On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis

被引:16
作者
Saha, Dhiman [1 ]
Sasaki, Yu [2 ]
Shi, Dapping [3 ,4 ]
Sibleyras, Ferdinand [5 ]
Sun, Siwei [3 ,4 ]
Zhang, Yingjie [3 ,4 ]
机构
[1] IIT Bhilai, Dept Elect Engn & Comp Sci, Deciphered Lab, Chhattisgarh, India
[2] NTT Secure Platform Labs, Tokyo, Japan
[3] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[4] Univ Chinese Acad Sci, Beijing, Peoples R China
[5] INRIA, Paris, France
基金
中国国家自然科学基金;
关键词
TinyJAMBU; NIST lightweight cryptography; AEAD; differential; linear; MILP; model; CONDITIONAL CUBE ATTACK;
D O I
10.13154/tosc.v2020.i3.152-174
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper presents the first third-party security analysis of TinyJAMBU, which is one of 32 second-round candidates in NIST's lightweight cryptography standardization process. TinyJAMBU adopts an NLFSR based keyed-permutation that computes only a single NAND gate as a non-linear component per round. The designers evaluated the minimum number of active AND gates, however such a counting method neglects the dependency between multiple AND gates. There also exist previous works considering such dependencies with stricter models, however those are known to be too slow. In this paper, we present a new model that provides a good balance of efficiency and accuracy by only taking into account the first-order correlation of AND gates that frequently occurs in TinyJAMBU. With the refined model, we show a 338-round differential with probability 2(-62.68) that leads to a forgery attack breaking 64-bit security. This implies that the security margin of TinyJAMBU with respect to the number of unattacked rounds is approximately 12%. We also show a differential on full 384 rounds with probability 2(-70.64), thus the security margin of full rounds with respect to the data complexity, namely the gap between the claimed security bits and the attack complexity, is less than 8 bits. Our attacks also point out structural weaknesses of the mode that essentially come from the minimal state size to be lightweight.
引用
收藏
页码:152 / 174
页数:23
相关论文
共 20 条
[1]  
Advanced Encryption Standard (AES). National Institute of Standards and Technology (NIST), 2001, FIPS PUB, V197
[2]  
Ankele R., 2018, P SEL AR CRYPT SAC A, V11349, P163, DOI 10.1007/978-3-030-10970-7_8
[3]  
Ashur T, 2018, LECT NOTES COMPUT SC, V11273, P35, DOI 10.1007/978-3-030-03329-3_2
[4]  
Bertoni G., 2012, P SAC, P320, DOI DOI 10.1007/978-3-642-28496-019
[5]  
Black J, 2009, LECT NOTES COMPUT SC, V5665, P345, DOI 10.1007/978-3-642-03317-9_21
[6]  
Daon J, 2015, 2015 21ST INTERNATIONAL WORKSHOP ON THERMAL INVESTIGATIONS OF ICS AND SYSTEMS (THERMINIC)
[7]   Observations on the SIMON Block Cipher Family [J].
Kolbl, Stefan ;
Leander, Gregor ;
Tiessen, Tyge .
ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 :161-185
[8]   New Conditional Cube Attack on Keccak Keyed Modes [J].
Li, Zheng ;
Dong, Xiaoyang ;
Bi, Wenquan ;
Jia, Keting ;
Wang, Xiaoyun ;
Meier, Willi .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (02) :94-124
[9]  
Li Z, 2017, IACR T SYMMETRIC CRY, V2017, P175, DOI 10.13154/tosc.v2017.i1.175-202
[10]  
Mouha Nicky, 2012, Information Security and Cryptology. 7th International Conference, Inscrypt 2011. Revised Selected Papers, P57, DOI 10.1007/978-3-642-34704-7_5