Key-Recovery Attacks on LED-Like Block Ciphers

被引:9
|
作者
Xu, Linhong [1 ]
Guo, Jiansheng [1 ]
Cui, Jingyi [1 ]
Li, Mingming [1 ]
机构
[1] Informat Sci & Technol Inst, Zhengzhou 450001, Henan, Peoples R China
关键词
key-recovery attack; cryptanalysis; post-quantum cryptography; lightweight block cipher; LED;
D O I
10.26599/TST.2018.9010130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Asymmetric cryptographic schemes, represented by RSA, have been shown to be insecure under quantum computing conditions. Correspondingly, there is a need to study whether the symmetric cryptosystem can still guarantee high security with the advent of quantum computers. In this paper, based on the basic principles of classical slide attacks and Simon's algorithm, we take LED-like lightweight block ciphers as research objects to present a security analysis under both classical and quantum attacks, fully considering the influence on the security of the ciphers of adding the round constants. By analyzing the information leakage of round constants, we can introduce the differential of the round constants to propose a classical slide attack on full-round LED-64 with a probability of 1. The analysis result shows that LED-64 is unable to resist this kind of classical slide attack, but that attack method is not applicable to LED-128. As for quantum attacks, by improving on existing quantum attack methods we demonstrate a quantum single-key slide attack on LED-64 and a quantum related-key attack on LED128, and indicators of the two attack algorithms are analyzed in detail. The attack results show that adding round constants does not completely improve the security of the ciphers, and quantum attacks can provide an exponential speed-up over the same attacks in the classical model. It further illustrates that the block cipher that is proved to be safe under classical settings is not necessarily secure under quantum conditions.
引用
收藏
页码:585 / 595
页数:11
相关论文
共 50 条
  • [31] Collision Attacks Against CAESAR Candidates Forgery and Key-Recovery Against AEZ and Marble
    Fuhr, Thomas
    Leurent, Gaetan
    Suder, Valentin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 510 - 532
  • [32] Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS’15
    Zhen Liu
    Yanbin Pan
    Jinwei Zheng
    Journal of Systems Science and Complexity, 2024, 37 : 1308 - 1325
  • [33] Quantum Key-Recovery on Full AEZ
    Bonnetain, Xavier
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2017, 2018, 10719 : 394 - 406
  • [34] Polynomial-Time Key-Recovery Attacks Against NTRUReEncrypt from ASIACCS'15
    Liu, Zhen
    Pan, Yanbin
    Zheng, Jinwei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2024, 37 (03) : 1308 - 1325
  • [35] Applicability of XSL attacks to block ciphers
    Xiao, L
    ELECTRONICS LETTERS, 2003, 39 (25) : 1810 - 1811
  • [36] A new type of attacks on block ciphers
    Ryabko B.Ya.
    Monarev V.A.
    Shokin Yu.I.
    Problems of Information Transmission, 2005, 41 (4) : 385 - 394
  • [37] New combined attacks on block ciphers
    Biham, E
    Dunkelman, O
    Keller, N
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 126 - 144
  • [38] Threshold key-recovery systems for RSA
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 48 - 54
  • [39] LED-like solar cell absorbs, emits light
    不详
    PHOTONICS SPECTRA, 2012, 46 (07) : 41 - 41
  • [40] Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations
    Niu, Zhongfeng
    Hu, Kai
    Sun, Siwei
    Zhang, Zhiyu
    Wang, Meiqin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 73 - 104