Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC

被引:0
|
作者
Liu, Jiamei [1 ]
Tan, Lin [1 ]
Xu, Hong [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Zhengzhou, Peoples R China
关键词
authenticated encryption; block cipher; Deoxys-BC; rectangle attack; related-tweakey; BOOMERANG; CRYPTANALYSIS;
D O I
10.1049/ise2.12104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deoxys-BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys-II is the primary choice for the use case of 'Defence in depth' among the portfolio of CAESAR competition. Improvements of the related-tweakey rectangle attacks on round-reduced Deoxys-BC using the known distinguishers is focussed in this study. Under the new related-key rectangle attack framework proposed by Dong et al. in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key-recovery phase. In the related-tweakey rectangle attack, the invalid quartets are filtered or the subtweakey candidates are obtained by lookup the precomputed tables without more computation. Based on the precomputed table technique, we improved the related-tweakey rectangle attacks on 11-round Deoxys-BC-256, 13-round and 14-round Deoxys-BC-384. Furthermore, we reduce the time complexity of the 13-round related-tweakey rectangle attack on Deoxys AE scheme Deoxys-I-256-128 by a factor of 2(24) compared with the best previous attack.
引用
收藏
页码:407 / 422
页数:16
相关论文
共 50 条
  • [11] Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512
    Chen, Jiazhe
    Jia, Keting
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 1 - 18
  • [12] Algebraic Attacks on Round-Reduced Keccak
    Liu, Fukang
    Isobe, Takanori
    Meier, Willi
    Yang, Zhonghao
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 91 - 110
  • [13] Improved Differential Attack on Round-Reduced LEA
    Zhang, Yuhan
    Wu, Wenling
    Zhang, Lei
    INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 67 - 84
  • [14] Improved Linear Cryptanalysis of Round-Reduced ARIA
    Abdelkhalek, Ahmed
    Tolba, Mohamed
    Youssef, Amr M.
    INFORMATION SECURITY, (ISC 2016), 2016, 9866 : 18 - 34
  • [15] Improved Conditional Differential Attacks on Round-Reduced Grain v1
    Li, Jun-Zhi
    Guan, Jie
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (09): : 4548 - 4559
  • [16] Meet-in-the-Middle Attacks on Round-Reduced Khudra
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
  • [17] Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Dhiman Saha
    Sourya Kakarla
    Srinath Mandava
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2017, 1 (3) : 282 - 296
  • [18] Automatic Search of Attacks on Round-Reduced AES and Applications
    Bouillaguet, Charles
    Derbez, Patrick
    Fouque, Pierre-Alain
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 169 - 187
  • [19] Related-Tweakey Impossible Differential Attack on Reduced-Round SKINNY-AEAD M1/M3
    Fan, Yanhong
    Li, Muzhou
    Niu, Chao
    Lu, Zhenyu
    Wang, Meiqin
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 247 - 271
  • [20] Improved Differential Cryptanalysis of Round-Reduced Speck
    Dinur, Itai
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2014, 2014, 8781 : 147 - 164