State-Recovery Attacks on Modified Ketje Jr

In this article we study the security of the authenticated encryption algorithm Ketje against divide-and-conquer attacks. Ketje is a third-round candidate in the ongoing CAESAR competition, which shares most of its design principles with the SHA-3 hash function. Several versions of Ketje have been s...

Full description

Bibliographic Details
Main Authors: Thomas Fuhr, María Naya-Plasencia, Yann Rotella
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2018-03-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/843