User Tools

Site Tools


π-cipher

π-Cipher

The Algorithm

  • Author(s): Danilo Gligoroski, Hristina Mihajloska, Simona Samardjiska, Håkon Jacobsen, Mohamed El-Hadedy, Rune Erlend Jensen
  • CAESAR submission: π-Cipher
  • Proposed fix to padding rule: π-Cipher v2

Cryptanalysis

Type Data Memory Time Reference
Tag second-preimage attack, $\omega = 16$ $2^{11}$ $2^{11}$ $2^{22}$ Leurent 1)
Tag second-preimage attack, $\omega = 32$ $2^{16}$ $2^{15}$ $2^{31}$ Leurent 2)
Tag second-preimage attack, $\omega = 64$ $2^{22}$ $2^{23}$ $2^{45}$ Leurent 3)
Forgery due to padding weakness Fuhr and Leurent on Cryptographic Competitions
π-cipher.txt · Last modified: 15/12/2014 12:36:40 by mmeh