Distinguishing Attack on NORX Permutation

NORX is a permutation-based authentication scheme which is currently a third-round candidate of the ongoing CAESAR competition. The security bound of NORX is derived from the sponge construction applied to an ideal underlying permutation. In this paper, we show that the NORX core permutation is non-...

Full description

Bibliographic Details
Main Authors: Tao Huang, Hongjun Wu
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2018-03-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/844