Tweakable SM4: How to tweak SM4 into tweakable block ciphers?

被引:1
|
作者
Guo, Zhenzhen [1 ,2 ]
Wang, Gaoli [1 ,2 ]
Dunkelman, Orr [3 ]
Pan, Yinxue [1 ]
Liu, Shengyuan [1 ]
机构
[1] East China Normal Univ, Software Engn Inst, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Bengjing 100878, Peoples R China
[3] Univ Haifa, Comp Sci Dept, Haifa, Israel
基金
中国国家自然科学基金;
关键词
Tweakable block cipher; SM4; TNT; MILP; CRYPTANALYSIS; BLOCKCIPHERS; ROUNDS; MODES;
D O I
10.1016/j.jisa.2022.103406
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SM4 is China's commercial block cipher standard and an ISO/IEC international standard. While SM4 withstood a great deal of analysis, its non-tweakable structure makes it inflexible. In this paper, we study three different methods to turn SM4 into a tweakable block cipher. Based on the Tweak-aNd-Tweak (TNT) introduced by Bao et al. at EUROCRYPT 2020, we propose the first scheme, called TNT-SM4, which can be treated as an instantiation of TNT. For comparative analysis, the 128 and 32 bits tweaks are both adopted, which is denoted as TNT-SM4-128 and TNT-SM4-32, respectively. By taking full advantage of the structural characteristics of SM4, we also propose the second method, which studies how to tweak SM4 into a tweakable block cipher in a direct way. With the design goal of reducing the design, security evaluation, and implementation costs, we use SM4 as is and attach a lightweight linear tweak schedule to it. The biggest challenge is to find the best insertion location for tweaks in both aspects of security and efficiency. We extensively utilize mixed integer linear programming (MILP) to perform a comprehensive search. The third method adopts the same tweak schedule as the key schedule of SM4, which is equivalent to one more key schedule for SM4. We analyze the security of the three schemes, focusing on related-key and related-tweak attacks, and provide a comparative analysis of the three schemes. The results show that our schemes are secure, and a better scheme that makes SM4 more flexible is obtained from the comparison of the three schemes.
引用
下载
收藏
页数:15
相关论文
共 50 条
  • [21] Unbalanced sharing: a threshold implementation of SM4
    Man Wei
    Siwei Sun
    Zihao Wei
    Lei Hu
    Science China Information Sciences, 2021, 64
  • [22] Improving the performance of multi-mode SM4 block cipher
    Hu G.
    Chen R.
    International Journal of Performability Engineering, 2019, 15 (10) : 2589 - 2596
  • [23] SM4算法原理及实现
    冯燕强
    朱泽智
    冯智明
    广播电视网络, 2019, (06) : 94 - 96
  • [24] New quantum circuit implementations of SM4 and SM3
    Jian Zou
    Liji Li
    Zihao Wei
    Yiyuan Luo
    Qian Liu
    Wenling Wu
    Quantum Information Processing, 21
  • [25] New quantum circuit implementations of SM4 and SM3
    Zou, Jian
    Li, Liji
    Wei, Zihao
    Luo, Yiyuan
    Liu, Qian
    Wu, Wenling
    QUANTUM INFORMATION PROCESSING, 2022, 21 (05)
  • [26] New Second-order Threshold Implementation of Sm4 Block Cipher
    Tianyi Shao
    Bohua Wei
    Yu Ou
    Yongzhuang Wei
    Xiaonian Wu
    Journal of Electronic Testing, 2023, 39 : 435 - 445
  • [27] New Linear Cryptanalysis of Chinese Commercial Block Cipher Standard SM4
    Liu, Yu
    Liang, Huicong
    Wang, Wei
    Wang, Meiqin
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [28] An Optimized Isomorphic Design for the SM4 Block Cipher Over the Tower Field
    Wang, Chuang
    Ding, Yan
    Huang, Chenlin
    Song, Liantao
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 428 - 434
  • [29] Quantum circuit implementations of SM4 block cipher optimizing the number of qubits
    Luo, Qing-bin
    Li, Qiang
    Li, Xiao-yu
    Yang, Guo-wu
    Shen, Jinan
    Zheng, Minghui
    QUANTUM INFORMATION PROCESSING, 2024, 23 (05)
  • [30] Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher
    Lu, Jiqiang
    Li, Jingyu
    Chen, Zexuan
    Li, Yanan
    COMPUTER JOURNAL, 2023, 67 (05): : 1663 - 1673