Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT

被引:25
|
作者
Florez-Gutierrez, Antonio [1 ]
Naya-Plasencia, Maria [1 ]
机构
[1] INRIA, Paris, France
基金
欧洲研究理事会;
关键词
Linear cryptanalysis; FFT; Walsh Transform; Algorithm; 2; Key-recovery algorithm; PRESENT; CRYPTANALYSIS; PROBABILITY; COMPLEXITY; FFT;
D O I
10.1007/978-3-030-45721-1_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Linear cryptanalysis is one of the most important tools in use for the security evaluation of symmetric primitives. Many improvements and refinements have been published since its introduction, and many applications on different ciphers have been found. Among these upgrades, Collard et al. proposed in 2007 an acceleration of the key-recovery part of Algorithm 2 for last-round attacks based on the FFT. In this paper we present a generalized, matrix-based version of the previous algorithm which easily allows us to take into consideration an arbitrary number of key-recovery rounds. We also provide efficient variants that exploit the key-schedule relations and that can be combined with multiple linear attacks. Using our algorithms we provide some new cryptanalysis on PRESENT, including, to the best of our knowledge, the first attack on 28 rounds.
引用
收藏
页码:221 / 249
页数:29
相关论文
共 50 条
  • [1] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
    Cui, Tingting
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
  • [2] Quantum Linear Key-Recovery Attacks Using the QFT
    Schrottenloher, Andre
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT V, 2023, 14085 : 258 - 291
  • [3] Key-Recovery Attacks on ASASA
    Brice Minaud
    Patrick Derbez
    Pierre-Alain Fouque
    Pierre Karpman
    Journal of Cryptology, 2018, 31 : 845 - 884
  • [4] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 : 3 - 27
  • [5] Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Dhiman Saha
    Sourya Kakarla
    Srinath Mandava
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2017, 1 (3) : 282 - 296
  • [6] Key-Recovery Attacks on ASASA
    Minaud, Brice
    Derbez, Patrick
    Fouque, Pierre-Alain
    Karpman, Pierre
    JOURNAL OF CRYPTOLOGY, 2018, 31 (03) : 845 - 884
  • [7] Full Round Distinguishing and Key-Recovery Attacks on SAND-2
    Zhang, Zhuolong
    Chen, Shiyao
    Wang, Wei
    Wang, Meiqin
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT II, 2024, 14527 : 230 - 250
  • [8] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [9] Key-Recovery Attacks on CRAFT and WARP
    Sun, Ling
    Wang, Wei
    Wang, Meiqin
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 77 - 95
  • [10] Key-Recovery Attacks on Full KRAVATTE
    Chaigneau, Colin
    Fuhr, Thomas
    Gilbert, Henri
    Guo, Jian
    Jean, Jeremy
    Reinhard, Jean-Rene
    Song, Ling
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (01) : 5 - 28