Restricted near collision attack on Plantlet

被引:0
|
作者
Kumar, Satyam [1 ]
Mondal, Sandip Kumar [2 ]
Sarkar, Santanu [1 ]
Isobe, Takanori [3 ]
Baksi, Anubhab [4 ]
Adhikari, Avishek [5 ]
机构
[1] Indian Inst Technol Madras, Dept Math, Chennai, India
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
[3] Univ Hyogo, Hyogo, Japan
[4] Nanyang Technol Univ, Singapore City, Singapore
[5] Presidency Univ, Dept Math, Kolkata, India
关键词
Stream cipher; Plantlet; Cryptanalysis; Near collision attack;
D O I
10.1007/s13389-023-00336-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Plantlet is a recent lightweight stream cipher designed by Mikhalev, Armknecht and Muller in IACR ToSC 2017. This design paradigm receives attention as it is secure against generic time-memory-data trade-off attacks despite its small internal state size. One major motivation for Plantlet is to shore up the weaknesses of Sprout, which is another lightweight stream cipher from the same designers in IACR FSE 2015. In this paper, we observe that a full key recovery attack is possible using a restricted version of near collision attack. We have listed 38 internal state differences whose keystream differences have some fixed 0/1 pattern at certain positions and are efficient for our attack. An adversary in the online phase looks for any one of those 38 patterns in keystream difference. If found then with some probability, the adversary guesses the internal state difference. Afterwards, on solving a system of polynomial equations (formed by keystream bits) using a SAT solver, the adversary can recover the secret key if the guess is correct; otherwise, some contradiction occurs. After probability computations, we find that on repeating the experiment for a fixed number of times, the adversary can recover the secret key with expectation one. The time complexity of the whole process is 264.693 Plantlet encryptions which is 39 times faster than the previous best key recovery attack by Banik et al. in IACR ToSC 2019. We further suggest a countermeasure and its analysis to avoid our attacks. However, the complexity presented in this paper is dependent on the system architecture and implementation of the cipher.
引用
收藏
页码:19 / 34
页数:16
相关论文
共 50 条
  • [31] Horizontal Collision Correlation Attack on Elliptic Curves
    Bauer, Aurelie
    Jaulmes, Eliane
    Prouff, Emmanuel
    Wild, Justine
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 553 - 570
  • [32] Improved collision attack on reduced round Camellia
    Guan Jie
    Zhang Zhongya
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 182 - +
  • [33] A new collision attack on MD5
    Wang Yu
    Chen Jianhua
    He Debiao
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 767 - 770
  • [34] Symmetric periodic orbits near binary collision in a restricted four-body problem for the figure-eight choreography
    Bengochea, Abimael
    Burgos-Garcia, Jaime
    Perez-Chavela, Ernesto
    CELESTIAL MECHANICS & DYNAMICAL ASTRONOMY, 2024, 136 (05):
  • [35] Restricted medium: analytical theory of collision cascades and sputtering
    Glazov, LG
    IZVESTIYA AKADEMII NAUK SERIYA FIZICHESKAYA, 2000, 64 (04): : 631 - 638
  • [36] Decision supporting for ship collision avoidance in restricted waters
    Zhang Y.
    Shi G.
    Liu H.
    Li W.
    International Journal of Simulation and Process Modelling, 2020, 15 (1-2): : 40 - 51
  • [37] Artificial intelligence in solving collision problem in restricted area
    Maka, Marcin
    Dramski, Mariusz
    SCIENTIFIC JOURNALS OF THE MARITIME UNIVERSITY OF SZCZECIN-ZESZYTY NAUKOWE AKADEMII MORSKIEJ W SZCZECINIE, 2013, 36 (02): : 118 - 122
  • [38] PERIODIC ORBITS OF COLLISION IN RESTRICTED PROBLEM OF 3 BODIES
    GIACAGLIA, GE
    ASTRONOMICAL JOURNAL, 1967, 72 (03): : 386 - +
  • [39] A collision-attack on AES - Combining side channel- and differential-attack
    Schramm, K
    Leander, G
    Felke, P
    Paar, C
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 163 - 175
  • [40] An improved collision attack on MD5 algorithm
    Chen, Shiwei
    Jin, Chenhui
    INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 343 - 357