User Tools

Site Tools


poet

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
Last revision Both sides next revision
poet [18/03/2014 12:56:03]
mmeh [Cryptanalysis]
poet [15/12/2014 13:13:39]
mmeh [Cryptanalysis]
Line 5: Line 5:
   * FSE 2014 Pre-proceedings version only accessible to conference participants.  ​   * FSE 2014 Pre-proceedings version only accessible to conference participants.  ​
   * CAESAR submission: [[http://​competitions.cr.yp.to/​round1/​poetv101.pdf|POET]]   * CAESAR submission: [[http://​competitions.cr.yp.to/​round1/​poetv101.pdf|POET]]
 +  * [[http://​competitions.cr.yp.to/​round1/​poet-ordering.txt|Proposal ordering]]
 +  * [[https://​maps.google.com/​maps?​q=50.975616,​11.329628&​num=1&​t=m&​z=17|Location]]
 +
 +===== Notes =====
 +The proposal POET-G using polynomial hashing for the epsilon-AXU has been withdrawn following the attack by Abdelraheem et al.
  
 ===== Cryptanalysis ===== ===== Cryptanalysis =====
- +^ Type ^ Queries ^ Reference ^ Comment ^ 
-In the preproceedings version of the POET paper from FSE 2014, a simple ciphertext forgery attack by [Guo-Jean-Peyrin-Wang][(ref:​caesar:​cryptoeprint2014197)] was possible using a single known ciphertext/​tag pair, under the condition that the message consists of at least 3 blocks. The attack was facitated by an incorrect formulation of POET in the preproceedings version, as was pointed out by Stefan Lucks in [[https://​groups.google.com/​forum/#​!topic/​crypto-competitions/​4-WMB0RrBzw|this discussion]] on the Cryptographic Competitions group, and is no longer applicable to the CAESAR candidate POET. +| Forgery ​ | 1 | GuoJeanPeyrin and Lei[(ref:​caesar:​cryptoeprint2014197)] | Applied to FSE pre-proceedings version ​
- +| Weak-key analysis and universal forgery |  | Abdelraheem,​ Bogdanov and Tischhauser[(:​ref:​caesar:​cryptoeprint2014226)] | Applicable to POET-G ​|
-^ Type of Analysis ​Number of Queries ^ Reference ^ Comment ^ +
-Ciphertext ​Forgery | 1 | by Jian Guo and Jérémy ​Jean and Thomas ​Peyrin and Wang Lei[(ref:​caesar:​cryptoeprint2014197)] | Applied to FSE pre-proceedings version |+
  
 ~~REFNOTES~~ ~~REFNOTES~~
  
  
poet.txt · Last modified: 15/12/2014 13:14:50 by mmeh