Questions tagged [related-keys]
Keys with an exploitable mathematical relationship, and the attacks they enable
26 questions
0 votes
0 answers
86 views
Good key schedules for block ciphers
Out of all the block cipher key schedules in currently existence, which one(s) would be good to reuse in new block cipher designs? I've seen someone on here state that Rijndael's key schedule is a ...
1 vote
1 answer
148 views
How does the Related Key Attack on Schnorr Signatures work in real life?
We know that Schnorr signature is applied this way: Key Generation Define curve $E$, field $\mathbf F_q$, order $N$, generator $G$, and hash $h$. Private key: $d \in (0, N)$, Public key: $P = dG$. ...
0 votes
0 answers
57 views
Is the CFB mode of Encryption related-key secure
I am going through the paper https://www.iacr.org/archive/fse2013/84240283/84240283.pdf where the related key security of CBC mode of encryption is well analyzed. I am concerned about whether the CFB ...
0 votes
1 answer
159 views
Derrive a new key from Trusted Third Party (e.g. Kerberos) session key
Kerberos (and I assume other Trusted Third Party protocols) use (hash) an existing shared secret key to create a session key used for authentication. I read that this authentication secret key can ...
2 votes
1 answer
278 views
RC4 Klein (or other) attack susceptibility question
What issues do yall see with the following in terms of key recovery and related key attacks: RC4 used to "sign" a nonce: 3 byte nonce concatenated with 16 byte long term key > RC4 ...
0 votes
1 answer
282 views
Using TEA to build a hash function
Background: TEA uses a 128 bit master key $K_{0\ldots3}$. All odd rounds use $K_0$, $K_1$ as the round subkey, and all even rounds use $K_2$, $K_3$. One cycle of TEA applied to the block $A_i$,$B_i$ ...
2 votes
0 answers
68 views
Encrypting with one key and decrypting with a related key
Given $n$-bit block cipher $E$ (and its inverse $E^{-1}$), define block cipher $E^\prime_k(m) = E_k(E_{f(k)}^{-1}(m))$ where $k,f(k) \in \{0,1\}^n$ and $\forall k:f(k) \ne k$. Under the ideal block ...
0 votes
0 answers
43 views
Proof of score in a public game with a public contract leaderboard
Game: Users stack blocks to form an unstable tower. Each time a new block is successfully laid, the game creates a score_string which is meant as proof of the user's current score. Assume each user ...
2 votes
1 answer
475 views
Does Wikipedia's WEP - RC4 example really demonstrate a related key attack or just an IV reuse attack?
On Wikipedia's Related Key attacks page, there is a section about WEP as an example to related key attacks. Encryption uses the RC4 algorithm, a stream cipher. It is essential that the same key never ...
0 votes
1 answer
775 views
Related Key Attack on Schnorr Signature - Why does the challenge include $\psi = g^x$, not $y$?
The original Schnorr signature scheme suffers from a Related Key Attack (RKA) as described by Morita et al. The authors of this paper then suggest a modification to the signature algorithm to prevent ...
3 votes
1 answer
131 views
How exactly to concatenate two differential trails to form a boomerang disguisher in practice?
I've been reading many papers on boomerang/rectangle attacks. The general strategy is to find two trails for a small number of rounds and then concatenate them to form a longer distinguisher. ...
0 votes
1 answer
92 views
How modern messengers encryption keys can't be hacked [closed]
I dont know is this question more like reverse-engineering or cryptographic. Why governments are hunting for encryptions keys? Aren't they delievering by the network the same as the encypted messages? ...
1 vote
1 answer
671 views
Is there any practical use of reduced rounds of AES
There are lots of attacks which are on reduced block ciphers. There are practical attack on five rounds of AES-128five rounds aes broken in six minutes. I was just wondering if there is any practical ...
2 votes
1 answer
566 views
Related-key attacks against Salsa20 and ChaCha
From the Salsa20 security document, DJB states that he doesn't care about related key attacks: The standard solutions to all the standard cryptographic problems—encryption, authentication, etc.—are ...
3 votes
1 answer
275 views
Are two keys derived from the same password vulnerable to a related key attack?
Background I am currently writing a password manager application. As usual, the passwords are put in a file encrypted using a user-entered password. I'm using the NaCl library but actually it's not ...