An algebraic approach to symmetric linear layers in cryptographic primitives

被引:1
|
作者
Subroto, Robert Christian [1 ]
机构
[1] Radboud Univ Nijmegen, NL-6525 EC Nijmegen, Netherlands
来源
CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES | 2023年 / 15卷 / 06期
基金
欧洲研究理事会;
关键词
Circulant matrices; Multiplicative order; Polynomial ring; Finite fields; Mersenne prime;
D O I
10.1007/s12095-023-00630-w
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Subterranean 2.0 is a permutation-based cipher suite which works with a 257 bit-state. It is designed for lightweight cryptography, and it scores very well with respect to energy consumption. Its security has been investigated by the designers against well-known attack vectors. A possible point of concern is the relatively low order of its linear layer, which equals 256. In the past, such properties have been exploited by invariant subspace attacks. We define linear mappings with a similar structure as the linear layer of Subterranean as SC-compositions. In this work, we explore finding SC-compositions with a higher order than 256. We rely on concepts from abstract algebra and number theory to understand the relation between the order and the bit-states of SC-compositions. Using a 257 bit-state as done in Subterranean is an unfortunate choice for designing such SC-compositions with a high order. We present two examples with different bit-states, each having a significantly higher order than 256.
引用
收藏
页码:1053 / 1067
页数:15
相关论文
共 50 条
  • [1] A Generalized Methodology for Designing Non Linear Elements in Symmetric Cryptographic Primitives
    Easttom, Chuck
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 444 - 449
  • [2] Optimize cryptographic symmetric primitives performance
    Institute of Software, School of Electronic Engineering and Computer Science, Peking University, Beijing 100871, China
    不详
    Beijing Daxue Xuebao Ziran Kexue Ban, 2008, 5 (733-738):
  • [3] On the round security of symmetric-key cryptographic primitives
    Ramzan, Z
    Reyzin, L
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 376 - 393
  • [4] CLAASP: A Cryptographic Library for the Automated Analysis of Symmetric Primitives
    Bellini, Emanuele
    Gerault, David
    Grados, Juan
    Huang, Yun Ju
    Makarim, Rusydi
    Rachidi, Mohamed
    Tiwari, Sharwan
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2023, 2024, 14201 : 387 - 408
  • [5] Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree
    Li, Chaoyun
    Preneel, Bart
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 171 - 193
  • [6] Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives
    Boichut, Yohan
    Heam, Pierre-Cyrille
    Kouchnarenko, Olga
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2009, 239 : 57 - 72
  • [7] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45
  • [8] Cryptographic primitives
    Garrett, P
    PUBLIC-KEY CRYPTOGRAPHY, 2005, 62 : 1 - 62
  • [9] Leakage-Resilient Authentication and Encryption from Symmetric Cryptographic Primitives
    Pereira, Olivier
    Standaert, Francois-Xavier
    Vivek, Srinivas
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 96 - 108
  • [10] A Study of Cryptographic Backdoors in Cryptographic Primitives
    Easttom, Chuck
    26TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE 2018), 2018, : 1664 - 1669