Concrete Hardness of LWR with a Power of Two Modulus
Jules Baudrin, Rachelle Heim Boissier, François-Xavier Standaert
Secret-key cryptography

LWR has been introduced by Banerjee et al. in 2012 as a deterministic variant of LWE. Since then, it has found many applications in the design of symmetric primitives and post-quantum schemes. Despite its deterministic nature, LWR is usually analyzed as LWE, under the (implicit) assumption that no improved attack can take advantage of the additional structure it provides. In this paper, we tackle this assumption in the context of power-of-two moduli and investigate the security of LWR...

2026/240 (PDF) Last updated: 2026-02-13
Do not Mix Models: Revisiting Generic Transforms for Committing Authenticated Encryption
Kazuhiko Minematsu, Akiko Inoue
Secret-key cryptography

Committing security for authenticated encryption (AE) captures the difficulty of constructing a distinct input tuple, including the key, that yields the same ciphertext. This notion is relatively new but has attracted significant attention due to its practical relevance. A promising direction is to design generic transforms that convert any AE scheme into a committing one. A common approach to generic transforms, initiated by the CTX transform (Chan and Rogaway, ESORICS 2022), is to add a...

2026/229 (PDF) Last updated: 2026-02-17
ANIMAGUS: A Provably Secure Accordion Mode of Operation
Gülnihal Öztürk, Onur Koçak, Oğuz Yayla
Secret-key cryptography

Block ciphers are designed to operate on fixed length blocks of bits. A block cipher mode of operation is used in order to encrypt variable-length input. These modes process multiple data blocks and ensure information security through the application of block cipher algorithms. While there are several NIST-approved block cipher modes, they exhibit certain inherent limitations and security vulnerabilities. Hence, the necessity for a novel mode has emerged. NIST aims to design an accordion...

2026/211 (PDF) Last updated: 2026-02-10
A Generalized $\chi_n$-Function
Cheng Lyu, Mu Yuan, Dabin Zheng, Siwei Sun, Shun Li
Secret-key cryptography

The mapping $\chi_n$ from $\mathbb{F}_{2}^{n}$ to itself defined by $y=\chi_n(x)$ with $y_i=x_i+x_{i+2}(1+x_{i+1})$, where the indices are computed modulo $n$, has been widely studied for its applications in lightweight cryptography. However, $\chi_n $ is bijective on $\mathbb{F}_2^n$ only when $n$ is odd, restricting its use to odd-dimensional vector spaces over $\mathbb{F}_2$. To address this limitation, we introduce and analyze the generalized mapping $\chi_{n, m}$ defined by...

2026/209 (PDF) Last updated: 2026-02-09
Post-Quantum Security of Block Cipher Constructions
Gorjan Alagic, Chen Bai, Christian Majenz, Kaiyan Shi
Secret-key cryptography

Block ciphers are versatile cryptographic ingredients that are used in a wide range of applications ranging from secure Internet communications to disk encryption. While post-quantum security of public-key cryptography has received significant attention, the case of symmetric-key cryptography (and block ciphers in particular) remains a largely unexplored topic. In this work, we set the foundations for a theory of post-quantum security for block ciphers and associated constructions....

2026/205 (PDF) Last updated: 2026-02-11
Differential-Linear Attacks from New Distinguishers: the case of SERPENT and PRESENT
Thierno Mamoudou Sabaly, Marine Minier
Secret-key cryptography

Differential-linear distinguishers have been introduced by Langford and Hellman in 1994. They consist in combining, first, a differential distinguisher and second, a linear distinguisher and then study the bias between plaintexts with a difference and linear approximations of the two ciphertexts to create a differential-linear distinguisher. The original method has been improved by Bar-On et al. in 2019 where the table called the DLCT (Differential Linear Connectivity Table) has been...

2026/176 (PDF) Last updated: 2026-02-03
Differential Pattern Transition: Characterizing the Differential Behavior of AES-like Linear Layers
Jianhua Wang, Tao Huang, Siwei Sun, Hailun Yan, Guang Zeng, Shuang Wu
Secret-key cryptography

This paper introduces a new cryptographic notion for diffusion matrices, termed the Differential Pattern Transition($\textsf{DPT}$). Building on this notion, we develop a systematic framework for describing the differential behavior of diffusion layers over multiple rounds in $\texttt{AES}$-like block ciphers. Specifically, the $\textsf{DPT}$ framework enables a finer-grained evaluation of diffusion strength against differential attacks, allowing distinctions even among matrices sharing the...

2026/152 (PDF) Last updated: 2026-01-31
On the Quantum Collision Resistance of HCF Hash Functions
Alisée Lafontaine, André Schrottenloher
Secret-key cryptography

At EUROCRYPT 2020, Hosoyamada and Sasaki obtained the first dedicated quantum collision attacks on hash functions reaching more rounds than the classical ones. Indeed, as the speedup of generic quantum collision search is less than quadratic, an attack based on Grover's search may become comparatively more efficient in the quantum setting. In this paper, we focus on collision attacks on double-block length hash functions, and more precisely the Hirose compression function (HCF). At ToSC...

2026/128 (PDF) Last updated: 2026-02-13
The Impossibility of Post-Quantum Public Indifferentiability for Merkle-Damgard
Akinori Hosoyamada
Secret-key cryptography

The Merkle-Damg{\aa}rd construction (in its strengthened form used as in SHA-2) is not classically indifferentiable from a Variable-Input-Length (VIL) random oracle because of the length-extension attack. Nevertheless, Dodis, Ristenpart, and Shrimpton showed that Merkle-Damg{\aa}rd is publicly indifferentiable, a weaker notion that still justifies replacing a VIL random oracle by Merkle-Damg{\aa}rd in many security proofs when all inputs to a random oracle are public (e.g., Fiat-Shamir and...

2026/122 (PDF) Last updated: 2026-02-18
The Motte-and-Bailey Framework for Leakage-Resilient Accordion Modes: Featuring Qaitbay and Alicante
Mario Marhuenda Beltrán, Mustafa Khairallah
Secret-key cryptography

Accordion modes have experienced a surge in popularity, partially motivated by the recent NIST Accordion modes project. None of the existing practical constructions is leakage-resilient by default. In this work, we design a leakage-resilient Accordion mode. We start by presenting a generic analysis of the Encode-then-Encipher (EtE) framework in the leakage-resilient setting, assuming the enciphering is a leakage-resilient STPRP (STPRPl2). We show that the resulting security, while strong,...

2026/085 (PDF) Last updated: 2026-01-29
Beyond-Birthday-Bound Security with HCTR2: Cascaded Construction and Tweak-based Key Derivation
Yu Long Chen, Yukihito Hiraga, Nicky Mouha, Yusuke Naito, Yu Sasaki, Takeshi Sugawara
Secret-key cryptography

The block cipher (BC) mode for realizing a variable-input-length strong tweakable pseudorandom permutation (VIL-STPRP), also known as the accordion mode, is a rapidly growing research field driven by NIST's standardization project, which considers AES as a primitive. Widely used VIL-STPRP modes, such as HCTR2, have birthday-bound security and provide only 64-bit security with AES. To provide higher security, NIST is considering two directions: to develop new modes with beyond-birthday-bound...

2026/009 (PDF) Last updated: 2026-01-04
EGC-Stream: Design, Cryptanalysis, and Hardware Evaluation of an Expander-Graph-Based Stream Cipher
W.A. Susantha Wijesinghe
Secret-key cryptography

This paper introduces a design methodology for synchronous stream ciphers based on sparse expander graphs as the primary state evolution mechanism, and demonstrates its viability through EGC-Stream, a concrete 128-bit cipher instance. In contrast to conventional designs built around LFSR/NLFSR feedback or complex filtering functions, the proposed approach derives security from structural diffusion induced by a regular Cayley graph combined with a uniform nonlinear Boolean update rule. Key...

2025/2333 (PDF) Last updated: 2025-12-29
Analysis of Diffusion Properties in Generalized Feistel Ciphers under Multidimensional Linear Cryptanalysis
Betül Askin Özdemir, Vincent Rijmen
Secret-key cryptography

This paper presents a unified framework for generic attacks on Generalized Feistel Ciphers, with a primary focus on Type 1, Type 2, and unbalanced contracting (U-Type 1) Feistel constructions with non-invertible round functions. In recent work, authors reveal a class of vulnerabilities exploitable via key independent multidimensional linear trails for Feistel Ciphers, yielding efficient generic distinguishing and key-recovery attacks. We extend the extended work by formalizing the...

2025/2282 (PDF) Last updated: 2026-02-24
When Simple Permutations Mix Poorly: Limited Independence Does Not Imply Pseudorandomness
Jesko Dujmovic, Angelos Pelecanos, Stefano Tessaro
Secret-key cryptography

Over the past two decades, several works have used (almost) $k$-wise independence as a proxy for pseudorandomness in block ciphers, since it guarantees resistance against broad classes of statistical attacks. For example, even the case $k = 2$ already implies security against differential and linear cryptanalysis. Hoory, Magen, Myers, and Rackoff (ICALP ’04; TCS ’05) formulated an appealing conjecture: if the sequential composition of $T$ independent local randomized permutations is...

2025/2275 (PDF) Last updated: 2025-12-18
Random-Access AEAD for Fast Lightweight Online Encryption
Andrés Fábrega, Julia Len, Thomas Ristenpart, Gregory Rubin
Secret-key cryptography

We study the problem of random-access authenticated encryption. In this setting, one wishes to encrypt (resp., decrypt) a large payload in an online matter, i.e., using a limited amount of memory, while allowing for the processing of plaintext (resp., ciphertext) segments to be in a random order. Prior work has studied online AE for in-order (streaming) encryption and decryption, and later work added additional constraints to support random access decryption. The result is complicated...

2025/2274 (PDF) Last updated: 2025-12-18
Post-Quantum Security of the Sum of Even-Mansour
YanJin Tan, JunTao Gao, XueLian Li
Secret-key cryptography

The Sum of Even-Mansour (SoEM) construction was proposed by Chen et al. at Crypto 2019. This construction implements a pseudorandom permutation via the modular addition of two independent Even-Mansour structures and can spawn multiple variants by altering the number of permutations or keys. It has become the design basis for some symmetric schemes, such as the nonce-based encryption scheme CENCPP* and the nonce-based message authentication code scheme nEHTm. This paper provides a proof of...

2025/2265 (PDF) Last updated: 2025-12-17
PRGUE Schemes: Efficient Updatable Encryption With Robust Security From Symmetric Primitives
Elena Andreeva, Andreas Weninger
Secret-key cryptography

Securing sensitive data for long-term storage in the cloud is a challenging problem. Updatable encryption (UE) enables changing the encryption key of encrypted data in the cloud while the plaintext and all versions of the key remain secret from the cloud storage provider, making it an efficient alternative for companies that seek to outsource their data storage. The most secure UE schemes to date follow robust security models, such as the one by Boyd et al. from CRYPTO 2020, and rely...

2025/2260 (PDF) Last updated: 2025-12-16
Tight Generic PRF Security of HMAC and NMAC
Yaobin Shen, Xiangyang Zhang, Lei Wang, Dawu Gu
Secret-key cryptography

HMAC and its variant NMAC are among the most widely used methods for keying a cryptographic hash function to obtain a PRF or a MAC. Yet, even after nearly three decades of research, their generic PRF security still remains poorly understood, where the compression function of the underlying hash function is treated as a black box and accessible to the adversary. Although a series of works have exploited compression function queries to mount generic attacks, proving tight bounds on the...

2025/2246 (PDF) Last updated: 2025-12-13
Too Easy Fault Injection Attacks on Learning with Rounding (LWR)
Francesco Berti, Sasha Petri, Itamar Levi
Secret-key cryptography

We present an extend-and-prune fault Injection attack on serial implementations of Learning With Rounding that drop the least-significant bits. By iteratively isolating and recovering progressively larger key portions via faults, the attack recovers the secret key.

2025/2240 (PDF) Last updated: 2025-12-12
On the Cryptographic Resilience of MDS Matrices
Kamil Otal, Ali Mert Sülçe, Oğuz Yayla
Secret-key cryptography

The zero-difference attack on AES, introduced by Bardeh and Rijmen in [ToSC 2022(2):43--62], exploits some structural properties -referred to as related differentials- in the AES MDS matrix. Daemen and Rijmen earlier demonstrated that these related differentials appear not only in the AES MixColumns matrix but in all $4\times 4$ circulant MDS matrices [CCDS 2009(1):47--69]. In the same paper, they also showed an example of $4\times 4$ Hadamard MDS matrices for which there exists no related...

2025/2231 (PDF) Last updated: 2025-12-11
NeevAs: An AEAD Design for Lightweight Cryptography
Varsha Jarali, Hari Preeth S, Khushboo Bussi, Shashi Kant Pandey
Secret-key cryptography

Authenticity and confidentiality are crucial for maintaining a secure information infrastructure. Confidentiality prevents unauthorized disclosure, while authenticity ensures origin of the data.. Authenticated encryption ensures both simultaneously by protecting data from access and verifying integrity. This paper presents a NeevAs cipher suite offering authenticated encryption with associated data (AEAD) and hashing, based on a sponge-based duplex construction. The scheme included...

2025/2213 (PDF) Last updated: 2025-12-08
Simplified Meet-in-the-middle Preimage Attacks on AES-based Hashing
Mathieu Degré, Patrick Derbez, André Schrottenloher
Secret-key cryptography

The meet-in-the-middle (MITM) attack is a powerful cryptanalytic technique leveraging time-memory tradeoffs to break cryptographic primitives. Initially introduced for block cipher cryptanalysis, it has since been extended to hash functions, particularly preimage attacks on AES-based compression functions. Over the years, various enhancements such as superposition MITM (Bao et al., CRYPTO 2022) and bidirectional propagations have significantly improved MITM attacks, but at the cost of...

2025/2186 (PDF) Last updated: 2026-01-14
BEANIE – A 32-bit Cipher for Cryptographic Mitigations against Software Attacks
Simon Gerhalter, Samir Hodžić, Marcel Medwed, Marcel Nageler, Artur Folwarczny, Ventzi Nikov, Jan Hoogerbrugge, Tobias Schneider, Gary McConville, Maria Eichlseder
Secret-key cryptography

In modern CPU architectures, various security features to mitigate software attacks can be found. Examples of such features are logical isolation, memory tagging or shadow stacks. Basing such features on cryptographic isolation instead of logical checks can have many advantages such as lower memory overhead and more robustness against misconfiguration or low-cost physical attacks. The disadvantage of such an approach is however that the cipher that has to be introduced has a severe impact on...

2025/2148 (PDF) Last updated: 2025-11-24
Introducing the ALF family: AES-NI-based length- and format-preserving encryption
Dachao Wang, Alexander Maximov, Thomas Johansson
Secret-key cryptography

This paper introduces the ALF cipher family, designed for format-preserving encryption. The key strategy is to leverage AES-NI instructions to achieve a high software performance while also providing 128-bit security. As the input size may vary a lot between different cases, we present a family of ciphers, where different instances cover different domain sizes. While the included designs differ, the common theme is their use of AES-NI instructions in the designs. A central part of the paper...

2025/2140 (PDF) Last updated: 2025-11-23
Nostalgia Cipher: Can Filtered LFSRs Be Secure Again? An Application to Hybrid Homomorphic Encryption with Sub-50 ms Latency
Nabil Chacal, Antonio Guimarães, Ange Martinelli, Pierrick Méaux, Romain Poussier
Secret-key cryptography

Linear Feedback Shift Registers (LFSRs) combined with non linear filtering functions have long been a fundamental design for stream ciphers, offering a well-understood structure that remains easy to analyze. However, the introduction of algebraic attacks in 2003 shifted the focus toward more complex designs, as filtered LFSRs required larger registers to maintain security. While this was seen as a drawback at the time, it is no longer a limiting factor, and emerging cryptographic...

2025/2122 (PDF) Last updated: 2025-11-20
Adaptive Security for Constrained PRFs
Kaishuo Cheng, Joseph Jaeger
Secret-key cryptography

There is a gap between the security of constrained PRFs required in some applications and the security provided by existing definitions. This gap is typically patched by only considering nonadaptive security or manually mixing the CPRF with a random oracle (implicitly constructing a new CPRF) to achieve adaptive security. We fill this gap with a new definition for constrained PRFs with strong adaptive security properties and proofs that it is achieved by practical constructions based on the...

2025/2119 (PDF) Last updated: 2025-11-19
Twinkle: A family of Low-latency Schemes for Authenticated Encryption and Pointer Authentication
Jianhua Wang, Tao Huang, Shuang Wu, Zilong Liu
Secret-key cryptography

In this paper, we aim to explore the design of low-latency authenticated encryption schemes particularly for memory encryption, with a focus on the temporal uniqueness property. To achieve this, we present the low-latency Pseudo-Random Function (PRF) called $\mathtt{Twinkle}$ with an output up to 1152 bits. Leveraging only one block of $\texttt{Twinkle}$, we developed $\texttt{Twinkle-AE}$, a specialized authenticated encryption scheme with six variants covering different cache line sizes...

2025/2108 (PDF) Last updated: 2025-11-17
The Grain Family of Stream Ciphers: an Abstraction, Strengthening of Components and New Concrete Instantiations
Palash Sarkar
Secret-key cryptography

The first contribution of the paper is to put forward an abstract definition of the Grain family of stream ciphers which formalises the different components that are required to specify a particular member of the family. Our second contribution is to provide new and strengthened definitions of the components. These include definining new classes of nonlinear Boolean functions, improved definition of the state update function during initialisation, choice of the tap positions, and the...

2025/2085 (PDF) Last updated: 2025-11-13
Strong Pseudorandom Functions in $AC^0[2]$ in the Bounded-Query Setting
Marshall Ball, Clément Ducros, Saroja Erabelli, Lisa Kohl, Nicolas Resch
Secret-key cryptography

Understanding the minimal computational power needed to realize a pseudorandom function (PRF) is a long-standing question in cryptography. By the Razborov–Smolensky polynomial approximation method, it is known that $AC^0[2]$ cannot support strong pseudorandom functions with subexponential security, since any such function can be distinguished from random with quasipolynomially many samples. In this work, we initiate the study of low-complexity strong PRFs under a refined framework...

2025/2038 (PDF) Last updated: 2025-11-06
Breaking and Fixing MacaKey
Bishwajit Chakraborty, Chandranan Dhar
Secret-key cryptography

The sponge construction underpins many modern symmetric primitives, enabling efficient hashing and authenticated encryption. While full-state absorption is known to be secure in keyed sponges, the security of full-state squeezing has remained unclear. Recently, Lefevre and Marhuenda-Beltr\'an introduced \(\textsf{MacaKey}\), claiming provable security even when both phases operate over the full state. In this work, we revisit this claim and show that \(\textsf{MacaKey}\) is insecure. A...

2025/2011 (PDF) Last updated: 2025-10-28
When the Wrong Key Lives On: The Key-Recovery Procedure in Integral Attacks
Christof Beierle, Gregor Leander, Yevhen Perehuda
Secret-key cryptography

An integral distinguisher for a block cipher is defined by a nontrivial subset of plaintexts for which the bitwise sum of (parts of) a certain internal state is independent of the secret key. Such a distinguishing property can be turned into a key-recovery procedure by partially decrypting the ciphertexts under all possible keys and then filtering the key candidates using the integral distinguisher. The behavior of this filter has never been analyzed in depth, and we show that the ubiquitous...

2025/1971 (PDF) Last updated: 2025-10-21
General Key Recovery Attack on Pointwise-Keyed Functions - Application to Alternating Moduli Weak PRFs
Antoine Sidem, Qingju Wang
Secret-key cryptography

The increasing use of multi-party computation (MPC) has spurred the design of symmetric key primitives specifically suited for MPC environments. Recently, weak pseudorandom functions (wPRFs) based on the alternating moduli paradigm have been proposed as a promising class of MPC-friendly primitives. The wPRF proposed at CRYPTO 2024, in its One-to-One parameter set, has been shown to be vulnerable to a key recovery attack dubbed Zeroed-Out, exploiting collisions in the queries. In this...

2025/1960 (PDF) Last updated: 2025-10-20
Multiple Rows Mixers and Hsilu - A Family of Linear Layers and A Permutation with Fewer XORs
Xiaobin Yu, Meicheng Liu
Secret-key cryptography

Over the past decades, extensive research has been conducted on lightweight cryptographic primitives. The linear layer plays an important role in their security. In this paper, we propose a family of linear layers consisting of XORs and rotations, which is called multiple rows mixers (MRM). It is a family designed for LS-type ciphers, but mixing elements from several rows. We investigate the impact of the linear layers on the 3-round trail weight of permutations and explore the properties...

2025/1925 (PDF) Last updated: 2025-10-23
Improved Modeling for Substitution Boxes with Negative Samples and Beyond (Extended Version)
Debranjan Pal, Anubhab Baksi, Surajit Mandal, Santanu Sarkar
Secret-key cryptography

It is a common practice for symmetric-key ciphers is to encode a cryptanalysis problem as an instance of the Mixed Integer Linear Programming (MILP) and then run the instance with an efficient solver. For this purpose, it is essential to model the components in a way that is compatible with the MILP formulation while preserving the characteristics of the cipher. In this work, we look at the problem of efficiently encoding a substitution box (SBox for short). More specifically, we take the...

2025/1920 (PDF) Last updated: 2025-10-27
ALFOMs and the Moirai: Quantifying the Performance/Security Tradeoff for ZK-friendly Hash Functions
Aurélien Boeuf, Léo Perrin
Secret-key cryptography

Zero-Knowledge (ZK) protocols rely internally on hash functions for their security arguments. However, the hash functions that are the most efficient in this context differ substantially from e.g. SHA-3: their round function $R$ must enable an efficient arithmetization of its verification. In practice, it means that verifying if $y = R(x)$ involves as little finite field multiplications as possible. In turn, this design requirement implies a greater vulnerability to algebraic attacks. In...

2025/1918 (PDF) Last updated: 2025-10-14
Differential-MITM Attack on 14-round ARADI
Shibam Ghosh, Bastien Michel, María Naya-Plasencia
Secret-key cryptography

ARADI is a low-latency block cipher introduced by the U.S. National Security Agency (NSA) for secure and efficient memory encryption applications. In contrast to most ciphers proposed in the academic community, the design rationale for ARADI has not been publicly disclosed, limiting external evaluation to independent cryptanalysis. Several such analyses have already been published, with the most effective attacks to date reaching up to 12 out of 16 rounds. In this work, we present a...

2025/1911 (PDF) Last updated: 2025-10-13
Differential Meet-in-the-Middle Attacks on Feistel Ciphers
Bastien Michel, Dounia M'foukh, María Naya-Plasencia
Secret-key cryptography

Differential meet-in-the-middle attacks, introduced by Boura et al. in 2023, propose a new way of dealing with differential distinguishers. It allows, in particular, to combine differential attacks with initial structures, that were usually used exclusively for meet-in-the-middle attacks. Several applications of this new technique have been published, but so far the results on Feistel constructions have not improved much upon previous best known attacks. In this paper, we apply them on...

2025/1893 (PDF) Last updated: 2026-02-06
Poseidon(2)b: Binary Field Versions of Poseidon/Poseidon2
Lorenzo Grassi, Dmitry Khovratovich, Katharina Koschatko, Christian Rechberger, Markus Schofnegger, Verena Schröppel, Zhuo Wu
Secret-key cryptography

We present Poseidonb and Poseidon2b, natural variants of Poseidon and Poseidon2, respectively, defined over binary extension fields with a target security level of 128 bits. They are specifically designed to inherit many of the circuit-friendly properties of their prime field version, and to be used together with binary extension field proving systems such as Binius. Benchmarking demonstrates the merits in proof size, proving time, and especially verification time, in comparison to...

2025/1888 (PDF) Last updated: 2025-11-19
HCTR2-FP and HCTR3-FP: Format-Preserving Encryption from Wide-Block Ciphers
Frank Denis
Secret-key cryptography

Format-preserving encryption (FPE) enables encryption while maintaining syntactic properties such as character sets. The current NIST standard FF1 uses multi-round Feistel networks that sacrifice performance for flexibility, while FF3-1 was withdrawn in 2025 following successful cryptanalytic attacks. FAST, proposed as a faster alternative, has not been widely implemented due to its complexity, leaving limited practical alternatives. We present HCTR2-FP and HCTR3-FP, format-preserving...

2025/1872 (PDF) Last updated: 2025-10-08
Interoperable Symmetric Message Franking
Carolina Ortega Pérez, Thomas Ristenpart, Julia Len
Secret-key cryptography

The recent Digital Markets Act (DMA), a regulation passed by the European Union in 2022, requires messaging applications with large user bases to support interoperable end-to-end encrypted (E2EE) communication. This raises numerous questions about how to adapt cryptographic protocols to this setting in a way that preserves security and privacy. This question is not only limited to the main messaging protocols, but also extends to protocols for abuse mitigation such as the symmetric message...

2025/1820 (PDF) Last updated: 2025-11-29
On the Plaintext Awareness of AEAD Schemes
Mario Marhuenda Beltrán, Mustafa Khairallah
Secret-key cryptography

Plaintext-awareness of AEAD schemes is one of the more obscure and easily misunderstood notions. Originally proposed by Andreeva et al., Mennink and Talnikar showed in 2025 that the original definitions are vague and leave too much room for interpretation. They presented new definitions and analyzed the three main AEAD compositions relative to the new definitions. In particular, they showed that MAC-then-Encrypt (MtE) is not plaintext-aware. However, they showed that an SIV-style variant is...

2025/1800 (PDF) Last updated: 2026-01-12
Constructions of Efficiently Implementable Boolean Functions with Provable Nonlinearity/Resiliency/Algebraic Immunity Trade-Offs
Palash Sarkar
Secret-key cryptography

We describe several families of efficiently implementable Boolean functions achieving provable trade-offs between resiliency, nonlinearity, and algebraic immunity. In particular, the following statement holds for each of the function families that we propose. Given integers $m_0\geq 0$, $x_0\geq 1$, and $a_0\geq 1$, it is possible to construct an $n$-variable function which has resiliency at least $m_0$, linear bias (which is an equivalent method of expressing nonlinearity) at most...

2025/1678 (PDF) Last updated: 2025-09-16
Two-Key Variant of the Four-Round Cascading LRW1
Shreya Dey, Avijit Dutta, Kazuhiko Minematsu
Secret-key cryptography

In EUROCRYPT'20, Bao et al. have proved that three rounds of cascaded LRW1 construction provide security up to $2^{2n/3}$ queries. However, in a recent work by Khairallah et al., it has been shown that the construction provides only birthday bound security via exhibiting a distinguishing attack on the construction, and thereby invalidating the claim of Bao et al. In an independent and contemporaneous work, Datta et al. have shown that four rounds of cascading of the $\textsf{LRW1}$...

2025/1651 (PDF) Last updated: 2025-09-12
On the Cardinality of the Walsh Support of a Boolean Function
Maxence Jauberty, Pierrick Méaux
Secret-key cryptography

We provide a complete characterization of the possible cardinalities of Walsh supports of Boolean functions. Our approach begins with a detailed study of Siegenthaler’s construction and its properties, which allow us to derive relations between admissible support sizes in successive numbers of variables. We then introduce new notions such as Walsh space, reduction, and equivalence on supports, which form the structural framework of our analysis. For $n=6$, we perform an experimental...

2025/1632 (PDF) Last updated: 2025-09-10
Enhancing the DATF Technique in Differential-Linear Cryptanalysis
Cheng Che, Tian Tian
Secret-key cryptography

Differential-linear cryptanalysis was introduced by Langford and Hellman at CRYPTO'94 and has been an important cryptanalysis method against symmetric-key primitives. The current primary framework for constructing differential-linear distinguishers involves dividing the cipher into three parts: the differential part $E_0$, the middle connection part $E_m$, and the linear part $E_1$. This framework was first proposed at EUROCRYPT 2019, where DLCT was introduced to evaluate the...

2025/1603 (PDF) Last updated: 2025-09-11
Post-quantum Security of Key-Alternating Feistel Ciphers
Jyotirmoy Basak, Ritam Bhaumik, Amit Kumar Chauhan, Ravindra Jejurikar, Ashwin Jha, Anandarup Roy, André Schrottenloher, Suprita Talnikar
Secret-key cryptography

Since Kuwakado and Morii's work (ISIT 2010 & ISITA 2012), it is known that the classically secure 3-round Luby-Rackoff PRP and Even-Mansour cipher become insecure against an adversary equipped with quantum query access. However, while this query model (the so-called Q2 model) has led to many more attacks, it seems that restricting the adversary to classical query access prevents such breaks (the so-called Q1 model). Indeed, at EUROCRYPT 2022, Alagic et al. proved the Q1-security of the...

2025/1601 (PDF) Last updated: 2026-02-13
Meet-in-the-Middle Attacks on Full ChiLow
Eran Lambooij, Patrick Neumann, Michiel Verbauwhede, Shichang Wang, Tianyu Zhang
Secret-key cryptography

This work presents the first full-round attacks on ChiLow-32 and ChiLow-40, two tweakable low-latency block ciphers presented at Eurocrypt 2025. We first describe a straightforward Meet-in-the-Middle attack on full ChiLow-32 with multiple known plaintext-ciphertext pairs. To improve this attack, we carefully reduce the number of guesses required by (1) tracing differences in order to remove linear key dependencies and (2) moving from key guesses to state guesses. Using a novel method that...

2025/1597 (PDF) Last updated: 2025-10-13
The State-Test Technique on Differential Attacks: a 26-Round Attack on CRAFT and Other Applications
Dounia M'Foukh, María Naya-Plasencia, Patrick Neumann
Secret-key cryptography

The state-test technique, originally introduced in the context of impossible-differential cryptanalysis and recently used as an improvement for truncated-differential Meet-in-the-Middle attacks, has proven to be useful for reducing the complexity of attacks. In essence, the idea is to guess parts of the state instead of the key during the key-guessing stage of an attack, ultimately reducing the number of guesses needed. We generalize the idea of the state-test technique, allowing it to be...

2025/1586 (PDF) Last updated: 2025-09-03
A Note on Feedback-PRF Mode of KDF from NIST SP 800-108
Ritam Bhaumik, Avijit Dutta, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro
Secret-key cryptography

We consider FB-PRF, one of the key derivation functions defined in NIST SP 800-108 constructed from a pseudorandom function in a feedback mode. The standard allows some flexibility in the specification, and we show that one specific instance of FB-PRF allows an efficient distinguishing attack.

2025/1581 (PDF) Last updated: 2026-02-26
Cryptanalysis of ChiLow with Cube-Like Attacks
Shuo Peng, Jiahui He, Kai Hu, Zhongfeng Niu, Shahram Rasoolzadeh, Meiqin Wang
Secret-key cryptography

Proposed in EUROCRYPT~2025, \chilow is a family of tweakable block ciphers and a related PRF built on the novel nonlinear $\chichi$ function, designed to enable efficient and secure embedded code encryption. The only key-recovery results of \chilow are from designers which can reach at most 4 out of 8 rounds, which is not enough for a low-latency cipher like \chilow: more cryptanalysis efforts are expected. Considering the low-degree $\chichi$ function, we present three kinds of cube-like...

2025/1553 (PDF) Last updated: 2025-09-09
Understanding Unexpected Fixed-Key Differential Behaviours: How to Avoid Major Weaknesses in Lightweight Designs (Extended Version)
Anne Canteaut, Merlin Fruchon
Secret-key cryptography

Many design strategies and differential attacks rely on the so-called hypothesis of stochastic equivalence, which states that the differential behaviour of a cipher for any fixed key can be approximated by its average behaviour over all keys. However, this assumption is known to be invalid in general. For instance, all two-round differential characteristics of AES are plateau, meaning that their probabilities highly depend on the key. While such discrepancies were traditionally expected to...

2025/1552 (PDF) Last updated: 2025-09-12
Minimalist Model for Impossible Differentials
Patrick Derbez, Marie Euler
Secret-key cryptography

This paper introduces a new MILP modeling to find impossible differential (ID) distinguishers and attacks. Standard models for ID are negative models, in the sense that a differential is impossible if and only if the model has no solution. Our new modelling technique focuses on probable ID, differentials that are probably impossible. While this might lead to false positives, the main advantage is that searching for such probable ID can be achieved through a positive model. This facilitates...

2025/1550 (PDF) Last updated: 2025-08-29
Revisiting Time-Space Tradeoffs in Collision Search and Decision Problems
Jian Guo, Wenjie Nan, Yiran Yao
Secret-key cryptography

We present analysis of time-space tradeoffs for both the search and decision variants of the $k$-collision problem in algorithmic perspective, where $k \in \left[2, O(\operatorname{polylog}(N))\right]$ and the underlying function is $f_{N,M} : [N] \rightarrow [M]$ with $M \geq N$. In contrast to prior work that focuses either on 2-collisions or on random functions with $M = N$, our results apply to both random and arbitrary functions and extend to a broader range of $k$. The tradeoffs are...

2025/1544 (PDF) Last updated: 2025-08-28
MDS Diffusion Layers for Arithmetization-Oriented Symmetric Ciphers: The Rotational-Add Construction
Baofeng Wu, Wen Kong, Dewei Kong, Hailun Yan
Secret-key cryptography

We introduce the rotational-add diffusion layers aimed for applications in the design of arithmetization-oriented (AO) symmetric ciphers, such as fully homomorphic encryption (FHE)-friendly symmetric ciphers. This generalizes the rotational-XOR diffusion layers which have been utilized in the design of many important conventional symmetric ciphers like SHA-256, SM4, ZUC and Ascon. A rotational-add diffusion layer is defined over the finite field $\mathbb{F}_{p}$ for arbitrary prime $p$,...

2025/1543 (PDF) Last updated: 2025-09-01
Multiforked Iterated Even-Mansour and a Note on the Tightness of IEM Proofs
Elena Andreeva, Amit Singh Bhati, Andreas Weninger
Secret-key cryptography

The Iterated Even-Mansour (IEM) construction was introduced by Bogdanov et al. at EUROCRYPT 2012 and can be seen as an abstraction or idealization of blockciphers like AES. IEM provides insights into the soundness of this blockcipher structure and the best possible security for any number of rounds. IEM with $r$ permutations on $n$-bit blocks is secure up to $q \approx 2^{rn/(r+1)}$ queries to the cipher and each permutation. Forkciphers, introduced at ASIACRYPT 2019 as expanding...

2025/1518 (PDF) Last updated: 2025-08-23
Sequential Indifferentiability of STH and EDM
Nilanjan Datta, Avijit Dutta, Sougata Mandal, Hrithik Nandi
Secret-key cryptography

The notion of indifferentiability was proposed by Maurer et al. to bound the distinguishing advantage of a construction built on a public primitive, from a public random function. In Indocrypt'10, Mandal et al. have shown that the sum of two independent permutations is indifferentiable from a public random function up to $2^{2n/3}$ queries. Later in ACNS'15, Mennink and Preneel identified an analytical flaw of Mandal et al's result and revised the security bound to $2^{2n/3}/n$. In...

2025/1509 (PDF) Last updated: 2025-08-22
LEAP: High-Performance Lattice-Based Pseudorandom Number Generator
Yu Zhang, Xianhui Lu, Yijian Liu, Yongjian Yin, Kunpeng Wang
Secret-key cryptography

At EUROCRYPT2012, Banerjee, Peikert, and Rosen introduced Ring Learning With Rounding (RLWR) problem and constructed lattice-based pseudorandom functions for the first time. Subsequently, Banerjee, Brenner, Leurent, Peikert, and Rosen named this family of lattice-based pseudorandom functions as SPRING, reanalyzed the security, and gave two practical instances. Building upon the SPRING family, Bouillaguet, Delaplace, Fouque, and Kirchner further extended it to a pseudorandom number generator...

2025/1495 (PDF) Last updated: 2026-02-01
Pairwise independence of AES-like block ciphers
Tim Beyne, Gregor Leander, Immo Schütt
Secret-key cryptography

We prove that $4r + 4$ rounds of an AES variant with independent and uniform random round keys are $\varepsilon$-close to pairwise independent with $\varepsilon = 2^{14}\, 2^{-40r}$. This result follows from a near-optimal bound for a two-norm version of pairwise independence for the Shark construction, depending on the third singular value of the difference-distribution table of the S-boxes. Our analysis combines insights from cryptanalysis — in particular, truncated differentials — and...

2025/1489 (PDF) Last updated: 2025-08-18
PQ-STAR: Post-Quantum Stateless Auditable Rekeying
Shlomi Dolev, Avraham Yagudaev, Moti Yung
Secret-key cryptography

Rekeying is an effective technique for protecting symmetric ciphers against side-channel and key-search attacks. Since its introduction, numerous rekeying schemes have been developed. We introduce Post-Quantum Stateless Auditable Rekeying (PQ-STAR), a novel post-quantum secure stateless rekeying scheme with audit support. PQ-STAR is presented in three variants of increasing security guarantees: (i) Plain PQ-STAR lets an authorized auditor decrypt and verify selected ciphertexts; (ii)...

2025/1486 (PDF) Last updated: 2025-08-16
Naor-Reingold goes Beyond-the-Birthday-Bound
Avik Chakraborti, Bishwajit Chakraborty, Nilanjan Datta, Avijit Dutta, Ashwin Jha, Sougata Mandal, Hrithik Nandi, Mridul Nandi, Abishanka Saha
Secret-key cryptography

Construction of efficient and provably-secure (T)PRPs and (fixed/variable input-length) PRFs has been one of the central open problem in modern symmetric-key cryptography. Many Feistel-based constructions has been proposed and analysed to solve this problem. Inspired by some recent works, in this paper, we revisit the problem of constructing provably secure Feistel constructions using permutations as the round functions. More specifically, following the idea of Naor and Reingold, we try to...

2025/1481 (PDF) Last updated: 2025-08-15
A Camera Zoom-based Paper-Pencil Cipher Encryption Scheme atop Merkle–Hellman Knapsack Cryptosystem
Gopal Anantharaman, Jintai Ding
Secret-key cryptography

A Symmetric Key Encryption scheme using Camera Zooming is pre- sented using a familiar Paper-pencil cipher. The Camera can have a mag- nification/scaling up to some integer. The encrypter and decrypter are two hardware systems that are assumed to have the capability to zoom a given image with text from the resolution of a single character to a page by applying an appropriate scaling factor and an appropriate polynomial time zoom algorithm. Using the symmetric key, the Camera or a...

2025/1426 (PDF) Last updated: 2025-08-05
(Im)Possibility of Symmetric Encryption against Coordinated Algorithm Substitution Attacks and Key Exfiltration
Simone Colombo, Damian Vizár
Secret-key cryptography

A growing body of work addresses the security of cryptographic systems in the presence of mass surveillance, a threat made concrete by Snowden’s revelations and the widespread use of spyware against journalists and activists. In this paper, we investigate the security of symmetric encryption faced with simultaneous algorithm substitution attacks (ASAs) and key exfiltration (KE). The security of symmetric encryption in presence of ASAs or KE alone was established but no result deals with...

2025/1326 (PDF) Last updated: 2025-07-20
New Techniques for Analyzing Differentials with Application to AES
Itai Dinur
Secret-key cryptography

Differential cryptanalysis is one of the most powerful attacks on modern block ciphers. After many year of research, we have very good techniques for showing that the probability that an input difference leads to an output difference (i.e., the probability of a differential) is either significantly higher, or lower than expected, and such large deviations lead to attacks. On the other hand, modern techniques cannot estimate with high accuracy the probability of a differential that spans...

2025/1314 (PDF) Last updated: 2025-11-29
THF: Designing Low-Latency Tweakable Block Ciphers
Jianhua Wang, Tao Huang, Guang Zeng, Tianyou Ding, Shuang Wu, Siwei Sun
Secret-key cryptography

We introduce the $\textsf{Three-Hash Framework}$ ($\textsf{THF}$), a new instantiation of the $\textsf{LRW+}$ paradigm that employs three hash functions to process tweak inputs. We prove that $\textsf{THF}$ achieves beyond-birthday-bound security under standard assumptions. By extending the general practical cryptanalysis framework to the multiple-tweak setting, we further demonstrate that $\textsf{THF}$ offers balanced resistance to both single- and multiple-tweak attacks, thereby enabling...

2025/1265 (PDF) Last updated: 2025-07-09
A note on a recent attack against SPEEDY-7-192
Christina Boura, Patrick Derbez, Baptiste Germon, Rachelle Heim Boissier, María Naya-Plasencia
Secret-key cryptography

Recently, two independent differential attacks on SPEEDY-7-192 were proposed by Boura et al. and by Beyne and Neyt. Both works present, for the first time, a valid differential attack on SPEEDY-7-192 with time complexities of $2^{186.36}$ and $2^{185}$ respectively. In this note, by extending the search space for 1-round trails, we propose a new differential attack on SPEEDY-7-192 with both data and time complexity of $2^{174.80}$. This improves upon both previous attacks by more than a...

2025/1262 (PDF) Last updated: 2025-10-01
Vectorised Hashing Based on Bernstein-Rabin-Winograd Polynomials over Prime Order Fields
Kaushik Nath, Palash Sarkar
Secret-key cryptography

We introduce the new AXU hash function decBRWHash, which is parameterised by the positive integer $c$ and is based on Bernstein-Rabin-Winograd (BRW) polynomials. Choosing $c>1$ gives a hash function which can be implemented using $c$-way single instruction multiple data (SIMD) instructions. We report a set of very comprehensive hand optimised assembly implementations of 4-decBRWHash using avx2 SIMD instructions available on modern Intel processors. For comparison, we also report similar...

2025/1238 (PDF) Last updated: 2026-02-21
Extended $c$-differential distinguishers of full $9$ and reduced-round Kuznyechik cipher, no pre-whitening
Pantelimon Stanica, Ranit Dutta, Bimal Mandal
Secret-key cryptography

This paper introduces {\em truncated inner $c$-differential cryptanalysis}, a novel technique that for the first time enables the practical application of $c$-differential uniformity to block ciphers. While Ellingsen et al. (IEEE Trans. Inf. Theory, 2020) established the notion of $c$-differential uniformity by analyzing the equation $F(x\oplus a) \oplus cF(x) = b$, a key challenge remained: the outer multiplication by $c$ disrupts the structural properties essential for block cipher...

2025/1235 (PDF) Last updated: 2025-07-09
HiAE Remains Secure in Its Intended Model: A Clarification of Claimed Attacks
Han Chen, Tao Huang, Phuong Pham, Shuang Wu
Secret-key cryptography

HiAE is a recently proposed high-throughput authenticated encryption algorithm that achieves exceptional performance on both x86 and ARM architectures. Following its publication, several cryptanalysis papers have claimed that HiAE’s 256-bit encryption security is broken under the nonce-respecting model. In this note, we clarify that the claimed attacks rely critically on submitting forged-tag decryption queries — a type of behavior explicitly excluded by HiAE’s original security...

2025/1221 (PDF) Last updated: 2026-01-20
EWEMrl: A White-Box Secure Cipher with Longevity
Avik Chakraborti, Shibam Ghosh, Takanori Isobe, Sajani Kundu
Secret-key cryptography

We propose the first updatable white-box secure cipher, EWEMrl (Extended WEM with longevity against non-adaptive read-only adversaries), and its natural extension, EWEMxl (Extended WEM with longevity against executable adversaries), both based on WEM (White-box Even-Mansour), and both achieving longevity against non-adaptive read-only malware. The notion of longevity, introduced by Koike et al., addresses continuous code leakage and is stronger than incompressibility. While Yoroi...

2025/1217 (PDF) Last updated: 2025-07-15
Cymric: Short-tailed but Mighty
Alexandre Adomnicăi, Wonseok Choi, Yeongmin Lee, Kazuhiko Minematsu, Yusuke Naito
Secret-key cryptography

Authenticated encryption (AE) is a fundamental tool in today's secure communication. Numerous designs have been proposed, including well-known standards such as GCM. While their performance for long inputs is excellent, that for short inputs is often problematic due to high overhead in computation, showing a gap between the real need for IoT-like protocols where packets are often very short. Existing dedicated short-input AEs are very scarce, the classical Encode-then-encipher (Bellare and...

2025/1183 (PDF) Last updated: 2025-06-24
PA1 Security on Release of Unverified Plaintext in Encrypt-then-MAC AE Schemes
Bart Mennink, Suprita Talnikar
Secret-key cryptography

At ASIACRYPT 2014, Andreeva et al. put forward a definition for security of authenticated encryption under release of unverified plaintext. They introduced two notions of plaintext awareness (PA1 and its stronger sibling PA2), suggested to be used in conjunction with confidentiality in case of release of unverified plaintext, as well as the notion of integrity under release of unverified plaintext (INT-RUP). Various efforts have been made to develop a unified model (e.g., Ashur et al.,...

2025/1180 (PDF) Last updated: 2025-06-23
Cryptanalysis of HiAE
Alexander Bille, Elmar Tischhauser
Secret-key cryptography

We describe key recovery attacks on the authenticated stream cipher HiAE, which was recently proposed for future high-throughput communication networks such as 6G by Huawei. HiAE uses a 2048-bit state, a 256-bit key and produces 128-bit tags, targeting 256-bit security against key and state recovery. As a nonce-based AEAD scheme, it relies on the uniqueness of the nonce per key for these security claims. Our analysis indicates that a complete recovery of the 256-bit key of HiAE is possible...

2025/1165 (PDF) Last updated: 2025-06-19
Automated Analysis and Synthesis of Message Authentication Codes
Stefan Milius, Dominik Paulus, Dominique Schröder, Lutz Schröder, Julian Thomas
Secret-key cryptography

Message Authentication Codes (MACs) represent a fundamental symmetric key primitive, serving to ensure the authenticity and integrity of transmitted data. As a building block in authenticated encryption and in numerous deployed standards, including TLS, IPsec, and SSH, MACs play a central role in practice. Due to their importance for practice, MACs have been subject to extensive research, leading to prominent schemes such as HMAC, CBCMAC, or LightMAC. Despite the existence of various...

2025/1148 (PDF) Last updated: 2025-06-21
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security
Avik Chakraborti, Mridul Nandi, Suprita Talnikar, Kan Yasuda
Secret-key cryptography

Observing the growing popularity of random permutation (RP)-based designs (e.g, Sponge), Bart Mennink in CRYPTO 2019 has initiated an interesting research in the direction of RP-based pseudorandom functions (PRFs). Both are claimed to achieve beyond-the-birthday-bound (BBB) security of $2n/3$ bits ($n$ being the input block size in bits) but require two instances of RPs and can handle only one-block inputs. In this work, we extend research in this direction by providing two new BBB-secure...

2025/1133 (PDF) Last updated: 2025-06-16
A Note on the Rank Defect Phenomena in The Linearization Attack on Elisabeth-4
Antoine Bak
Secret-key cryptography

This note gives an explanation for a phenomenon which appeared in the cryptanalysis of the Elisabeth-4 stream cipher, a stream cipher optimized for Torus Fully Homomorphic Encryption (TFHE). This primitive was broken in 2023 by a linearization attack. The authors of this attack made an observation on the rank of the linear system they generated, which was lower than expected. They have provided a partial explanation for it using some properties of the negacyclic lookup tables (NLUT), one of...

2025/1127 (PDF) Last updated: 2025-06-15
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
Secret-key cryptography

Constructing a committing authenticated encryption (AE) satisfying the CMT-4 security notion is an ongoing research challenge. We propose a new mode KIVR, a black-box conversion for adding the CMT-4 security to existing AEs. KIVR is a generalization of the Hash- then-Enc (HtE) [Bellare and Hoang, EUROCRYPT 2022] and uses a collision-resistant hash function to generate an initial value (or nonce) and a mask for redundant bits, in addition to a temporary key. We ob- tain a general bound...

2025/1123 (PDF) Last updated: 2025-06-14
Cryptographic Treatment of Key Control Security -- In Light of NIST SP 800-108
Ritam Bhaumik, Avijit Dutta, Akiko Inoue, Tetsu Iwata, Ashwin Jha, Kazuhiko Minematsu, Mridul Nandi, Yu Sasaki, Meltem Sönmez Turan, Stefano Tessaro
Secret-key cryptography

This paper studies the security of key derivation functions (KDFs), a central class of cryptographic algorithms used to derive multiple independent-looking keys (each associated with a particular context) from a single secret. The main security requirement is that these keys are pseudorandom (i.e., the KDF is a pseudorandom function). This paper initiates the study of an additional security property, called key control (KC) security, first informally put forward in a recent update to NIST...

2025/1089 (PDF) Last updated: 2025-11-22
Rugged Pseudorandom Permutations with Beyond-Birthday-Bound Security
Nilanjan Datta, Jean Paul Degabriele, Avijit Dutta, Vukašin Karadžić, Hrithik Nandi
Secret-key cryptography

A rugged pseudorandom permutation (RPRP) is a security notion for variable-length tweakable ciphers that is strictly weaker than the traditional notion of a strong pseudorandom permutation. Being a weaker security notion it admits more efficient constructions. Yet the notion is strong enough so that any such construction can lend itself to a number of practical applications. It can be used to construct onion encryption, misuse-resistant AEAD, and AEAD secure under the release of unverified...

2025/1059 (PDF) Last updated: 2025-09-01
Post-Quantum Security of Keyed Sponge-Based Constructions through a Modular Approach
Akinori Hosoyamada
Secret-key cryptography

Sponge-based constructions have successfully been receiving widespread adoption, as represented by the standardization of SHA-3 and Ascon by NIST. Yet, their provable security against quantum adversaries has not been investigated much. This paper studies the post-quantum security of some keyed sponge-based constructions in the quantum ideal permutation model, focusing on the Ascon AEAD mode and KMAC as concrete instances. For the Ascon AEAD mode, we prove the post-quantum security in the...

2025/1051 (PDF) Last updated: 2025-06-05
Synergy: A Lightweight Block Cipher with Variable Bit Rotation Feistel Network
Anders Lindman
Secret-key cryptography

Synergy is a lightweight block cipher designed for resource-constrained environments such as IoT devices, embedded systems, and mobile applications. Built around a 16-round Feistel network, 8 independent pseudorandom number generators (PRNGs) ensure strong diffusion and confusion through the generation of per-block unique round keys. With a 1024-bit key and a 64-bit block size, Synergy mitigates vulnerabilities to ML-based cryptanalysis by using a large key size in combination with key- and...

2025/1050 (PDF) Last updated: 2025-06-05
Integral Resistance of Block Ciphers with Key Whitening by Modular Addition
Christof Beierle, Phil Hebborn, Gregor Leander, Yevhen Perehuda
Secret-key cryptography

Integral attacks exploit structural weaknesses in symmetric cryptographic primitives by analyzing how subsets of inputs propagate to produce outputs with specific algebraic properties. For the case of (XOR) key-alternating block ciphers using (independent) round keys, at ASIACRYPT'21, Hebborn et al. established the first non-trivial lower bounds on the number of rounds required for ensuring integral resistance in a quite general sense. For the case of adding keys by modular addition, no...

2025/1031 (PDF) Last updated: 2025-06-03
Quasidifferential Saves Infeasible Differential: Improved Weak-Key Key-Recovery Attacks on Round-Reduced GIFT
Chengcheng Chang, Meiqin Wang, Wei Wang, Kai Hu
Secret-key cryptography

\gift, including \gift-64 and \gift-128, is a family of lightweight block ciphers with outstanding implementation performance and high security, which is a popular underlying primitive chosen by many AEADs such as \sundae. Currently, differential cryptanalysis is the best key-recovery attack on both ciphers, but they have stuck at 21 and 27 rounds for \gift-64 and \gift-128, respectively. Recently, Beyne and Rijmen proposed the quasidifferential transition matrix for differential...

2025/1006 (PDF) Last updated: 2026-02-18
Permutation-Based Hash from Non-Idealized Assumptions: Adding Feed-Forward to Sponge
Chun Guo, Kai Hu, Shuntian Jiang, Yanhong Fan, Yong Fu, Bart Preneel, Meiqin Wang
Secret-key cryptography

Avoiding feeding forward seems to be a major goal of the sponge construction. We make a step back and investigate adding feeding forward back to sponge. The obtained sponge-with-feeding-forward construction has a number of benefits: (1) In the random permutation model, its preimage and second preimage security bounds are much better than the standard sponge with the same capacity, while collision and indifferentiability security bounds are comparable; (2) Its collision and (second) preimage...

2025/984 (PDF) Last updated: 2025-05-28
AsconAEAD128 Revisited in the Multi-user Setting
Bishwajit Chakraborty, Mridul Nandi, Soumit Pal, Thomas Peyrin, Quan Quan Tan
Secret-key cryptography

After more than half a decade since its initiation, NIST declared Ascon as the winner of the LwC competition. In the first public draft of AsconAEAD128, NIST recognized that Ascon has limitations when used in multi-user applications. To mitigate this, NIST prescribed the use of a \(256\)-bit key in multi-user applications and produced an instantiation on how to process this extra key size in the current AsconAEAD128 API. While doing so, they identified a limitation of this new scheme (which...

2025/976 (PDF) Last updated: 2025-09-12
The Large Block Cipher Family Vistrutah
Roberto Avanzi, Avik Chakraborthi, Bishwajit Chakraborty, Eik List
Secret-key cryptography

Vistrutah is a block cipher with block sizes of 256 and 512 bits. It iterates a step function consisting of two AES rounds applied to each 128-bit block of the state, followed by a state-wide cell permutation. Building upon established design principles from Simpira, Haraka, Pholkos, and ASURA, Vistrutah leverages AES instructions to achieve high performance. For each component of Vistrutah, we conduct a systematic evaluation of functions that can be efficiently implemented on both Intel...

2025/963 (PDF) Last updated: 2025-10-04
Permutation-Based Hashing With Stronger (Second) Preimage Resistance
Siwei Sun, Shun Li, Zhiyu Zhang, Charlotte Lefevre, Bart Mennink, Zhen Qin, Dengguo Feng
Secret-key cryptography

The sponge is a popular construction of hash function design. It operates with a $b$-bit permutation on a $b$-bit state, that is split into a $c$-bit inner part and an $r$-bit outer part. However, the security bounds of the sponge are most often dominated by the capacity $c$: if the length of the digest is $n$ bits, the construction tightly achieves $\min\{n/2,c/2\}$-bit collision resistance, $\min\{n,c/2\}$-bit second preimage resistance, and $\min\{n,\max\{n-r,c/2\}\}$-bit preimage...

2025/955 (PDF) Last updated: 2025-05-26
Towards Better Integral Distinguishers over $\mathbb{F}_{p}$ Based on Exact Coefficients of Monomials
Muzhou Li, Jiamin Cui, Longzheng Cui, Kai Hu, Chao Niu, Meiqin Wang
Secret-key cryptography

Symmetric primitives used in multi-party computation, fully homomorphic encryption, and zero-knowledge proofs are often defined over Finite Field $\mathbb{F}_{q}$ with $q=2^t$ or an odd prime $p$. Integral attack is one of the most effective methods against such primitives due to the common use of low-degree non-linear layers. This in turn highlights the importance of a deeper understanding of degree growth. For ciphers defined over $\mathbb{F}_{2^t}$, numerous works have explored the growth...

2025/953 (PDF) Last updated: 2025-05-29
Tight Multi-User Security of CCM and Enhancement by Tag-Based Key Derivation Applied to GCM and CCM
Yusuke Naito, Yu Sasaki, Takeshi Sugawara
Secret-key cryptography

$\textsf{GCM}$ and $\textsf{CCM}$ are block cipher (BC) based authenticated encryption modes. In multi-user (mu) security, a total number of BC invocations by all users $\sigma$ and the maximum number of BC invocations per user $\sigma_\mathsf{u}$ are crucial factors. For $\textsf{GCM}$, the tight mu-security bound has been identified as $\frac{\sigma_\mathsf{u} \sigma}{2^n} + \frac{u p + u^2}{2^k}$, where $k$ and $n$ are respectively the key and block sizes, $u$ is the number of users, $p$...

Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.