Nonlinear Invariant Attack Practical Attack on Full SCREAM, iSCREAM, and Midori64

被引:46
作者
Todo, Yosuke [1 ,3 ]
Leander, Gregor [2 ]
Sasaki, Yu [1 ]
机构
[1] NTT Secure Platform Labs, Tokyo, Japan
[2] Ruhr Univ Bochum, Horst Gortz Inst IT Secur, Bochum, Germany
[3] Kobe Univ, Kobe, Hyogo, Japan
来源
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT II | 2016年 / 10032卷
关键词
Nonlinear invariant attack; Boolean function; Ciphertext-only message-recovery attack; SCREAM; iSCREAM; Midori64; CAE-SAR competition; LINEAR CRYPTANALYSIS;
D O I
10.1007/978-3-662-53890-6_1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper we introduce a new type of attack, called nonlinear invariant attack. As application examples, we present new attacks that are able to distinguish the full versions of the (tweakable) block ciphers Scream, iScream and Midori64 in a weak-key setting. Those attacks require only a handful of plaintext-ciphertext pairs and have minimal computational costs. Moreover, the nonlinear invariant attack on the underlying (tweakable) block cipher can be extended to a ciphertext-only attack in well-known modes of operation such as CBC or CTR. The plaintext of the authenticated encryption schemes SCREAM and iSCREAM can be practically recovered only from the ciphertexts in the nonce-respecting setting. This is the first result breaking a security claim of SCREAM. Moreover, the plaintext in Midori64 with well-known modes of operation can practically be recovered. All of our attacks are experimentally verified.
引用
收藏
页码:3 / 33
页数:31
相关论文
共 23 条
[1]  
[Anonymous], 1977, FED INF PROC STAND P
[2]  
[Anonymous], 2001, FED INF PROC STAND P, V197
[3]  
[Anonymous], 2015, 20151189 CRYPT EPRIN
[4]   Midori: A Block Cipher for Low Energy [J].
Banik, Subhadeep ;
Bogdanov, Andrey ;
Isobe, Takanori ;
Shibutani, Kyoji ;
Hiwatari, Harunaga ;
Akishita, Toru ;
Regazzoni, Francesco .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 :411-436
[5]  
BIHAM E, 1991, LECT NOTES COMPUT SC, V537, P2
[6]  
Biham E, 1999, LECT NOTES COMPUT SC, V1592, P12
[7]  
Biryukov A, 1999, LECT NOTES COMPUT SC, V1636, P245
[8]   Linear hulls with correlation zero and linear cryptanalysis of block ciphers [J].
Bogdanov, Andrey ;
Rijmen, Vincent .
DESIGNS CODES AND CRYPTOGRAPHY, 2014, 70 (03) :369-383
[9]  
Bouillaguet C, 2010, LECT NOTES COMPUT SC, V6147, P347, DOI 10.1007/978-3-642-13858-4_20
[10]  
Grosso V, 2014, CAESAR COMPETI UNPUB