New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey

被引:0
|
作者
XU, Y. A. Q., I [1 ,2 ]
WU, B. A. O. F. E. N. G. [1 ,2 ]
LIN, D. O. N. G. D. A. I. [1 ,2 ]
机构
[1] Chinese Acad Sci, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 66卷 / 09期
基金
中国国家自然科学基金;
关键词
differential-linear distinguisher; connective part; key recovery; partitioning technique; Chaskey; CRYPTANALYSIS;
D O I
10.1093/comjnl/bxac076
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Differential-linear cryptanalysis, as the combination of differential and linear cryptanalysis, is an efficient way to attack many kinds of ciphers. Recently, various refinements to this cryptanalytic technique have been proposed, especially with good effects on ARX ciphers. In the current framework of a differential-linear attack, a cipher E is often divided into three parts: a differential part E-1, a linear part E-2 and a connective part E-m. It is a challenging problem to deal with the connective part when building a differential-linear distinguisher, and for ARX ciphers, estimating the correlation of E-m experimentally under given input difference Delta(m) and output linear mask Gamma(m) is the main approach so far. In this paper, we discuss the effects of Delta(m) and Gamma(m) on the correlation of E-m for the first time. As a result, we propose a new strategy to find Delta(m) and Gamma(m) to build differential-linear distinguishers with high correlations for ARX ciphers based on algebraic equations derived from their round functions. For the key recovery parts of differential-linear attacks, we also find a new partitioning technique which will reduce the time complexity. Based on our new methods, we improve the differential-linear attack on 7-round Chaskey.
引用
收藏
页码:2279 / 2295
页数:17
相关论文
共 50 条
  • [21] Differential-linear cryptanalysis of serpent
    Biham, E
    Dunkelman, O
    Keller, N
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 9 - 21
  • [22] Revisiting Higher-Order Differential-Linear Attacks from an Algebraic Perspective
    Hu, Kai
    Peyrin, Thomas
    Tan, Quan Quan
    Yap, Trevor
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT III, 2023, 14440 : 405 - 435
  • [23] Differential-Linear Cryptanalysis Revisited
    Blondeau, Celine
    Leander, Gregor
    Nyberg, Kaisa
    JOURNAL OF CRYPTOLOGY, 2017, 30 (03) : 859 - 888
  • [24] Truncated differential-linear cryptanalysis
    He, Ye-Ping
    Wu, Wen-Ling
    Qing, Si-Han
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1294 - 1298
  • [25] Enhancing differential-linear cryptanalysis
    Biham, E
    Dunkelman, O
    Keller, N
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 254 - 266
  • [26] Differential-Linear Cryptanalysis Revisited
    Blondeau, Celine
    Leander, Gregor
    Nyberg, Kaisa
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 411 - 430
  • [27] New method for calculating the differential-linear bias of the ARX cipher
    Zhang F.
    Liu Z.
    Zhang J.
    Zhang W.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2024, 51 (02): : 211 - 223
  • [28] A Further Understanding of Differential-Linear Cryptanalysis
    REN Jiongjiong
    CHEN Shaozhen
    ChineseJournalofElectronics, 2020, 29 (04) : 660 - 666
  • [29] Rotational Differential-Linear Cryptanalysis Revisited
    Liu, Yunwen
    Niu, Zhongfeng
    Sun, Siwei
    Li, Chao
    Hu, Lei
    JOURNAL OF CRYPTOLOGY, 2023, 36 (01)
  • [30] Rotational Differential-Linear Cryptanalysis Revisited
    Yunwen Liu
    Zhongfeng Niu
    Siwei Sun
    Chao Li
    Lei Hu
    Journal of Cryptology, 2023, 36