Key Difference Invariant Bias in Block Ciphers

被引:0
|
作者
Bogdanov, Andrey [1 ]
Boura, Christina [1 ]
Rijmen, Vincent [2 ,3 ]
Wang, Meiqin [4 ]
Wen, Long [4 ]
Zhao, Jingyuan [4 ]
机构
[1] Tech Univ Denmark, Lyngby, Denmark
[2] Katholieke Univ Leuven, ESAT SCD COSIC, Leuven, Belgium
[3] Katholieke Univ Leuven, iMinds, Leuven, Belgium
[4] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Shandong, Peoples R China
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I | 2013年 / 8269卷
关键词
block ciphers; key difference invariant bias; linear cryptanalysis; linear hull; key-alternating ciphers; LBlock; TWINE; CRYPTANALYSIS; PROBABILITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we reveal a fundamental property of block ciphers: There can exist linear approximations such that their biases epsilon are deterministically invariant under key difference. This behaviour is highly unlikely to occur in idealized ciphers but persists, for instance, in 5-round AES. Interestingly, the property of key difference invariant bias is independent of the bias value e itself and only depends on the form of linear characteristics comprising the linear approximation in question as well as on the key schedule of the cipher. We propose a statistical distinguisher for this property and turn it into an key recovery. As an illustration, we apply our novel cryptanalytic technique to mount related-key attacks on two recent block ciphers LBlock and TWINE. In these cases, we break 2 and 3 more rounds, respectively, than the best previous attacks.
引用
收藏
页码:357 / 376
页数:20
相关论文
共 50 条
  • [21] Key-Recovery Attacks on LED-Like Block Ciphers
    Xu, Linhong
    Guo, Jiansheng
    Cui, Jingyi
    Li, Mingming
    TSINGHUA SCIENCE AND TECHNOLOGY, 2019, 24 (05) : 585 - 595
  • [22] On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers
    Pehlivanoglu, Meltem Kurt
    Akleylek, Sedat
    Sakalli, M. Tolga
    Duru, Nevcihan
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 456 - 461
  • [23] A Sponge-Based Key Expansion Scheme for Modern Block Ciphers
    Sawka, Maciej
    Niemiec, Marcin
    ENERGIES, 2022, 15 (19)
  • [24] The security of elastic block ciphers against key-recovery attacks
    Cook, Debra L.
    Yung, Moti
    Keromytis, Angelos D.
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 89 - +
  • [25] On the existence of related-key oracles in cryptosystems based on block ciphers
    Razali, Ermaliza
    Phan, Raphael C. -W.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 425 - +
  • [26] Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks
    Nakamichi, Ryota
    Iwata, Tetsu
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 54 - 80
  • [27] Tweakable Block Ciphers
    Liskov, Moses
    Rivest, Ronald L.
    Wagner, David
    JOURNAL OF CRYPTOLOGY, 2011, 24 (03) : 588 - 613
  • [28] Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers
    Rana, Muhammad
    Mamun, Quazi
    Islam, Rafiqul
    SENSORS, 2023, 23 (18)
  • [29] Tweakable Block Ciphers
    Moses Liskov
    Ronald L. Rivest
    David Wagner
    Journal of Cryptology, 2011, 24 : 588 - 613
  • [30] Tweakable block ciphers
    Liskov, M
    Rivest, RL
    Wagner, D
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 31 - 46