Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT

被引:0
|
作者
Boxin Zhao
Xiaoyang Dong
Willi Meier
Keting Jia
Gaoli Wang
机构
[1] Shandong University,Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics
[2] Tsinghua University,Institute for Advanced Study
[3] FHNW,Department of Computer Science and Technology
[4] Institute ISE,Shanghai Key Lab of Trustworthy Computing
[5] Tsinghua University,undefined
[6] East China Normal University,undefined
来源
关键词
Key recovery; Rectangle attack; SKINNY; SKINNY AEAD; GIFT; Related-key; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2331\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{331}$$\end{document} to 2294\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{294}$$\end{document}. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} and a data complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 291.58\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{91.58}$$\end{document}, while the best previous attack on GIFT-64 only reaches 23 rounds at most.
引用
收藏
页码:1103 / 1126
页数:23
相关论文
共 50 条
  • [21] Related-key attacks on the Py-family of ciphers and an approach to repair the weaknesses
    Sekar, Gautham
    Paul, Souradyuti
    Preneel, Bart
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 58 - 72
  • [22] A weak key class of XTEA for a related-key rectangle attack
    Lee, Eunjin
    Hong, Deukjo
    Chang, Donghoon
    Hong, Seokhie
    Lim, Jongin
    PROGRESS IN CRYPTOLOGY - VIETCRYPT 2006, 2006, 4341 : 286 - +
  • [23] Related-key attacks on the Py-family of ciphers and an approach to repair the weaknesses
    Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10, B-3001, Leuven-Heverlee, Belgium
    Lect. Notes Comput. Sci., (58-72):
  • [24] A related-key rectangle attack on the full KASUMI
    Biham, E
    Dunkelman, O
    Keller, N
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 443 - 461
  • [25] Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks
    Sun, Siwei
    Hu, Lei
    Song, Ling
    Xie, Yonghong
    Wang, Peng
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2013, 2014, 8567 : 39 - 51
  • [26] A RELATED-KEY ATTACK ON ITERATED CHAOTIC CIPHERS
    Yang, Yang
    Jin, Chenhui
    KYBERNETIKA, 2008, 44 (04) : 501 - 510
  • [27] Enhanced related-key differential neural distinguishers for SIMON and SIMECK block ciphers
    Wang, Gao
    Wang, Gaoli
    PEERJ, 2024, 10 : 1 - 26
  • [28] Related-Key Rectangle Cryptanalysis of Reduced-Round Block Cipher MIBS
    Qiao, Kexin
    Hu, Lei
    Sun, Siwei
    Ma, Xiaoshuang
    2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 216 - 220
  • [29] A Unified Approach to Related-Key Attacks
    Biham, Eli
    Dunkelman, Orr
    Keller, Nathan
    FAST SOFTWARE ENCRYPTION, 2008, 5086 : 73 - +
  • [30] Public-Key Encryption Resilient Against Linear Related-Key Attacks Revisited
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 268 - 275