Related-key impossible boomerang cryptanalysis on LBlock

被引:0
|
作者
Xie M. [1 ]
Mu Y.-L. [1 ]
机构
[1] State Key Laboratory of Integrated Services Networks, Xidian University, Xi'an
来源
基金
中国国家自然科学基金;
关键词
Impossible boomerang; LBlock algorithm; Lightweight block cipher; Related-key;
D O I
10.11959/j.issn.1000-436x.2017101
中图分类号
学科分类号
摘要
The related-key impossible boomerang cryptanalysis and the strength of the lightweight block cipher LBlock against this method were investigated. A new attack on 22-round LBlock was presented combining impossible boomerang attacks with related-key attacks. A 15-round related-key impossible boomerang distinguisher was constructed. Based on the new distinguisher, an attack on 22-round LBlock was mounted successfully by concatenating 3-round to the beginning and 4-round to the end. The attack on 22-round LBlock required data complexity of only 251.3 plaintexts and computational complexity of about 271.54 22-round encryptions. Compared with published cryptanalysis results on 22-round LBlock, proposed attack has great advantages on data and computational complexities. © 2017, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:66 / 71
页数:5
相关论文
共 21 条
  • [1] Izadi M., Sadeghiyan B., Sadeghian S.S., Et al., MIBS: a new lightweight block cipher, 8th International Conference on Cryptology and Network Security-CANS 2009, pp. 334-348, (2009)
  • [2] Wu W.L., Zhang L., LBlock: a lightweight block cipher, 9th International Conference on Applied Cryptography and Network Security-ACNS 2011, pp. 327-344, (2011)
  • [3] Ojha S.K., Kumar N., Jain K., Et al., TWIS: a lightweight block cipher, 5th International Conference on Information Systems Security-ICISS 2009, pp. 280-291, (2009)
  • [4] Wu W.L., Zhang L., Yu X.L., The DBlock family of block ciphers, Science China Information Sciences, 58, 3, pp. 1-14, (2015)
  • [5] Liu Y., Gu D.W., Liu Z.Q., Et al., Impossible differential attacks on reduced-round LBlock, 8th International Conference on Information Security Practice and Experience-SPEC 2012, pp. 97-108, (2012)
  • [6] Sasaki Y., Wang L., Meet-in-the-middle technique for integral attacks against Feistel ciphers, 19th International Conference on Selected Areas in Cryptography-SAC 2012, pp. 234-251, (2013)
  • [7] Sasaki Y., Wang L., Comprehensive study of integral analysis on 22-round LBlock, 15th International Conference on Information Security and Cryptology-ICISC 2012, pp. 156-169, (2013)
  • [8] Liu S.S., Gong Z., Wang L.B., Improved related-key differential attacks on reduced-round LBlock, 14th International Conference on Information and Communications Security-ICICS 2012, pp. 58-69, (2012)
  • [9] Wen L., Wang M.Q., Zhao J.Y., Related-key impossible differential attack on reduced-round LBlock, Computer Science and Technology, 29, 11, pp. 165-176, (2014)
  • [10] Wu S.C., Linear cryptanalysis of lightweight block cipher LBlock, (2014)