Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT

被引:0
|
作者
Boxin Zhao
Xiaoyang Dong
Willi Meier
Keting Jia
Gaoli Wang
机构
[1] Shandong University,Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics
[2] Tsinghua University,Institute for Advanced Study
[3] FHNW,Department of Computer Science and Technology
[4] Institute ISE,Shanghai Key Lab of Trustworthy Computing
[5] Tsinghua University,undefined
[6] East China Normal University,undefined
来源
关键词
Key recovery; Rectangle attack; SKINNY; SKINNY AEAD; GIFT; Related-key; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2331\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{331}$$\end{document} to 2294\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{294}$$\end{document}. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} and a data complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 291.58\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{91.58}$$\end{document}, while the best previous attack on GIFT-64 only reaches 23 rounds at most.
引用
收藏
页码:1103 / 1126
页数:23
相关论文
共 50 条
  • [31] New Results of Related-key Attacks on All Py-Family of Stream Ciphers
    Ding, Lin
    Guan, Jie
    Sun, Wen-long
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2012, 18 (12) : 1741 - 1756
  • [32] Related-key linear cryptanalysis
    Vora, Poorvi L.
    Mir, Darakhshan J.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1609 - +
  • [33] MILP-based Related-Key Rectangle Attack and Its Application to GIFT, Khudra, MIBS
    Chen, Lele
    Wang, Gaoli
    Zhang, GuoYan
    COMPUTER JOURNAL, 2019, 62 (12): : 1805 - 1821
  • [34] A note on quantum related-key attacks
    Roetteler, Martin
    Steinwandt, Rainer
    INFORMATION PROCESSING LETTERS, 2015, 115 (01) : 40 - 44
  • [35] Generic Related-Key Attacks for HMAC
    Peyrin, Thomas
    Sasaki, Yu
    Wang, Lei
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2012, 2012, 7658 : 580 - 597
  • [36] Related-key rectangle attacks on reduced AES-192 and AES-256
    Kim, Jongsung
    Hong, Seokhie
    Preneel, Bart
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 225 - +
  • [37] ON THE RELATED-KEY ATTACKS AGAINST AES
    Daemen, Joan
    Rijmen, Vincent
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2012, 13 (04): : 395 - 400
  • [38] Improved (Related-key) Differential Cryptanalysis on GIFT
    Ji, Fulei
    Zhang, Wentao
    Zhou, Chunning
    Ding, Tianyou
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 198 - 228
  • [39] Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY
    Song, Ling
    Fu, Qinggan
    Yang, Qianqian
    Lv, Yin
    Hu, Lei
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [40] Related-key rectangle attack on MD-64
    Science and Technology on Information Assurance Laboratory, Beijing
    100072, China
    不详
    450001, China
    不详
    611830, China
    Dianzi Yu Xinxi Xuebao, 12 (2845-2851):