International Conference on the Theory and Application of Cryptology and Information Security

ASIACRYPT 2011: Advances in Cryptology – ASIACRYPT 2011 pp 308-326

Cryptanalysis of ARMADILLO2

  • Mohamed Ahmed Abdelraheem
  • Céline Blondeau
  • María Naya-Plasencia
  • Marion Videau
  • Erik Zenner
Conference paper

DOI: 10.1007/978-3-642-25385-0_17

Volume 7073 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Abdelraheem M.A., Blondeau C., Naya-Plasencia M., Videau M., Zenner E. (2011) Cryptanalysis of ARMADILLO2. In: Lee D.H., Wang X. (eds) Advances in Cryptology – ASIACRYPT 2011. ASIACRYPT 2011. Lecture Notes in Computer Science, vol 7073. Springer, Berlin, Heidelberg

Abstract

ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique relying on the parallel matching algorithm that allows us to invert the ARMADILLO2 function. This makes it possible to perform a key recovery attack when used as a FIL-MAC. A variant of this attack can also be applied to the stream cipher derived from the PRNG mode. Finally we propose a (second) preimage attack when used as a hash function. We have validated our attacks by implementing cryptanalysis on scaled variants. The experimental results match the theoretical complexities.

In addition to these attacks, we present a generalization of the parallel matching algorithm, which can be applied in a broader context than attacking ARMADILLO2.

Keywords

ARMADILLO2meet-in-the-middlekey recovery attackpreimage attackparallel matching algorithm
Download to read the full conference paper text

Copyright information

© International Association for Cryptologic Research 2011

Authors and Affiliations

  • Mohamed Ahmed Abdelraheem
    • 1
  • Céline Blondeau
    • 2
  • María Naya-Plasencia
    • 3
    • 4
  • Marion Videau
    • 5
    • 6
  • Erik Zenner
    • 7
  1. 1.Department of MathematicsTechnical University of DenmarkDenmark
  2. 2.INRIA, project-team SECRETFrance
  3. 3.FHNWWindischSwitzerland
  4. 4.University of VersaillesFrance
  5. 5.Agence nationale de la sécurité des systèmes d’informationFrance
  6. 6.Université Henri Poincaré-Nancy 1 / LORIAFrance
  7. 7.University of Applied SciencesOffenburgGermany