Provable Security Evaluation of Block Ciphers Against Demirci-Selcuk's Meet-in-the-Middle Attack

被引:1
|
作者
Sun, Bing [1 ,2 ,3 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
[3] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphers; Cryptography; Tools; Sun; Upper bound; Indexes; Standards; Meet-in-the-middle; characteristic matrix; subset representation; primitive index; AES; CRYPTANALYSIS;
D O I
10.1109/TIT.2021.3058377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Demirci-Selcuk's meet-in-the-middle attack is one of the most important methods among all the cryptanalytic vectors, which gives the best result against the round-reduced AES with respect to the rounds, and tradeoffs between data, time and memory. While we have already built provable security models against the differential cryptanalysis, linear cryptanalysis cryptanalysis, impossible differential and zero-correlation linear cryptanalysis, the provable security against the meet-in-the-middle attack is missing. In this paper, we propose the subset representation of function based on which we could give an algorithm to compute the exact number of parameters of the Demirci-Selcuk's distinguisher given the input and output, respectively. Experiments show that this algorithm can be more efficient than the automatical tool presented by Shi et al. at Asiacrypt 2018. We further extract a formula based on this algorithm and show an upper bound for the length of the Demirci-Selcuk's distinguisher of an iterative SPN cipher. We prove that for an SPN block cipher whose block size equals the key size, an effective Demirci-Selcuk-type meet-in-the-middle distinguisher covers at most twice the maximum of the primitive indexes of the linear layer and its inverse. As a result, we show that the known length of the Demirci-Selcuk's distinguisher of the AES-128 cannot be improved unless the details of the S-boxes are exploited, which demonstrates that the AES has a provable security against the Demirci-Selcuk's meet-in-the-middle attack.
引用
收藏
页码:4838 / 4844
页数:7
相关论文
共 34 条
  • [1] Automatic Demirci-Selcuk Meet-In-The-Middle Attack On SIMON
    Lv, Yin
    Shi, Danping
    Guo, Yi
    Chen, Qiu
    Hu, Lei
    Guo, Zihui
    [J]. COMPUTER JOURNAL, 2023, 66 (12): : 3052 - 3068
  • [2] Automatic Demirci-Selcuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging
    Chen, Qiu
    Shi, Danping
    Sun, Siwei
    Hu, Lei
    [J]. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 233 - 247
  • [3] Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY
    Shi, Danping
    Sun, Siwei
    Song, Ling
    Hu, Lei
    Yang, Qianqian
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 67 - 97
  • [4] THE CONDITIONS OF PROVABLE SECURITY OF BLOCK CIPHERS AGAINST TRUNCATED DIFFERENTIAL ATTACK
    Ruzhentsev, Victor
    [J]. STUDIA SCIENTIARUM MATHEMATICARUM HUNGARICA, 2015, 52 (02) : 176 - 184
  • [5] Meet-in-the-middle attack on TWINE block cipher
    Wang, Yan-Feng
    Wu, Wen-Ling
    [J]. Ruan Jian Xue Bao/Journal of Software, 2015, 26 (10): : 2684 - 2695
  • [6] Quantum Differential Meet-In-The-Middle Attack and Some Applications to Lightweight Ciphers
    Xu, Yin-Song
    Cai, Bin-Bin
    Yuan, Zheng
    Qin, Su-Juan
    Gao, Fei
    Wen, Qiao-Yan
    [J]. ADVANCED QUANTUM TECHNOLOGIES, 2024,
  • [7] A new meet-in-the-middle attack on the IDEA block cipher
    Demirci, H
    Selçuk, AA
    Türe, E
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2004, 3006 : 117 - 129
  • [8] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
    Liu, Feng
    Liu, Xuan
    Meng, Shuai
    [J]. ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532
  • [9] Match Box Meet-in-the-Middle Attack Against KATAN
    Fuhr, Thomas
    Minaud, Brice
    [J]. FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 61 - 81
  • [10] On a structure of block ciphers with provable security against differential and linear cryptanalysis
    Matsui, M
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 117 - 122