SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE

被引:0
|
作者
Utsumi, Shion [1 ]
Sakamoto, Kosei [1 ,2 ]
Isobe, Takanori [1 ]
机构
[1] Univ Hyogo, Kobe 6500047, Japan
[2] Mitsubishi Electr Corp, Kamakura, Kanagawa 2478051, Japan
关键词
key Piccolo; TWINE; related-key impossible differential attack; SAT; DIFFERENTIAL CRYPTANALYSIS; ATTACKS;
D O I
10.1587/transfun.2023EAP1149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lightweight block ciphers have gained attention in recent years due to the increasing demand for sensor nodes, RFID tags, and various applications. In such a situation, lightweight block ciphers Piccolo and TWINE have been proposed. Both Piccolo and TWINE are designed based on the Generalized Feistel Structure. However, it is crucial to address the potential vulnerability of these structures to the impossible differential attack. Therefore, detailed security evaluations against this attack are essential. This paper focuses on conducting bit-level evaluations of Piccolo and TWINE against related-key impossible differential attacks by leveraging SAT-aided approaches. We search for the longest distinguishers under the condition that the Hamming weight of the active bits of the input, which includes plaintext and master key differences, and output differences is set to 1, respectively. Additionally, for Tweakable TWINE, we search for the longest distinguishers under the related-tweak and related-tweak-key settings. The result for Piccolo with a 128-bit key, we identify the longest 16-round distinguishers for the first time. In addition, we also demonstrate the ability to extend these distinguishers to 17 rounds by taking into account the cancellation of the round key and plaintext difference. Regarding evaluations of TWINE with a 128-bit key, we search for the first time and reveal the distinguishers up to 19 rounds. For the search for Tweakable TWINE, we evaluate under the related-tweak-key setting for the first time and reveal the distinguishers up to 18 rounds for 80-bit key and 19 rounds for 128-bit key.
引用
收藏
页码:1186 / 1195
页数:10
相关论文
共 50 条
  • [21] Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials
    Kondo, Kota
    Sasaki, Yu
    Todo, Yosuke
    Iwata, Tetsu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 141 - 158
  • [22] SAT-Based Analysis of Sensitizable Paths
    Sauer, Matthias
    Czutro, Alexander
    Schubert, Tobias
    Hillebrecht, Stefan
    Becker, Bernd
    Polian, Ilia
    IEEE DESIGN & TEST, 2013, 30 (04) : 81 - 88
  • [23] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Wen, Long
    Wang, Mei-Qin
    Zhao, Jing-Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 165 - 176
  • [24] Related-Key Impossible Diferential Attack on Reduced-Round LBlock
    温隆
    王美琴
    赵静远
    Journal of Computer Science & Technology, 2014, 29 (01) : 165 - 176
  • [25] New Related-Key Impossible Differential Attack on MIBS-80
    Cheng, Lu
    Xu, Peng
    Wei, Yuechuan
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 203 - U708
  • [26] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Long Wen
    Mei-Qin Wang
    Jing-Yuan Zhao
    Journal of Computer Science and Technology, 2014, 29 : 165 - 176
  • [27] Related-key Impossible Differential Cryptanalysis on Lightweight Block Cipher ESF
    Xie Min
    Zeng Qiya
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (05) : 1173 - 1179
  • [28] Related-key Impossible Differential Cryptanalysis of Full-round HIGHT
    Rostami, Saeed
    Chafjiri, Sadegh Bamohabbat
    Tabatabaei, Seyed Amir Hossein
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY (SECRYPT 2013), 2013, : 537 - 542
  • [29] Related-Key Differential Analysis of the AES
    Boura, Christina
    Derbez, Patrick
    Funk, Margot
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2023, 2023 (04) : 215 - 243
  • [30] The Related-Key Analysis of Feistel Constructions
    Barbosa, Manuel
    Farshim, Pooya
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 265 - 284