SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE

被引:0
|
作者
Utsumi, Shion [1 ]
Sakamoto, Kosei [1 ,2 ]
Isobe, Takanori [1 ]
机构
[1] Univ Hyogo, Kobe 6500047, Japan
[2] Mitsubishi Electr Corp, Kamakura, Kanagawa 2478051, Japan
关键词
key Piccolo; TWINE; related-key impossible differential attack; SAT; DIFFERENTIAL CRYPTANALYSIS; ATTACKS;
D O I
10.1587/transfun.2023EAP1149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Lightweight block ciphers have gained attention in recent years due to the increasing demand for sensor nodes, RFID tags, and various applications. In such a situation, lightweight block ciphers Piccolo and TWINE have been proposed. Both Piccolo and TWINE are designed based on the Generalized Feistel Structure. However, it is crucial to address the potential vulnerability of these structures to the impossible differential attack. Therefore, detailed security evaluations against this attack are essential. This paper focuses on conducting bit-level evaluations of Piccolo and TWINE against related-key impossible differential attacks by leveraging SAT-aided approaches. We search for the longest distinguishers under the condition that the Hamming weight of the active bits of the input, which includes plaintext and master key differences, and output differences is set to 1, respectively. Additionally, for Tweakable TWINE, we search for the longest distinguishers under the related-tweak and related-tweak-key settings. The result for Piccolo with a 128-bit key, we identify the longest 16-round distinguishers for the first time. In addition, we also demonstrate the ability to extend these distinguishers to 17 rounds by taking into account the cancellation of the round key and plaintext difference. Regarding evaluations of TWINE with a 128-bit key, we search for the first time and reveal the distinguishers up to 19 rounds. For the search for Tweakable TWINE, we evaluate under the related-tweak-key setting for the first time and reveal the distinguishers up to 18 rounds for 80-bit key and 19 rounds for 128-bit key.
引用
收藏
页码:1186 / 1195
页数:10
相关论文
共 50 条
  • [31] Neural Fault Analysis for SAT-based ATPG
    Huang, Junhua
    Zhen, Hui-Ling
    Wang, Naixing
    Mao, Hui
    Yuan, Mingxuan
    Huang, Yu
    2022 IEEE INTERNATIONAL TEST CONFERENCE (ITC), 2022, : 36 - 45
  • [32] Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 17 - 33
  • [33] Improved SAT-based bounded reachability analysis
    Ganai, MK
    Aziz, A
    ASP-DAC/VLSI DESIGN 2002: 7TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE AND 15TH INTERNATIONAL CONFERENCE ON VLSI DESIGN, PROCEEDINGS, 2002, : 729 - 734
  • [34] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Lu, Jiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (02) : 123 - 143
  • [35] The (related-key) impossible boomerang attack and its application to the AES block cipher
    Jiqiang Lu
    Designs, Codes and Cryptography, 2011, 60 : 123 - 143
  • [36] SAT-Based Automated Completion for Reachability Analysis
    Boichut, Yohan
    Hugot, Vincent
    Boiret, Adrien
    IMPLEMENTATION AND APPLICATION OF AUTOMATA, CIAA 2024, 2024, 15015 : 79 - 93
  • [37] Related-key impossible differential attacks on reduced-round AES-256
    State Key Laboratory of Information Security, Graduate University, Chinese Acad. of Sci., Beijing 100049, China
    不详
    Ruan Jian Xue Bao, 2007, 11 (2893-2901):
  • [38] Related-key impossible differential attacks on 8-round AES-192
    Biham, E
    Dunkelman, O
    Keller, N
    TOPICS IN CRYPTOLOGY - CT-RSA 2006, PROCEEDINGS, 2006, 3860 : 21 - 33
  • [39] A SAT-Based Analysis of a Calculus for Wireless Sensor Networks
    Wu, Xi
    Nielson, Hanne Riis
    Zhu, Huibiao
    PROCEEDINGS 2015 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, 2015, : 23 - 30
  • [40] Improvements in SAT-based reachability analysis for timed automata
    Zbrzezny, A
    FUNDAMENTA INFORMATICAE, 2004, 60 (1-4) : 417 - 434