Impossible Differential Cryptanalysis of 16/18-Round Khudra

被引:0
|
作者
Karakoc, Ferhat [1 ]
Sagdicoglu, Oznur Mut [1 ]
Gonen, Mehmet Emin [1 ,2 ]
Ersoy, Oguzhan [3 ]
机构
[1] TUBITAK BILGEM UEKAE, PK 74, TR-41470 Gebze, Kocaeli, Turkey
[2] Gebze Tech Univ, Gebze, Kocaeli, Turkey
[3] Bogazici Univ, Istanbul, Turkey
关键词
Khudra; Generalized feistel structure; Lightweight; Impossible differential cryptanalysis; LIGHTWEIGHT BLOCK CIPHER;
D O I
10.1007/978-3-319-55714-4_3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Khudra is a recently proposed lightweight block cipher specifically dedicated for Field Programmable Gate Arrays (FPGAs) implementation. It is a 4-branch type-2 generalized Feistel structure (GFS) of 18 rounds with 64-bit block size and 80-bit security margin. This paper studies the security of Khudra against impossible differential cryptanalysis. In the single-key scenario, the best impossible differential attack given by the designers works for 11 rounds with 2(57) chosen plaintexts and 2(61) encryptions. In this paper, by exploiting the structure of Khudra and the redundancy in its key schedule, we significantly improve previously known results. First, we propose an impossible differential attack on 14-round Khudra with 2(54.06) chosen plaintexts, 2(50.26) encryptions and 2(49) memory. Then, we extend the attack by including pre-whitening keys with 2(59.03) known plaintexts, 2(67.06) time and 2(59.03) memory complexities. Finally, we present an impossible differential attack against 16-round Khudra where whitening-keys are omitted. The 16-round attack requires 2(49.58) chosen plaintexts, 2(79.26) encryptions and 2(64) memory. To the best of our knowledge, these attacks are the best known attacks in the single-key scenario.
引用
收藏
页码:33 / 44
页数:12
相关论文
共 50 条
  • [41] Impossible differential cryptanalysis of SPN ciphers
    Li, R.
    Sun, B.
    Li, C.
    IET INFORMATION SECURITY, 2011, 5 (02) : 111 - 120
  • [42] Improved impossible differential cryptanalysis of ARIA
    Li, Shenhua
    Song, Chunyan
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 129 - +
  • [43] Unified Impossible Differential Cryptanalysis of ARIA
    Xue Weijia
    Lai Xuejia
    CHINA COMMUNICATIONS, 2012, 9 (08) : 129 - 134
  • [44] Impossible Differential Cryptanalysis of Fantomas and Robin
    Shen, Xuan
    Liu, Guoqiang
    Li, Chao
    Qu, Longjiang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (05): : 863 - 866
  • [45] New Results in Related Key Impossible Differential Cryptanalysis on Reduced Round AES-192
    Jithendra, K. B.
    Shahana, T. K.
    2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMMUNICATION AND COMPUTING TECHNOLOGY (ICACCT), 2018, : 291 - 295
  • [46] Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
    Liu, Ya
    Gu, Dawu
    Liu, Zhiqiang
    Li, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2451 - 2458
  • [47] Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack
    Cao, Weiwei
    INFORMATION SECURITY AND PRIVACY, PT II, ACISP 2024, 2024, 14896 : 245 - 265
  • [48] Impossible Differential Cryptanalysis for block cipher structures
    Kim, J
    Hong, S
    Sung, J
    Lee, S
    Lim, J
    Sung, S
    PROGRESS IN CRYPTOLOGY -INDOCRYPT 2003, 2003, 2904 : 82 - 96
  • [49] Impossible differential cryptanalysis of FBC-128
    Zhang, Yi
    Liu, Guoqiang
    Li, Chao
    Shen, Xuan
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 69
  • [50] Multiple Impossible Differential Cryptanalysis on Reduced FOX
    Li, Xinran
    Fu, Fang-Wei
    Guang, Xuan
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (03) : 906 - 911