• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2022, Vol. 44 ›› Issue (12): 2140-2145.

• Computer Network and Znformation Security • Previous Articles     Next Articles

Forgery attack on the authenticated encryption algorithm Pyjamask

HE Shui-yu1,WEI Yue-chuan1,2,PAN Feng1,2,CHANG Li-peng1   

  1. (1.School of Cryptography Engineering,Engineering University of PAP,Xi’an 710086;
    2.Key Laboratory of Network and Information Security of PAP,Xi’an 710086,China)
  • Received:2021-12-10 Revised:2022-04-11 Accepted:2022-12-25 Online:2022-12-25 Published:2023-01-04

Abstract: Pyjamask algorithm is one of the campaign algorithms shortlisted in the second round of LWC competition. This algorithm has the advantages of simple structure, light weight and high efficiency, and good parallel computing ability of nonlinear components, which has attracted the attention of many cryptographers. At present, there are relatively few researches on the security of this algorithm, and a new round of security evaluation is urgently needed. Based on the characteristics of Pyjamasks structure and adjustment parameters, this paper proposes a method for forging plaintexts, which can accurately forge authentication tags. Theoretical analysis shows that the success probability is 1 with negligible data complexity and time complexity when selecting a set of plaintexts, and the success probability is also 1 with high selected data requirements when selecting s+1 sets of plaintexts.


Key words: Pyjamask algorithm, forgery attack, authenticated encryption