SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE

被引:0
|
作者
Utsumi, Shion [1 ]
Sakamoto, Kosei [1 ,2 ]
Isobe, Takanori [1 ]
机构
[1] Univ Hyogo, Kobe 6500047, Japan
[2] Mitsubishi Electr Corp, Kamakura, Kanagawa 2478051, Japan
关键词
key Piccolo; TWINE; related-key impossible differential attack; SAT; DIFFERENTIAL CRYPTANALYSIS; ATTACKS;
D O I
10.1587/transfun.2023EAP1149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lightweight block ciphers have gained attention in recent years due to the increasing demand for sensor nodes, RFID tags, and various applications. In such a situation, lightweight block ciphers Piccolo and TWINE have been proposed. Both Piccolo and TWINE are designed based on the Generalized Feistel Structure. However, it is crucial to address the potential vulnerability of these structures to the impossible differential attack. Therefore, detailed security evaluations against this attack are essential. This paper focuses on conducting bit-level evaluations of Piccolo and TWINE against related-key impossible differential attacks by leveraging SAT-aided approaches. We search for the longest distinguishers under the condition that the Hamming weight of the active bits of the input, which includes plaintext and master key differences, and output differences is set to 1, respectively. Additionally, for Tweakable TWINE, we search for the longest distinguishers under the related-tweak and related-tweak-key settings. The result for Piccolo with a 128-bit key, we identify the longest 16-round distinguishers for the first time. In addition, we also demonstrate the ability to extend these distinguishers to 17 rounds by taking into account the cancellation of the round key and plaintext difference. Regarding evaluations of TWINE with a 128-bit key, we search for the first time and reveal the distinguishers up to 19 rounds. For the search for Tweakable TWINE, we evaluate under the related-tweak-key setting for the first time and reveal the distinguishers up to 18 rounds for 80-bit key and 19 rounds for 128-bit key.
引用
收藏
页码:1186 / 1195
页数:10
相关论文
共 50 条
  • [1] Related-key impossible boomerang cryptanalysis on TWINE
    Xie M.
    Tian F.
    Li J.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (09): : 184 - 192
  • [2] Related-key Impossible Differential Attack on Piccolo
    Xu L.-H.
    Guo J.-S.
    Cui J.-Y.
    Li M.-M.
    Ruan Jian Xue Bao/Journal of Software, 2019, 30 (08): : 2349 - 2361
  • [3] Related-key impossible differential cryptanalysis on lightweight cipher TWINE
    Wei, Yuechuan
    Xu, Peng
    Rong, Yisheng
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2019, 10 (02) : 509 - 517
  • [4] Related-key impossible differential cryptanalysis on lightweight cipher TWINE
    Yuechuan Wei
    Peng Xu
    Yisheng Rong
    Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 509 - 517
  • [5] Related-Key Impossible Differential Analysis of Full Khudra
    Yang, Qianqian
    Hu, Lei
    Sun, Siwei
    Song, Ling
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2016, 2016, 9836 : 135 - 146
  • [6] Security of Related-Key Differential Attacks on TWINE, Revisited
    Sakamoto, Kosei
    Minematsu, Kazuhiko
    Shibata, Nao
    Shigeri, Maki
    Kubo, Hiroyasu
    Funabiki, Yuki
    Isobe, Takanori
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (01) : 212 - 214
  • [7] Related-key impossible differential attacks on LBlock
    Chongqing University of Posts and Telecommunications, Chongqing
    400065, China
    不详
    Henan
    450004, China
    不详
    Sichuan
    611830, China
    不详
    100000, China
    Tien Tzu Hsueh Pao, 10 (1948-1953):
  • [8] Related-Key Impossible Differential Cryptanalysis of LBlock
    XIE Min
    LI Jingjing
    ZANG Yuechuan
    Chinese Journal of Electronics, 2017, 26 (01) : 35 - 41
  • [9] Related-Key Impossible Differential Cryptanalysis of LBlock
    Xie Min
    Li Jingjing
    Zang Yuechuan
    CHINESE JOURNAL OF ELECTRONICS, 2017, 26 (01) : 35 - 41
  • [10] Related-key impossible boomerang cryptanalysis on LBlock
    Xie M.
    Mu Y.-L.
    Tongxin Xuebao/Journal on Communications, 2017, 38 (05): : 66 - 71