Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC

被引:0
作者
Liu, Jiamei [1 ]
Tan, Lin [1 ]
Xu, Hong [1 ]
机构
[1] PLA Strateg Support Force Informat Engn Univ, Zhengzhou, Peoples R China
关键词
authenticated encryption; block cipher; Deoxys-BC; rectangle attack; related-tweakey; BOOMERANG; CRYPTANALYSIS;
D O I
10.1049/ise2.12104
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deoxys-BC is the internal tweakable block cipher of the authenticated encryption (AE) Deoxys family, in which Deoxys-II is the primary choice for the use case of 'Defence in depth' among the portfolio of CAESAR competition. Improvements of the related-tweakey rectangle attacks on round-reduced Deoxys-BC using the known distinguishers is focussed in this study. Under the new related-key rectangle attack framework proposed by Dong et al. in EUROCRYPT 2022, we present three kinds of precomputed tables to further reduce the time complexity in the key-recovery phase. In the related-tweakey rectangle attack, the invalid quartets are filtered or the subtweakey candidates are obtained by lookup the precomputed tables without more computation. Based on the precomputed table technique, we improved the related-tweakey rectangle attacks on 11-round Deoxys-BC-256, 13-round and 14-round Deoxys-BC-384. Furthermore, we reduce the time complexity of the 13-round related-tweakey rectangle attack on Deoxys AE scheme Deoxys-I-256-128 by a factor of 2(24) compared with the best previous attack.
引用
收藏
页码:407 / 422
页数:16
相关论文
共 50 条
  • [31] Truncated differential based known-key attacks on round-reduced SIMON
    Hao, Yonglin
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (02) : 467 - 492
  • [32] Integral Attacks on Pyjamask-96 and Round-Reduced Pyjamask-128
    Cui, Jiamin
    Hu, Kai
    Wang, Qingju
    Wang, Meiqin
    TOPICS IN CRYPTOLOGY, CT-RSA 2022, 2022, 13161 : 223 - 246
  • [33] Truncated differential based known-key attacks on round-reduced SIMON
    Yonglin Hao
    Willi Meier
    Designs, Codes and Cryptography, 2017, 83 : 467 - 492
  • [34] Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
    Wang, Gaoli
    Liu, Fukang
    Cui, Binbin
    Mendel, Florian
    Dobraunig, Christoph
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (05) : 887 - 930
  • [35] Improving Attacks on Round-Reduced Speck32/64 Using Deep Learning
    Gohr, Aron
    ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT II, 2019, 11693 : 150 - 179
  • [36] Preimage Attacks on Round-Reduced KECCAK-224/256 via an Allocating Approach
    Li, Ting
    Sun, Yao
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2019, PT III, 2019, 11478 : 556 - 584
  • [37] Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192
    Zhu, Chunbo
    Wang, Gaoli
    Zhu, Boyu
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 573 - 587
  • [38] Differential-linear and related key cryptanalysis of round-reduced scream
    Dwivedi, Ashutosh Dhar
    Morawiecki, Pawel
    Singh, Rajani
    Dhar, Shalini
    INFORMATION PROCESSING LETTERS, 2018, 136 : 5 - 8
  • [39] Improved attacks against reduced-round Whirlwind
    Wei, Congming
    Dong, Bingyou
    Hua, Jialiang
    Dong, Xiaoyang
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3581 - 3602
  • [40] Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
    Zhou, Haibo
    Li, Zheng
    Dong, Xiaoyang
    Jia, Keting
    Meier, Willi
    COMPUTER JOURNAL, 2020, 63 (08) : 1231 - 1246