Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

FYI Birthday Attacks aren't important in CTR mode #1

Closed
ryazo opened this issue Dec 16, 2018 · 1 comment
Closed

FYI Birthday Attacks aren't important in CTR mode #1

ryazo opened this issue Dec 16, 2018 · 1 comment

Comments

@ryazo
Copy link

ryazo commented Dec 16, 2018

Since this is for integer obfuscation, and I assume that you are using a generalized speck without initialization vectors (a common way to reuse a single key), birthday attacks shouldn't be important.

Rather it is the codebook attack (a known plaintext and ciphertext attack), which is less significant.

Anyway, emphasizing any cryptanalysis isn't important, this is only for obfuscation.

@qgustavor
Copy link
Owner

Well, as no block mode of operation was implemented it's ECB mode. I don't know so much about attacks against block ciphers so I based that part of the readme on the second point of this answer and a quick read from the first two sections of this page.

I want to avoid people thinking this is a Speck implementation made for encryption/decryption. As I wrote on the research section of the readme I just choose it because it was simple to implement and it was possible to make it work with various block sizes. I didn't tested it against any attacks and I don't if it's vulnerable to those, the only tests I did are those on test.js and checking it against test vectors from the specification PDF (the first test vector is the one from the example in the readme).

If you can improve the readme you can send a pull request.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants