Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT

被引:0
|
作者
Boxin Zhao
Xiaoyang Dong
Willi Meier
Keting Jia
Gaoli Wang
机构
[1] Shandong University,Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics
[2] Tsinghua University,Institute for Advanced Study
[3] FHNW,Department of Computer Science and Technology
[4] Institute ISE,Shanghai Key Lab of Trustworthy Computing
[5] Tsinghua University,undefined
[6] East China Normal University,undefined
来源
关键词
Key recovery; Rectangle attack; SKINNY; SKINNY AEAD; GIFT; Related-key; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2331\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{331}$$\end{document} to 2294\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{294}$$\end{document}. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} and a data complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 291.58\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{91.58}$$\end{document}, while the best previous attack on GIFT-64 only reaches 23 rounds at most.
引用
收藏
页码:1103 / 1126
页数:23
相关论文
共 50 条
  • [41] Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT
    Cao, Meichun
    Zhang, Wenying
    IEEE ACCESS, 2019, 7 : 175769 - 175778
  • [42] Short Non-Malleable Codes from Related-Key Secure Block Ciphers
    Fehr, Serge
    Karpman, Pierre
    Mennink, Bart
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (01) : 336 - 352
  • [43] Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect
    Liu, Yunwen
    Sasaki, Yu
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 555 - 572
  • [44] New related-key rectangle attacks on reduced AES-192 and AES-256
    YongZhuang Wei
    YuPu Hu
    Science in China Series F: Information Sciences, 2009, 52 : 617 - 626
  • [45] New related-key rectangle attacks on reduced AES-192 and AES-256
    WEI YongZhuang HU YuPu Key Laboratory of Computer Networks Information Security of Ministry of EducationXidian UniversityXian China
    Science in China(Series F:Information Sciences), 2009, 52 (04) : 617 - 626
  • [46] Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192
    Hong, S
    Kim, J
    Lee, S
    Preneel, B
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 368 - 383
  • [47] Combinatorial Properties of Block Symmetric Ciphers Key Schedule
    Kuznetsov, Olexandr
    Gorbenko, Yuriy
    Kolovanova, Ievgeniia
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 55 - 58
  • [48] New related-key rectangle attacks on reduced AES-192 and AES-256
    Wei YongZhuang
    Hu YuPu
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 52 (04): : 617 - 626
  • [49] New related-key rectangle attacks on reduced AES-192 and AES-256
    WEI YongZhuang & HU YuPu Key Laboratory of Computer Networks & Information Security of Ministry of Education
    Science China(Information Sciences), 2009, (04) : 617 - 626
  • [50] On the Usage of Deterministic (Related-Key) Truncated Differentials and Multidimensional Linear Approximations for SPN Ciphers
    Sun, Ling
    Gerault, David
    Wang, Wei
    Wang, Meiqin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 262 - 287