Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff

被引:2
|
作者
Zhou, Haibo [1 ,2 ]
Zong, Rui [3 ]
Dong, Xiaoyang [3 ]
Jia, Keting [4 ]
Meier, Willi [5 ]
机构
[1] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao 266237, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci & Technol BNRist, Beijing 100084, Peoples R China
[5] FHNW, Windisch, Switzerland
来源
COMPUTER JOURNAL | 2021年 / 64卷 / 04期
关键词
interpolation attack; Moebius Transform; Elephant; Kravatte; Xoofff;
D O I
10.1093/comjnl/bxaa101
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce an interpolation attack using the Moebius Transform. This can reduce the time complexity to get a linear system of equations for specified intermediate state bits, which is general to cryptanalysis of some ciphers with update function of low algebraic degree. Along this line, we perform an interpolation attack against Elephant-Delirium, a round 2 submission of the ongoing national institute of standards and technology (NIST) lightweight cryptography project. This is the first third-party cryptanalysis on this cipher. Moreover, we promote the interpolation attack by applying it to the Farfalle pseudo-random constructions Kravatte and Xoofff. Our attacks turn out to be the most efficient method for these ciphers thus far.
引用
收藏
页码:628 / 638
页数:11
相关论文
共 50 条
  • [31] Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2023, 17 (03) : 534 - 543
  • [32] Cryptanalysis of round-reduced ASCON
    Yanbin LI
    Guoyan ZHANG
    Wei WANG
    Meiqin WANG
    ScienceChina(InformationSciences), 2017, 60 (03) : 221 - 222
  • [33] Collisions for round-reduced LAKE
    Mendel, Florian
    Schlaeffer, Martin
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 267 - 281
  • [34] Cryptanalysis of round-reduced ASCON
    Li, Yanbin
    Zhang, Guoyan
    Wang, Wei
    Wang, Meiqin
    SCIENCE CHINA-INFORMATION SCIENCES, 2017, 60 (03)
  • [35] Cryptanalysis of Round-Reduced LED
    Nikolic, Ivica
    Wang, Lei
    Wu, Shuang
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 112 - 129
  • [36] Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT
    Seok, Byoungjin
    ELECTRONICS, 2024, 13 (20)
  • [37] Truncated differential based known-key attacks on round-reduced SIMON
    Hao, Yonglin
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (02) : 467 - 492
  • [38] Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
    Cui, Jiamin
    Hu, Kai
    Wang, Qingju
    Wang, Meiqin
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 223 - 246
  • [39] Truncated differential based known-key attacks on round-reduced SIMON
    Yonglin Hao
    Willi Meier
    Designs, Codes and Cryptography, 2017, 83 : 467 - 492
  • [40] Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
    Cui, Jiamin
    Hu, Kai
    Wang, Qingju
    Wang, Meiqin
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2022, 13161 LNCS : 223 - 246