ICT: A Cryptanalysis Toolbox for Block Cipher Structure With Secret Components

被引:1
|
作者
Zhang, Jiyan [1 ]
Cui, Ting [1 ]
Jin, Chenhui [1 ]
机构
[1] PLA SSF Informat Engn Univ, Dept Appl Math, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret component recovery; block cipher structure; impossible differential cryptanalysis; equivalent structure; SKIPJACK;
D O I
10.1109/TIFS.2021.3108435
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a new technique for recovering the secret inner components of block cipher structures. This technique does not simply distinguish a block cipher structure from a random permutation but recovers the secret inner components. In addition, our technique is more general than ad hoc structural cryptanalysis for specific structures. A new tool, the Inequality Constraints Table ( ICT), is introduced to characterize the constraint relation of the secret inner components. If a complete ICT can be constructed, the secret components will be determined by a recursive algorithm. Based on the fundamental structure, an iterative method is proposed to construct an equivalent structure to simplify the initial guess regarding the secret components. Finally, we apply the new technique to several block cipher structures and obtain the secret component recovery results for the 5-round MISTY structure, 23- and 25- round Skipjack structure. To the best of our knowledge, this is the first time to present the structural cryptanalysis against the 5-round MISTY structure, 23- and 25- round Skipjack structure.
引用
收藏
页码:4482 / 4493
页数:12
相关论文
共 50 条
  • [41] Cryptanalysis of a new stream cipher structure
    Huang, Xiao-Li
    Wu, Chuan-Kun
    Ruan Jian Xue Bao/Journal of Software, 2008, 19 (05): : 1256 - 1264
  • [42] Cryptanalysis of Full-Round Magpie Block Cipher
    Yang, Yunxiao
    Sun, Bing
    Liu, Guoqiang
    CHINESE JOURNAL OF ELECTRONICS, 2023, 32 (02) : 217 - 224
  • [43] Self-similarity cryptanalysis of the block cipher ITUbee
    Soleimany, Hadi
    IET INFORMATION SECURITY, 2015, 9 (03) : 179 - 184
  • [44] Formal function cryptanalysis of block cipher and its application
    Peng, Chang-Yong
    Zhu, Chuang-Ying
    Huang, Li
    Zhu, Yue-Fei
    Wang, Jin-Hui
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2013, 41 (11): : 2314 - 2316
  • [45] Cryptanalysis of an involutional block cipher using cellular automata
    Sung, Jaechul
    Hong, Deukjo
    Hong, Seokhie
    INFORMATION PROCESSING LETTERS, 2007, 104 (05) : 183 - 185
  • [46] Improved Biclique Cryptanalysis of the Lightweight Block Cipher Piccolo
    Han, Guoyong
    Zhang, Wenying
    SECURITY AND COMMUNICATION NETWORKS, 2017, : 1 - 12
  • [47] Attention in Differential Cryptanalysis on Lightweight Block Cipher SPECK
    Deng, Haoran
    Cao, Xianghui
    Cheng, Yu
    2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 117 - 125
  • [48] Genetic algorithm cryptanalysis of a Feistel type block Cipher
    Albassal, AMB
    Wahdan, AMA
    ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 217 - 221
  • [49] Impossible Differential Cryptanalysis of Piccolo Lightweight Block Cipher
    Azimi, Seyyed Arash
    Ahmadian, Zahra
    Mohajeri, Javad
    Aref, Mohammad Reza
    2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 89 - 94
  • [50] LOCAL REDUCTION AND THE ALGEBRAIC CRYPTANALYSIS OF THE BLOCK CIPHER GOST
    Zajac, Pavol
    Cagala, Radoslav
    PERIODICA MATHEMATICA HUNGARICA, 2012, 65 (02) : 239 - 255