Improved meet-in-the-middle attacks on reduced-round tweakable block ciphers Kiasu-BC and Deoxys-BC

被引:0
|
作者
Ma, Zhangjun [1 ]
Li, Manman [1 ]
Chen, Shaozhen [1 ]
机构
[1] Informat Engn Univ, Kexue Ave 62, Zhengzhou 450001, Henan, Peoples R China
关键词
Tweakable block cipher; Cryptanalysis; Kiasu-BC; Deoxys-BC; Meet-in-the-middle attack; SINGLE-KEY ATTACKS;
D O I
10.1016/j.jksuci.2023.101765
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Tweakable block ciphers Kiasu-BC and Deoxys-BC are both the internal block ciphers of the candidates for the CAESAR authenticated encryption competition. The cryptanalysis of Kiasu-BC and Deoxys-BC is helpful to promote the cryptanalysis process of tweakable block ciphers. At present, under the condition of related-tweak single-key model, the results of the meet-in-the-middle attacks on Kiasu-BC and Deoxys-BC are the best attacks among all the traditional cryptanalysis methods. Hence, in this paper, we improve the results of the meet-in-the-middle attacks on Kiasu-BC and Deoxys-BC with the help of automatic search model proposed by Shi et al. We study the properties of MixCloumn operation to compute several linear equations. Combining the linear equations with the differential cancellation technique and the differential enumeration technique, as results, we construct the first 6-round meet-in-the-middle distinguisher for Kiasu-BC, the first 7-round meet-in-the-middle distinguisher for Deoxys-BC-256 and the first 8-round meet-in-the-middle distinguisher for Deoxys-BC-384. Based on the new distinguishers, we present favorable results of the 8-round meet-in-the-middle attack on Kiasu-BC, 9-round meet-in-themiddle attack on Deoxys-BC-256 and 11-round meet-in-the-middle attack on Deoxys-BC-384. The favorable results of the attacks improve the time complexities of the current meet-in-the-middle attacks on Kiasu-BC and Deoxys-BC. (c) 2023 The Author(s). Published by Elsevier B.V. on behalf of King Saud University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页数:12
相关论文
共 42 条
  • [31] Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
    Rui ZONG
    Xiaoyang DONG
    Xiaoyun WANG
    ScienceChina(InformationSciences), 2019, 62 (03) : 19 - 30
  • [32] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Patrick Derbez
    Léo Perrin
    Journal of Cryptology, 2020, 33 : 1184 - 1215
  • [33] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 190 - 216
  • [34] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 1184 - 1215
  • [35] A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
    Altawy, Riham
    Abdelkhalek, Ahmed
    Youssef, Amr M.
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (04): : 1246 - 1250
  • [36] Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC
    Shiba, Rentaro
    Sakamoto, Kosei
    Liu, Fukang
    Minematsu, Kazuhiko
    Isobe, Takanori
    IET INFORMATION SECURITY, 2022, 16 (02) : 75 - 85
  • [37] Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search
    Ma, Zhangjun
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2023, 17 (03) : 534 - 543
  • [38] Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC
    Shi, Kangkang
    Ren, Jiongjiong
    Chen, Shaozhen
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 94 - 111
  • [39] Key recovery attacks on reduced-round Joltik-BC in the single-key setting
    Li, Rongjia
    Jin, Chenhui
    Pan, Hongchen
    INFORMATION PROCESSING LETTERS, 2019, 151
  • [40] Improved Meet-in-the-middle Attacks on Reduced-roundMIBS-80 Cipher br
    Ren, Jiongjiong
    Hou, Zezhou
    Li, Manman
    Lin, Dongdong
    Chen, Shaozhen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (08) : 2914 - 2923