Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff

被引:2
|
作者
Zhou, Haibo [1 ,2 ]
Zong, Rui [3 ]
Dong, Xiaoyang [3 ]
Jia, Keting [4 ]
Meier, Willi [5 ]
机构
[1] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Qingdao 266237, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
[3] Tsinghua Univ, Inst Adv Study, Beijing 100084, Peoples R China
[4] Tsinghua Univ, Dept Comp Sci & Technol BNRist, Beijing 100084, Peoples R China
[5] FHNW, Windisch, Switzerland
来源
COMPUTER JOURNAL | 2021年 / 64卷 / 04期
关键词
interpolation attack; Moebius Transform; Elephant; Kravatte; Xoofff;
D O I
10.1093/comjnl/bxaa101
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We introduce an interpolation attack using the Moebius Transform. This can reduce the time complexity to get a linear system of equations for specified intermediate state bits, which is general to cryptanalysis of some ciphers with update function of low algebraic degree. Along this line, we perform an interpolation attack against Elephant-Delirium, a round 2 submission of the ongoing national institute of standards and technology (NIST) lightweight cryptography project. This is the first third-party cryptanalysis on this cipher. Moreover, we promote the interpolation attack by applying it to the Farfalle pseudo-random constructions Kravatte and Xoofff. Our attacks turn out to be the most efficient method for these ciphers thus far.
引用
收藏
页码:628 / 638
页数:11
相关论文
共 50 条
  • [41] New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
    YE Chendong
    TIAN Tian
    ChineseJournalofElectronics, 2019, 28 (04) : 698 - 705
  • [42] Non-full Sbox Linearization: Applications to Collision Attacks on Round-Reduced KECCAK
    Song, Ling
    Liao, Guohong
    Guo, Jian
    ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PART II, 2017, 10402 : 428 - 451
  • [43] Preimage and pseudo collision attacks on round-reduced DHA-256 hash function
    Zou, Jian
    Wu, Wen-Ling
    Wu, Shuang
    Dong, Le
    Tongxin Xuebao/Journal on Communications, 2013, 34 (06): : 8 - 15
  • [44] Collision Attacks on Round-Reduced SHA-3 Using Conditional Internal Differentials
    Zhang, Zhongyi
    Hou, Chengan
    Liu, Meicheng
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 220 - 251
  • [45] Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
    Gohr, Aron
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 150 - 179
  • [46] Preimage Attacks on Round-Reduced KECCAK-224/256 via an Allocating Approach
    Li, Ting
    Sun, Yao
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 556 - 584
  • [47] Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC
    Liu, Jiamei
    Tan, Lin
    Xu, Hong
    IET INFORMATION SECURITY, 2023, 17 (03) : 407 - 422
  • [48] New Insights into Divide-and-Conquer Attacks on the Round-Reduced Keccak-MAC
    Ye Chendong
    Tian Tian
    CHINESE JOURNAL OF ELECTRONICS, 2019, 28 (04) : 698 - 705
  • [49] Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192
    Zhu, Chunbo
    Wang, Gaoli
    Zhu, Boyu
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 573 - 587
  • [50] Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
    Chen, Jiazhe
    Jia, Keting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 1 - 18