Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC

被引:0
|
作者
Ma, Zhangjun [1 ]
Li, Manman [1 ]
Chen, Shaozhen [1 ]
机构
[1] Informat Engn Univ, Kexue Ave 62, Zhengzhou 450001, Henan, Peoples R China
关键词
Tweakable block cipher; Cryptanalysis; Kiasu-BC; Deoxys-BC; Meet-in-the-middle attack; SINGLE-KEY ATTACKS;
D O I
10.1016/j.jksuci.2023.101765
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition. The cryptanalysis of Kiasu-BC and Deoxys-BC is helpful to promote the cryptanalysis process of tweakable block ciphers. At present, under the condition of related-tweak single-key model, the results of the meet-in-the-middle attacks on Kiasu-BC and Deoxys-BC are the best attacks among all the traditional cryptanalysis methods. Hence, in this paper, we improve the results of the meet-in-the-middle attacks on Kiasu-BC and Deoxys-BC with the help of automatic search model proposed by Shi et al. We study the properties of MixCloumn operation to compute several linear equations. Combining the linear equations with the differential cancellation technique and the differential enumeration technique, as results, we construct the first 6-round meet-in-the-middle distinguisher for Kiasu-BC, the first 7-round meet-in-the-middle distinguisher for Deoxys-BC-256 and the first 8-round meet-in-the-middle distinguisher for Deoxys-BC-384. Based on the new distinguishers, we present favorable results of the 8-round meet-in-the-middle attack on Kiasu-BC, 9-round meet-in-themiddle attack on Deoxys-BC-256 and 11-round meet-in-the-middle attack on Deoxys-BC-384. The favorable results of the attacks improve the time complexities of the current meet-in-the-middle attacks on Kiasu-BC and Deoxys-BC. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:12
相关论文
共 42 条
  • [21] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Wang, Ping
    Chen, Xiaomei
    Jiang, Guohao
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (01)
  • [22] Improved Meet-in-the-Middle Attacks on Round-Reduced ARIA
    Bai, Dongxia
    Yu, Hongbo
    INFORMATION SECURITY (ISC 2013), 2015, 7807 : 155 - 168
  • [23] Meet-in-the-Middle Attacks on Reduced Round Piccolo
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, LIGHTSEC 2015, 2016, 9542 : 3 - 20
  • [24] Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
    Li Lin
    Wenling Wu
    Designs, Codes and Cryptography, 2018, 86 : 721 - 741
  • [25] Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
    Lin, Li
    Wu, Wenling
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (04) : 721 - 741
  • [26] Exhausting Demirci- Sel, cuk Meet-in-the-Middle Attacks Against Reduced-Round AES
    Derbez, Patrick
    Fouque, Pierre-Alain
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 541 - 560
  • [27] Meet-in-the-Middle Attacks on Round-Reduced Khudra
    Tolba, Mohamed
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 127 - 138
  • [28] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
    Liu, Ya
    Yang, Anren
    Dai, Bo
    Li, Wei
    Liu, Zhiqiang
    Gu, Dawu
    Zeng, Zhiqiang
    COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
  • [29] Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
    Rui Zong
    Xiaoyang Dong
    Xiaoyun Wang
    Science China Information Sciences, 2019, 62
  • [30] Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
    Zong, Rui
    Dong, Xiaoyang
    Wang, Xiaoyun
    SCIENCE CHINA-INFORMATION SCIENCES, 2019, 62 (03)