Improving the MILP-based Security Evaluation Algorithm against Differential/Linear Cryptanalysis Using A Divide-and-Conquer Approach

被引:37
作者
Zhou, Chunning [1 ,2 ]
Zhang, Wentao [1 ,2 ]
Ding, Tianyou [1 ,2 ]
Xiang, Zejun [3 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[3] Hubei Univ, Fac Math & Stat, Hubei Key Lab Appl Math, Wuhan, Peoples R China
基金
中国国家自然科学基金;
关键词
Block cipher; Differential cryptanalysis; Linear cryptanalysis; MILP; Divide-and-conquer; LBLOCK;
D O I
10.13154/tosc.v2019.i4.438-469
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In recent years, Mixed Integer Linear Programming (MILP) has been widely used in cryptanalysis of symmetric-key primitives. For differential and linear cryptanalysis, MILP can be used to solve two kinds of problems: calculation of the minimum number of differentially/linearly active S-boxes, and search for the best differential/linear characteristics. There are already numerous papers published in this area. However, the efficiency is not satisfactory enough for many symmetric-key primitives. In this paper, we greatly improve the efficiency of the MILP-based search algorithm for both problems. Each of the two problems for an r-round cipher can be converted to an MILP model whose feasible region is the set of all possible r-round differential/linear characteristics. Generally, high-probability differential/linear characteristics are likely to have a low number of active S-boxes at a certain round. Inspired by the idea of a divide-and-conquer approach, we divide the set of all possible differential/linear characteristics into several smaller subsets, then separately search them. That is to say, the search of the whole set is split into easier searches of smaller subsets, and optimal solutions within the smaller subsets are combined to give the optimal solution within the whole set. In addition, we use several techniques to further improve the efficiency of the search algorithm. As applications, we apply our search algorithm to five lightweight block ciphers: PRESENT, GIFT-64, RECTANGLE, LBLOCK and TWINE. For each cipher, we obtain better results than the best-known ones obtained from the MILP method. For the minimum number of differentially/linearly active S-boxes, we reach 31/31, 16/15, 16/16, 20/20 and 20/20 rounds for the five ciphers respectively. For the best differential/linear characteristics, we reach 18/18, 15/13, 15/14, 16/15 and 15/16 rounds for the five ciphers respectively.
引用
收藏
页码:438 / 469
页数:32
相关论文
共 29 条
[1]  
Abdelkhalek A, 2017, IACR T SYMMETRIC CRY, V2017, P99, DOI 10.13154/tosc.v2017.i4.99-129
[2]  
[Anonymous], 2013, IACR CRYPTOLOGY EPRI
[3]   GIFT: A Small Present Towards Reaching the Limit of Lightweight Encryption [J].
Banik, Subhadeep ;
Pandey, Sumit Kumar ;
Peyrin, Thomas ;
Sasaki, Yu ;
Sim, Siang Meng ;
Todo, Yosuke .
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017, 2017, 10529 :321-345
[4]  
Baoyu Zhu, 2019, Topics in Cryptology - CT-RSA 2019. The Cryptographers Track at the RSA Conference 2019. Proceedings: Lecture Notes in Computer Science (LNCS 11405), P372, DOI 10.1007/978-3-030-12612-4_19
[5]   The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS [J].
Beierle, Christof ;
Jean, Jeremy ;
Koelbl, Stefan ;
Leander, Gregor ;
Moradi, Amir ;
Peyrin, Thomas ;
Sasaki, Yu ;
Sasdrich, Pascal ;
Sim, Siang Meng .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 :123-153
[6]  
Biham E, 1998, LECT NOTES COMPUT SC, V1372, P222
[7]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[8]  
Biham E., 1993, Advances in Cryptology - EUROCRYPT'93, V765, P398
[9]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[10]  
Daemen J., 2000, Nessie Proposal: NOEKEON