Bounding the length of impossible differentials for SPN block ciphers

被引:1
|
作者
Wang, Qian [1 ]
Jin, Chenhui [1 ]
机构
[1] Informat Sci & Technol Inst, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Impossible differential; SPN; Expansion Index; System of linear equations; Maximally linearly independent set; Rowblock rank; CRYPTANALYSIS; SECURITY;
D O I
10.1007/s10623-021-00932-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Evaluating the security of a block cipher against impossible differential cryptanalysis, is an important aspect during the design process. Themaximum length of impossible differentials is often used to evaluate this security. There have been many methods on giving upper bounds on the length of impossible differentials or finding longer impossible differentials. Two notable examples are the "Primitive Index" method proposed by Sun et al. at EUROCRYPT2016 and the MILP method proposed by Sasaki et al. at EUROCRYPT2017. However, these existing methods can only give upper bounds for some special SPN block ciphers or cannot give upper bounds due to the high time complexity. In this paper, we show that when ignoring the differential property of the underlying S-box, giving upper bounds on the length of impossible differentials is a linear problem. By using linear algebra, wepropose the Expansion Index of the linear layer, with which we can give upper bounds on the length of impossible differentials for any SPN block cipher with the detail of the S-box omitted. The core of this method is establishing and solving systems of linear equations, thus the verification of a single differential has linear time complexity. What's more, to give upper bounds with this method, we only need to establish and solve systems for differentials whose input and output differences have only one active S-box, which greatly reduces its time complexity from O(2(t)) to O(t) (here t denotes the number of S-boxes in the S-layer). The method in this paper is implemented in C and encapsulated into a tool freely available to readers. By applying our method on some SPN block ciphers, we give, for the first time, upper bounds on the length of impossible differentials for Midori, Skinny, CRYPTON, mCrypton, Minalpher.
引用
收藏
页码:2477 / 2493
页数:17
相关论文
共 50 条
  • [21] Improvements for Finding Impossible Differentials of Block Cipher Structures
    Luo, Yiyuan
    Lai, Xuejia
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [22] Efficient DFA on SPN-Based Block Ciphers and Its Application to the LED Block Cipher
    Ueno, Rei
    Homma, Naofumi
    Aoki, Takafumi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 182 - 191
  • [23] Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers
    Kai Zhang
    Jie Guan
    Bin Hu
    中国通信, 2018, 15 (02) : 54 - 66
  • [24] Automatic Search of Impossible Differentials and Zero-Correlation Linear Hulls for ARX Ciphers
    Zhang, Kai
    Guan, Jie
    Hu, Bin
    CHINA COMMUNICATIONS, 2018, 15 (02) : 54 - 66
  • [25] Best truncated and impossible differentials of Feistel block ciphers with S-D (Substitution and Diffusion) or D-S round functions
    Sugita, M
    Kobara, K
    Imai, H
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (01): : 2 - 12
  • [26] Reduction in the Number of Fault Injections for Blind Fault Attack on SPN Block Ciphers
    Li, Yang
    Chen, Mengting
    Liu, Zhe
    Wang, Jian
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [27] RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers
    Khalid, Ayesha
    Hassan, Muhammad
    Paul, Goutam
    Chattopadhyay, Anupam
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2016, 6 (04) : 299 - 323
  • [28] A unified method for finding impossible differentials of block cipher structures
    Luo, Yiyuan
    Lai, Xuejia
    Wu, Zhongming
    Gong, Guang
    INFORMATION SCIENCES, 2014, 263 : 211 - 220
  • [29] Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY
    Song, Ling
    Fu, Qinggan
    Yang, Qianqian
    Lv, Yin
    Hu, Lei
    DESIGNS CODES AND CRYPTOGRAPHY, 2025,
  • [30] Provable security of block ciphers against linear cryptanalysis: a mission impossible?
    Piret, Gilles
    Standaert, Francois-Xavier
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 50 (03) : 325 - 338