Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT

被引:25
|
作者
Florez-Gutierrez, Antonio [1 ]
Naya-Plasencia, Maria [1 ]
机构
[1] INRIA, Paris, France
基金
欧洲研究理事会;
关键词
Linear cryptanalysis; FFT; Walsh Transform; Algorithm; 2; Key-recovery algorithm; PRESENT; CRYPTANALYSIS; PROBABILITY; COMPLEXITY; FFT;
D O I
10.1007/978-3-030-45721-1_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Linear cryptanalysis is one of the most important tools in use for the security evaluation of symmetric primitives. Many improvements and refinements have been published since its introduction, and many applications on different ciphers have been found. Among these upgrades, Collard et al. proposed in 2007 an acceleration of the key-recovery part of Algorithm 2 for last-round attacks based on the FFT. In this paper we present a generalized, matrix-based version of the previous algorithm which easily allows us to take into consideration an arbitrary number of key-recovery rounds. We also provide efficient variants that exploit the key-schedule relations and that can be combined with multiple linear attacks. Using our algorithms we provide some new cryptanalysis on PRESENT, including, to the best of our knowledge, the first attack on 28 rounds.
引用
收藏
页码:221 / 249
页数:29
相关论文
共 50 条
  • [11] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [12] Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
    Rohit, Raghvendra
    Hu, Kai
    Sarkar, Sumanta
    Sun, Siwei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 130 - 155
  • [13] Improved Linear Key Recovery Attacks on PRESENT
    Wu, Wenhui
    Li, Muzhou
    Wang, Meiqin
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (12) : 9195 - 9213
  • [14] A Key-Recovery Attack on 855-round Trivium
    Fu, Ximing
    Wang, Xiaoyun
    Dong, Xiaoyang
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 160 - 184
  • [15] Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
    Zhou, Haibo
    Li, Zheng
    Dong, Xiaoyang
    Jia, Keting
    Meier, Willi
    COMPUTER JOURNAL, 2020, 63 (08): : 1231 - 1246
  • [16] Speeding Up Preimage and Key-Recovery Attacks with Highly Biased Differential-Linear Approximations
    Niu, Zhongfeng
    Hu, Kai
    Sun, Siwei
    Zhang, Zhiyu
    Wang, Meiqin
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IV, 2024, 14923 : 73 - 104
  • [17] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [18] Revisit Division Property Based Cube Attacks: Key-Recovery or Distinguishing Attacks?
    Ye, Chen-Dong
    Tian, Tian
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (03) : 81 - 102
  • [19] Key-Recovery Attacks on LED-Like Block Ciphers
    Xu, Linhong
    Guo, Jiansheng
    Cui, Jingyi
    Li, Mingming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 585 - 595
  • [20] A Practical Key-Recovery Attack on 805-Round Trivium
    Ye, Chen-Dong
    Tian, Tian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 187 - 213