An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers

被引:6
|
作者
Han, Guoyong [1 ,2 ]
Zhang, Wenying [1 ]
Zhao, Hongluan [3 ]
机构
[1] Shandong Normal Univ, Sch Informat Sci & Engn, Jinan, Shandong, Peoples R China
[2] Shandong Jianzhu Univ, Sch Management Engn, Jinan, Shandong, Peoples R China
[3] Shandong Jianzhu Univ, Sch Comp Sci & Technol, Jinan, Shandong, Peoples R China
基金
中国国家自然科学基金;
关键词
Impossible differential; SPN structure; Feistel structure; Kuznyechik; KLEIN; Midori; MIBS; CRYPTANALYSIS;
D O I
10.3837/tiis.2019.01.024
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Impossible differential cryptanalysis is an essential cryptanalytic technique and its key point is whether there is an impossible differential path. The main factor of influencing impossible differential cryptanalysis is the length of the rounds of the impossible differential trail because the attack will be more close to the real encryption algorithm with the number becoming longer. We provide the upper bound of the longest impossible differential trails of several important block ciphers. We first analyse the national standard of the Russian Federation in 2015, Kuznyechik, which utilizes the 16-byte LFSR to achieve the linear transformation. We conclude that there is no any 3-round impossible differential trail of the Kuznyechik without the consideration of the specific S-boxes. Then we ascertain the longest impossible differential paths of several other important block ciphers by using the matrix method which can be extended to many other block ciphers. As a result, we show that, unless considering the details of the S-boxes, there is no any more than or equal to 5-round, 7-round and 9-round impossible differential paths for KLEIN, Midori64 and MIBS respectively.
引用
收藏
页码:435 / 451
页数:17
相关论文
共 50 条
  • [21] Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY
    Song, Ling
    Fu, Qinggan
    Yang, Qianqian
    Lv, Yin
    Hu, Lei
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [22] Provable security of block ciphers against linear cryptanalysis: a mission impossible?
    Piret, Gilles
    Standaert, Francois-Xavier
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 50 (03) : 325 - 338
  • [23] Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers
    Chen, Huiqin
    Li, Yongqiang
    Abla, Parhat
    Li, Zhiran
    Jiao, Lin
    Wang, Mingsheng
    INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 431 - 451
  • [24] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Xuzi Wang
    Baofeng Wu
    Lin Hou
    Dongdai Lin
    Cybersecurity, 4
  • [25] Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers
    Wang, Xuzi
    Wu, Baofeng
    Hou, Lin
    Lin, Dongdai
    CYBERSECURITY, 2021, 4 (01)
  • [26] Dual Relationship Between Impossible Differentials and Zero Correlation Linear Hulls of SIMON-Like Ciphers
    Shen, Xuan
    Li, Ruilin
    Sun, Bing
    Cheng, Lei
    Li, Chao
    Liao, Maodong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 237 - 255
  • [27] Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES
    List, Eik
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2024, 2024, 14977 : 45 - 64
  • [28] On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
    Jha, Ashwin
    Nandi, Mridul
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 731 - 753
  • [29] On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
    Ashwin Jha
    Mridul Nandi
    Cryptography and Communications, 2018, 10 : 731 - 753
  • [30] On the Convergence of Upper Bound Techniques for the Average Length of Longest Common Subsequences
    Lueker, George S.
    PROCEEDINGS OF THE TENTH WORKSHOP ON ALGORITHM ENGINEERING AND EXPERIMENTS AND THE FIFTH WORKSHOP ON ANALYTIC ALGORITHMICS AND COMBINATORICS, 2008, : 169 - 182