Restricted near collision attack on Plantlet

被引:0
|
作者
Kumar, Satyam [1 ]
Mondal, Sandip Kumar [2 ]
Sarkar, Santanu [1 ]
Isobe, Takanori [3 ]
Baksi, Anubhab [4 ]
Adhikari, Avishek [5 ]
机构
[1] Indian Inst Technol Madras, Dept Math, Chennai, India
[2] Univ Calcutta, Dept Pure Math, Kolkata, India
[3] Univ Hyogo, Hyogo, Japan
[4] Nanyang Technol Univ, Singapore City, Singapore
[5] Presidency Univ, Dept Math, Kolkata, India
关键词
Stream cipher; Plantlet; Cryptanalysis; Near collision attack;
D O I
10.1007/s13389-023-00336-y
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Plantlet is a recent lightweight stream cipher designed by Mikhalev, Armknecht and Muller in IACR ToSC 2017. This design paradigm receives attention as it is secure against generic time-memory-data trade-off attacks despite its small internal state size. One major motivation for Plantlet is to shore up the weaknesses of Sprout, which is another lightweight stream cipher from the same designers in IACR FSE 2015. In this paper, we observe that a full key recovery attack is possible using a restricted version of near collision attack. We have listed 38 internal state differences whose keystream differences have some fixed 0/1 pattern at certain positions and are efficient for our attack. An adversary in the online phase looks for any one of those 38 patterns in keystream difference. If found then with some probability, the adversary guesses the internal state difference. Afterwards, on solving a system of polynomial equations (formed by keystream bits) using a SAT solver, the adversary can recover the secret key if the guess is correct; otherwise, some contradiction occurs. After probability computations, we find that on repeating the experiment for a fixed number of times, the adversary can recover the secret key with expectation one. The time complexity of the whole process is 264.693 Plantlet encryptions which is 39 times faster than the previous best key recovery attack by Banik et al. in IACR ToSC 2019. We further suggest a countermeasure and its analysis to avoid our attacks. However, the complexity presented in this paper is dependent on the system architecture and implementation of the cipher.
引用
收藏
页码:19 / 34
页数:16
相关论文
共 50 条
  • [41] Efficient Collision Attack Frameworks for RIPEMD-160
    Liu, Fukang
    Dobraunig, Christoph
    Mendel, Florian
    Isobe, Takanori
    Wang, Gaoli
    Cao, Zhenfu
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 117 - 149
  • [42] Correlation-Enhanced Power Analysis Collision Attack
    Moradi, Amir
    Mischke, Oliver
    Eisenbarth, Thomas
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2010, 2010, 6225 : 125 - +
  • [43] Differential Collision Attack on Reduced FOX Block Cipher
    Chen Jie
    Hu Yupu
    Zhang Yueyu
    Dong Xiaoli
    CHINA COMMUNICATIONS, 2012, 9 (07) : 71 - 76
  • [44] Bit-Free Collision: Application to APOP Attack
    Wang, Lei
    Sasaki, Yu
    Sakiyama, Kazuo
    Ohta, Kazuo
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 3 - 21
  • [45] Clustering Collision Power Attack on RSA-CRT
    Wan, Wunan
    Chen, Jun
    Xia, Jinyue
    Zhang, Jinquan
    Zhang, Shibin
    Chen, Hao
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2021, 36 (02): : 417 - 434
  • [46] Collision attack and pseudorandomness of reduced-round Camellia
    Wu, WL
    Feng, DG
    Chen, H
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 252 - 266
  • [47] Double Sieve Collision Attack Based on Bitwise Detection
    Ren, Yanting
    Wu, Liji
    Wang, An
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (01): : 296 - 308
  • [48] THE DYNAMICS OF SYSTEMS NEAR TO GRAZING COLLISION
    IVANOV, AP
    PMM JOURNAL OF APPLIED MATHEMATICS AND MECHANICS, 1994, 58 (03): : 437 - 444
  • [49] CHAOTIC DYNAMICS NEAR TRIPLE COLLISION
    MOECKEL, R
    ARCHIVE FOR RATIONAL MECHANICS AND ANALYSIS, 1989, 107 (01) : 37 - 69
  • [50] Near-optimal terrain collision
    Malaek, S. M.
    Abbasi, A.
    2006 IEEE AEROSPACE CONFERENCE, VOLS 1-9, 2006, : 2990 - +