Impossible Differential Cryptanalysis of 16/18-Round Khudra

被引:0
|
作者
Karakoc, Ferhat [1 ]
Sagdicoglu, Oznur Mut [1 ]
Gonen, Mehmet Emin [1 ,2 ]
Ersoy, Oguzhan [3 ]
机构
[1] TUBITAK BILGEM UEKAE, PK 74, TR-41470 Gebze, Kocaeli, Turkey
[2] Gebze Tech Univ, Gebze, Kocaeli, Turkey
[3] Bogazici Univ, Istanbul, Turkey
关键词
Khudra; Generalized feistel structure; Lightweight; Impossible differential cryptanalysis; LIGHTWEIGHT BLOCK CIPHER;
D O I
10.1007/978-3-319-55714-4_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Khudra is a recently proposed lightweight block cipher specifically dedicated for Field Programmable Gate Arrays (FPGAs) implementation. It is a 4-branch type-2 generalized Feistel structure (GFS) of 18 rounds with 64-bit block size and 80-bit security margin. This paper studies the security of Khudra against impossible differential cryptanalysis. In the single-key scenario, the best impossible differential attack given by the designers works for 11 rounds with 2(57) chosen plaintexts and 2(61) encryptions. In this paper, by exploiting the structure of Khudra and the redundancy in its key schedule, we significantly improve previously known results. First, we propose an impossible differential attack on 14-round Khudra with 2(54.06) chosen plaintexts, 2(50.26) encryptions and 2(49) memory. Then, we extend the attack by including pre-whitening keys with 2(59.03) known plaintexts, 2(67.06) time and 2(59.03) memory complexities. Finally, we present an impossible differential attack against 16-round Khudra where whitening-keys are omitted. The 16-round attack requires 2(49.58) chosen plaintexts, 2(79.26) encryptions and 2(64) memory. To the best of our knowledge, these attacks are the best known attacks in the single-key scenario.
引用
收藏
页码:33 / 44
页数:12
相关论文
共 50 条
  • [31] Related-Key Impossible Differential Analysis of Full Khudra
    Yang, Qianqian
    Hu, Lei
    Sun, Siwei
    Song, Ling
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 135 - 146
  • [32] Integral Cryptanalysis and Impossible Differential Cryptanalysis of the μ2 Algorithm
    Hu Bin
    Zhang Guixian
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (09) : 3335 - 3342
  • [33] A new method for impossible differential cryptanalysis of 7-round advanced encryption standard
    Chen Jie
    Wei Yongzhuang
    Hu Yupu
    2006 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS PROCEEDINGS, VOLS 1-4: VOL 1: SIGNAL PROCESSING, 2006, : 1577 - +
  • [34] Impossible-Differential and Boomerang Cryptanalysis of Round-Reduced Kiasu-BC
    Dobraunig, Christoph
    List, Eik
    TOPICS IN CRYPTOLOGY - CT-RSA 2017, 2017, 10159 : 207 - 222
  • [36] Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher
    Shahmirzadi, Aein Rezaei
    Azimi, Seyyed Arash
    Salmasizadeh, Mahmoud
    Mohajeri, Javad
    Aref, Mohammad Reza
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2018, 10 (01): : 3 - 14
  • [37] Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher
    Shahmirzadi, Aein Rezaei
    Azimi, Seyyed Arash
    Salmasizadeh, Mahmoud
    Mohajeri, Javad
    Aref, Mohammad Reza
    2017 14TH INTERNATIONAL ISC (IRANIAN SOCIETY OF CRYPTOLOGY) CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2017, : 99 - 104
  • [38] Impossible differential cryptanalysis of Saturnin algorithm
    Jiang, Zilong
    Jin, Chenhui
    Tongxin Xuebao/Journal on Communications, 2022, 43 (03): : 53 - 62
  • [39] An improved impossible differential cryptanalysis of Zodiac
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    Mala, Hamid
    JOURNAL OF SYSTEMS AND SOFTWARE, 2010, 83 (04) : 702 - 709
  • [40] On computational complexity of impossible differential cryptanalysis
    Shakiba, Mohsen
    Dakhilalian, Mohammad
    Mala, Hamid
    INFORMATION PROCESSING LETTERS, 2014, 114 (05) : 252 - 255