You can manage bookmarks using lists, please log in to your user account for this.
Media type:
E-Article
Title:
Xoodyak, a lightweight cryptographic scheme
Contributor:
Daemen, Joan;
Hoffert, Seth;
Peeters, Michaël;
Van Assche, Gilles;
Van Keer, Ronny
Published:
Universitatsbibliothek der Ruhr-Universitat Bochum, 2020
Published in:
IACR Transactions on Symmetric Cryptology (2020), Seite 60-87
Language:
Not determined
DOI:
10.46586/tosc.v2020.is1.60-87
ISSN:
2519-173X
Origination:
Footnote:
Description:
<jats:p>In this paper, we present Xoodyak, a cryptographic primitive that can be used for hashing, encryption, MAC computation and authenticated encryption. Essentially, it is a duplex object extended with an interface that allows absorbing strings of arbitrary length, their encryption and squeezing output of arbitrary length. It inherently hashes the history of all operations in its state, allowing to derive its resistance against generic attacks from that of the full-state keyed duplex. Internally, it uses the Xoodoo[12] permutation that, with its width of 48 bytes, allows for very compact implementations. The choice of 12 rounds justifies a security claim in the hermetic philosophy: It implies that there are no shortcut attacks with higher success probability than generic attacks. The claimed security strength is 128 bits. We illustrate the versatility of Xoodyak by describing a number of use cases, including the ones requested by NIST in the lightweight competition. For those use cases, we translate the relatively detailed security claim that we make for Xoodyak into simple ones.</jats:p>