Tweakable SM4: How to tweak SM4 into tweakable block ciphers?

被引:1
|
作者
Guo, Zhenzhen [1 ,2 ]
Wang, Gaoli [1 ,2 ]
Dunkelman, Orr [3 ]
Pan, Yinxue [1 ]
Liu, Shengyuan [1 ]
机构
[1] East China Normal Univ, Software Engn Inst, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Bengjing 100878, Peoples R China
[3] Univ Haifa, Comp Sci Dept, Haifa, Israel
基金
中国国家自然科学基金;
关键词
Tweakable block cipher; SM4; TNT; MILP; CRYPTANALYSIS; BLOCKCIPHERS; ROUNDS; MODES;
D O I
10.1016/j.jisa.2022.103406
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SM4 is China's commercial block cipher standard and an ISO/IEC international standard. While SM4 withstood a great deal of analysis, its non-tweakable structure makes it inflexible. In this paper, we study three different methods to turn SM4 into a tweakable block cipher. Based on the Tweak-aNd-Tweak (TNT) introduced by Bao et al. at EUROCRYPT 2020, we propose the first scheme, called TNT-SM4, which can be treated as an instantiation of TNT. For comparative analysis, the 128 and 32 bits tweaks are both adopted, which is denoted as TNT-SM4-128 and TNT-SM4-32, respectively. By taking full advantage of the structural characteristics of SM4, we also propose the second method, which studies how to tweak SM4 into a tweakable block cipher in a direct way. With the design goal of reducing the design, security evaluation, and implementation costs, we use SM4 as is and attach a lightweight linear tweak schedule to it. The biggest challenge is to find the best insertion location for tweaks in both aspects of security and efficiency. We extensively utilize mixed integer linear programming (MILP) to perform a comprehensive search. The third method adopts the same tweak schedule as the key schedule of SM4, which is equivalent to one more key schedule for SM4. We analyze the security of the three schemes, focusing on related-key and related-tweak attacks, and provide a comparative analysis of the three schemes. The results show that our schemes are secure, and a better scheme that makes SM4 more flexible is obtained from the comparison of the three schemes.
引用
下载
收藏
页数:15
相关论文
共 50 条
  • [1] Differential Power Attack on SM4 block cipher
    Bai, Guoqiang
    Fu, Hailiang
    Li, Wei
    Wu, Xingjun
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1494 - 1497
  • [2] Tweakable Block Ciphers
    Liskov, Moses
    Rivest, Ronald L.
    Wagner, David
    JOURNAL OF CRYPTOLOGY, 2011, 24 (03) : 588 - 613
  • [3] Tweakable block ciphers
    Liskov, M
    Rivest, RL
    Wagner, D
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 31 - 46
  • [4] Tweakable Block Ciphers
    Moses Liskov
    Ronald L. Rivest
    David Wagner
    Journal of Cryptology, 2011, 24 : 588 - 613
  • [5] A new compact hardware architecture of S-Box for block ciphers AES and SM4
    Liu, Yaoping
    Wu, Ning
    Zhang, Xiaoqiang
    Zhou, Fang
    IEICE ELECTRONICS EXPRESS, 2017, 14 (11):
  • [6] Known-Key Attack on SM4 Block Cipher
    Kang, HyungChul
    Hong, Deukjo
    Sung, Jaechul
    Hong, Seokhie
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (12): : 2985 - 2990
  • [7] A Note on the Impossible Differential Attacks on Block Cipher SM4
    Chen, Jiazhe
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 551 - 554
  • [8] Optimization and implementation of the SM4 on FPGA
    He S.
    Li H.
    Li F.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2021, 48 (03): : 155 - 162
  • [9] Boolean Matrix Masking for SM4 Block Cipher Algorithm
    Pu, Sihang
    Guo, Zheng
    Liu, Junrong
    Gu, Dawu
    Yang, Yingxuan
    Tang, Xiaoke
    Gan, Jie
    2017 13TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2017, : 238 - 242
  • [10] Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
    Peyrin, Thomas
    Seurin, Yannick
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 33 - 63