Restricted near collision attack on Plantlet

被引:0
|
作者
Kumar, Satyam [1 ]
Mondal, Sandip Kumar [2 ]
Sarkar, Santanu [1 ]
Isobe, Takanori [3 ]
Baksi, Anubhab [4 ]
Adhikari, Avishek [5 ]
机构
[1] Indian Inst Technol Madras, Dept Math, Chennai, India
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
[3] Univ Hyogo, Hyogo, Japan
[4] Nanyang Technol Univ, Singapore City, Singapore
[5] Presidency Univ, Dept Math, Kolkata, India
关键词
Stream cipher; Plantlet; Cryptanalysis; Near collision attack;
D O I
10.1007/s13389-023-00336-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Plantlet is a recent lightweight stream cipher designed by Mikhalev, Armknecht and Muller in IACR ToSC 2017. This design paradigm receives attention as it is secure against generic time-memory-data trade-off attacks despite its small internal state size. One major motivation for Plantlet is to shore up the weaknesses of Sprout, which is another lightweight stream cipher from the same designers in IACR FSE 2015. In this paper, we observe that a full key recovery attack is possible using a restricted version of near collision attack. We have listed 38 internal state differences whose keystream differences have some fixed 0/1 pattern at certain positions and are efficient for our attack. An adversary in the online phase looks for any one of those 38 patterns in keystream difference. If found then with some probability, the adversary guesses the internal state difference. Afterwards, on solving a system of polynomial equations (formed by keystream bits) using a SAT solver, the adversary can recover the secret key if the guess is correct; otherwise, some contradiction occurs. After probability computations, we find that on repeating the experiment for a fixed number of times, the adversary can recover the secret key with expectation one. The time complexity of the whole process is 264.693 Plantlet encryptions which is 39 times faster than the previous best key recovery attack by Banik et al. in IACR ToSC 2019. We further suggest a countermeasure and its analysis to avoid our attacks. However, the complexity presented in this paper is dependent on the system architecture and implementation of the cipher.
引用
收藏
页码:19 / 34
页数:16
相关论文
共 50 条
  • [21] Instruction-Fetching Attack and Practice in Collision Fault Attack on AES
    Jiang, Huilong
    Zhu, Xiang
    Han, Jianwei
    SYMMETRY-BASEL, 2022, 14 (10):
  • [22] On the calculation of mean restricted collision stopping powers
    Tome, WA
    Palta, JR
    MEDICAL PHYSICS, 1998, 25 (05) : 758 - 772
  • [23] Collision avoidance between vessels in restricted visibility
    Fang, Quangen
    Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining & Technology, 26 (04): : 15 - 21
  • [24] Collision attack on XTR and a countermeasure with a fixed pattern
    Han, DG
    Takagi, T
    Kim, TH
    Kim, HW
    Chung, KI
    EMBEDDED AND UBIQUITOUS COMPUTING - EUC 2005 WORKSHOPS, PROCEEDINGS, 2005, 3823 : 864 - 873
  • [25] Generative Collision Attack on Deep Image Hashing
    Ying, Luyang
    Xiong, Cheng
    Qin, Chuan
    Luo, Xiangyang
    Qian, Zhenxing
    Zhang, Xinpeng
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2025, 20 : 2748 - 2762
  • [26] Collision attack on reduced-round Camellia
    Wenling Wu
    Dengguo Feng
    Science in China Series F: Information Sciences, 2005, 48 : 78 - 90
  • [27] Collision attack on reduced-round Camellia
    Wu, WL
    Feng, DG
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 78 - 90
  • [28] Horizontal collision correlation attack on elliptic curves
    Bauer, Aurelie
    Jaulmes, Eliane
    Prouff, Emmanuel
    Reinhard, Jean-Rene
    Wild, Justine
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (01): : 91 - 119
  • [29] Collision attack on reduced-round Camellia
    WU Wenling & FENG Dengguo State Key Laboratory of Information Security
    Science in China(Series F:Information Sciences), 2005, (01) : 78 - 90
  • [30] Collision Attack on NaSHA-384/512
    Li, Zhimin
    Jiang, Hongan
    Li, Cunhua
    2010 INTERNATIONAL CONFERENCE ON NETWORKING AND INFORMATION TECHNOLOGY (ICNIT 2010), 2010, : 243 - 246