ICT: A Cryptanalysis Toolbox for Block Cipher Structure With Secret Components

被引:1
|
作者
Zhang, Jiyan [1 ]
Cui, Ting [1 ]
Jin, Chenhui [1 ]
机构
[1] PLA SSF Informat Engn Univ, Dept Appl Math, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret component recovery; block cipher structure; impossible differential cryptanalysis; equivalent structure; SKIPJACK;
D O I
10.1109/TIFS.2021.3108435
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a new technique for recovering the secret inner components of block cipher structures. This technique does not simply distinguish a block cipher structure from a random permutation but recovers the secret inner components. In addition, our technique is more general than ad hoc structural cryptanalysis for specific structures. A new tool, the Inequality Constraints Table ( ICT), is introduced to characterize the constraint relation of the secret inner components. If a complete ICT can be constructed, the secret components will be determined by a recursive algorithm. Based on the fundamental structure, an iterative method is proposed to construct an equivalent structure to simplify the initial guess regarding the secret components. Finally, we apply the new technique to several block cipher structures and obtain the secret component recovery results for the 5-round MISTY structure, 23- and 25- round Skipjack structure. To the best of our knowledge, this is the first time to present the structural cryptanalysis against the 5-round MISTY structure, 23- and 25- round Skipjack structure.
引用
收藏
页码:4482 / 4493
页数:12
相关论文
共 50 条
  • [1] A generic framework for decomposing block cipher structure with secret components
    Zhang, Jiyan
    Cui, Ting
    Jin, Chenhui
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 60
  • [2] Cryptanalysis of Magpie Block Cipher
    Huang, Jin-Jie
    Wang, Jian-Shan
    Dai, Wei
    Shen, Xuan
    He, Jun
    2022 IEEE 10TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2022), 2022, : 717 - 721
  • [3] Cryptanalysis of QTL Block Cipher
    Coban, Mustafa
    Karakoc, Ferhat
    Ozen, Mehmet
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, 2017, 10098 : 60 - 68
  • [4] Cryptanalysis of the Mercy block cipher
    Fluhrer, SR
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 28 - 36
  • [5] An introduction to block cipher cryptanalysis
    De Cannière, C
    Biryukov, A
    Preneel, B
    PROCEEDINGS OF THE IEEE, 2006, 94 (02) : 346 - 356
  • [6] Cryptanalysis of reduced QTL block cipher
    Sadeghi, Sadegh
    Bagheri, Nasour
    Abdelraheemd, Mohamed Ahmed
    MICROPROCESSORS AND MICROSYSTEMS, 2017, 52 : 34 - 48
  • [7] A framework for describing block cipher cryptanalysis
    Phan, Raphael C.-W.
    Siddiqi, Mohammad Umar
    IEEE Trans Comput, 11 (1402-1409):
  • [8] Cryptanalysis of full PRIDE block cipher
    Yibin DAI
    Shaozhen CHEN
    Science China(Information Sciences), 2017, 60 (05) : 169 - 180
  • [9] Cryptanalysis of full PRIDE block cipher
    Dai, Yibin
    Chen, Shaozhen
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (05)
  • [10] Linear cryptanalysis of NUSH block cipher
    吴文玲
    冯登国
    Science in China(Series F:Information Sciences), 2002, (01) : 59 - 67