Linear Analysis of Lightweight Cipher ACE and SPIX Based on Mixed-Integer Linear Programming

被引:0
作者
Liu, Shuai [1 ]
Ren, Xiao-Guang [1 ]
Wang, Shi-Xiong [2 ]
Guan, Jie [3 ]
Zhang, Xiao-Chuan [1 ]
Tan, Jie [1 ]
Wang, Jun [1 ]
机构
[1] Intelligent Game and Decision Laboratory, Beijing
[2] Academy of Military Science, Beijing
[3] School of Cipher Engineering, SSF Information Engineering University, Henan, Zhengzhou
来源
Tien Tzu Hsueh Pao/Acta Electronica Sinica | 2024年 / 52卷 / 09期
基金
中国国家自然科学基金;
关键词
constraint problem solving; lightweight cipher; linear analysis; mixed-integer linear programming;
D O I
10.12263/DZXB.20230673
中图分类号
学科分类号
摘要
The linear property of lightweight cipher ACE and SPIX was researched. The linear property of ring AND-gate combination was described accurately with mixed-integer linear programming. The nonlinear operation of ACE and SPIX was transformed into ring AND-gate combination. Based on this, the linear models of ACE permutation and SLISCP permutation were constructed with mixed-integer linear programming. The models returned the optimal linear characteristics of 2-step to 4-step ACE permutation and 2-step to 5-step SLISCP permutation. It was proved that 7-step and 12-step ACE permutation achieved the 128-bit security and 320-bit security respectively, and 7-step and 13-step SLISCP permutation achieved the 128-bit security and 256-bit security respectively. For the ACE permutation and SLISCP permutation with any number of steps, authenticated encryption algorithm ACE-AE-128 and SPIX can resist the linear distinguish attack of plaintext processing stage. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:3065 / 3074
页数:9
相关论文
共 27 条
  • [1] POSCHMANN A Y., Lightweight Cryptography: Cryptographic Engineering for a Pervasive World, (2009)
  • [2] YANG G Q, ZHU B, SUDER V, Et al., The simeck family of lightweight block ciphers, International Workshop on Cryptographic Hardware and Embedded Systems, pp. 307-329, (2015)
  • [3] BANIK S, PANDEY S K, PEYRIN T, Et al., GIFT: A small present, International Conference on Cryptographic Hardware and Embedded Systems, pp. 321-345, (2017)
  • [4] BOGDANOV A, KNUDSEN L R, LEANDER G, Et al., PRESENT: An ultra-lightweight block cipher, International Workshop on Cryptographic Hardware and Embedded Systems, pp. 450-466, (2007)
  • [5] SUZAKI T, MINEMATSU K, MORIOKA S, Et al., TWINE: A lightweight block cipher for multiple platforms, International Conference on Selected Areas in Cryptography, pp. 339-354, (2013)
  • [6] LUO F, OU Q Y, ZHOU X G, Et al., A biclique cryptanalysis on lightweight block cipher MIBS-80, Journal of Software, 26, 1, pp. 8-16, (2015)
  • [7] LIU S, GUAN J, HU B., Fault attacks on authenticated encryption modes for GIFT, IET Information Security, 16, 1, pp. 51-63, (2022)
  • [8] LI L, LI K L, HE W W, Et al., Magpie: A high-security lightweight block cipher, Acta Electronica Sinica, 45, 10, pp. 2521-2527, (2017)
  • [9] Lawrence B., Submission requirements and evaluation criteria for the lightweight cryptography standardization process [EB/OL], (2018)
  • [10] WU W L., Research advances on authenticated encryption algorithms, Journal of Cryptologic Research, 5, 1, pp. 68-82, (2018)