Automatic Demirci-Selcuk Meet-In-The-Middle Attack On SIMON

被引:1
|
作者
Lv, Yin [1 ,2 ]
Shi, Danping [1 ,2 ]
Guo, Yi [1 ,2 ]
Chen, Qiu [1 ,2 ]
Hu, Lei [1 ,2 ]
Guo, Zihui [2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[3] Chinese Acad Sci, Inst Informat Engn, Beijing 100093, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 66卷 / 12期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Demirci-Selcuk meet-in-the-middle attack; SIMON; constraint programming; key-bridging technique;
D O I
10.1093/comjnl/bxac149
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Demirci-Selcuk meet-in-the-middle (DS-MITM) attack is an effective method for cryptanalysis. As far as we know, the published automatic results of DS-MITM attack are all for byte-oriented ciphers. In this article, we first propose the automatic analysis method of DS-MITM attack for bit-oriented ciphers based on constraint programming, which is integrated with key-bridging technique. Based on the automatic modeling method, we propose the first result of DS-MITM attack on SIMON, which is a family of lightweight block ciphers proposed by the National Security Agency (NSA) in 2013.
引用
收藏
页码:3052 / 3068
页数:17
相关论文
共 50 条
  • [1] Automatic Demirci-Selcuk Meet-in-the-Middle Attack on SKINNY with Key-Bridging
    Chen, Qiu
    Shi, Danping
    Sun, Siwei
    Hu, Lei
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 233 - 247
  • [2] Provable Security Evaluation of Block Ciphers Against Demirci-Selcuk's Meet-in-the-Middle Attack
    Sun, Bing
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (07) : 4838 - 4844
  • [3] Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selcuk Meet-in-the-Middle Cryptanalysis of SKINNY
    Shi, Danping
    Sun, Siwei
    Song, Ling
    Hu, Lei
    Yang, Qianqian
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2023, PT IV, 2023, 14007 : 67 - 97
  • [4] Algebraic Meet-in-the-Middle Attack on LowMC
    Liu, Fukang
    Sarkar, Santanu
    Wang, Gaoli
    Meier, Willi
    Isobe, Takanori
    ADVANCES IN CRYPTOLOGY- ASIACRYPT 2022, PT I, 2022, 13791 : 225 - 255
  • [5] Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
    Zhang, Kai
    Lai, Xuejia
    Wang, Lei
    Guan, Jie
    Hu, Bin
    Wang, Senpeng
    Shi, Tairong
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (9) : 2845 - 2878
  • [6] The parallel-cut meet-in-the-middle attack
    Ivica Nikolić
    Lei Wang
    Shuang Wu
    Cryptography and Communications, 2015, 7 : 331 - 345
  • [7] Automated Meet-in-the-Middle Attack Goes to Feistel
    Hou, Qingliang
    Dong, Xiaoyang
    Qin, Lingyue
    Zhang, Guoyan
    Wang, Xiaoyun
    ADVANCES IN CRYPTOLOGY, ASIACRYPT 2023, PT III, 2023, 14440 : 370 - 404
  • [8] MEET-IN-THE-MIDDLE ATTACK ON DIGITAL SIGNATURE SCHEMES
    OHTA, K
    KOYAMA, K
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 140 - 154
  • [9] Meet-in-the-middle attack on TWINE block cipher
    Wang, Yan-Feng
    Wu, Wen-Ling
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (10): : 2684 - 2695
  • [10] Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
    Kai Zhang
    Xuejia Lai
    Lei Wang
    Jie Guan
    Bin Hu
    Senpeng Wang
    Tairong Shi
    Designs, Codes and Cryptography, 2023, 91 : 2845 - 2878