Weak-Key Analysis of POET

Abstract

We evaluate the security of the recently proposed authenticated encryption scheme POET with regard to weak keys when its universal hash functions are instantiated with finite field multiplications. We give explicit constructions for weak key classes not covered by POET\u27s weak key testing strategy, and demonstrate how to leverage them to obtain universal forgeries

    Similar works