Bounding the length of impossible differentials for SPN block ciphers

被引:1
|
作者
Wang, Qian [1 ]
Jin, Chenhui [1 ]
机构
[1] Informat Sci & Technol Inst, Zhengzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Impossible differential; SPN; Expansion Index; System of linear equations; Maximally linearly independent set; Rowblock rank; CRYPTANALYSIS; SECURITY;
D O I
10.1007/s10623-021-00932-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Evaluating the security of a block cipher against impossible differential cryptanalysis, is an important aspect during the design process. Themaximum length of impossible differentials is often used to evaluate this security. There have been many methods on giving upper bounds on the length of impossible differentials or finding longer impossible differentials. Two notable examples are the "Primitive Index" method proposed by Sun et al. at EUROCRYPT2016 and the MILP method proposed by Sasaki et al. at EUROCRYPT2017. However, these existing methods can only give upper bounds for some special SPN block ciphers or cannot give upper bounds due to the high time complexity. In this paper, we show that when ignoring the differential property of the underlying S-box, giving upper bounds on the length of impossible differentials is a linear problem. By using linear algebra, wepropose the Expansion Index of the linear layer, with which we can give upper bounds on the length of impossible differentials for any SPN block cipher with the detail of the S-box omitted. The core of this method is establishing and solving systems of linear equations, thus the verification of a single differential has linear time complexity. What's more, to give upper bounds with this method, we only need to establish and solve systems for differentials whose input and output differences have only one active S-box, which greatly reduces its time complexity from O(2(t)) to O(t) (here t denotes the number of S-boxes in the S-layer). The method in this paper is implemented in C and encapsulated into a tool freely available to readers. By applying our method on some SPN block ciphers, we give, for the first time, upper bounds on the length of impossible differentials for Midori, Skinny, CRYPTON, mCrypton, Minalpher.
引用
收藏
页码:2477 / 2493
页数:17
相关论文
共 50 条
  • [41] Integral cryptanalysis of SPN ciphers with binary permutations
    Hailong Song
    Yuechuan Wei
    Science China Information Sciences, 2018, 61
  • [42] Integral cryptanalysis of SPN ciphers with binary permutations
    Hailong SONG
    Yuechuan WEI
    ScienceChina(InformationSciences), 2018, 61 (01) : 276 - 278
  • [43] Efficient constructions of variable-input-length block ciphers
    Patel, S
    Ramzan, Z
    Sundaram, GS
    SELECTED AREAS IN CRYPTOGRAPHY, 2005, 3357 : 326 - 340
  • [44] Blind Fault Attack against SPN Ciphers
    Korkikian, Roman
    Pelissier, Sylvain
    Naccache, David
    2014 WORKSHOP ON FAULT DIAGNOSIS AND TOLERANCE IN CRYPTOGRAPHY (FDTC 2014), 2014, : 94 - 103
  • [45] Integral cryptanalysis of SPN ciphers with binary permutations
    Song, Hailong
    Wei, Yuechuan
    SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (01)
  • [46] General Subspace Trail Cryptanalysis of SPN Ciphers
    Song C.
    Zhang L.
    Wu W.-L.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (12): : 5807 - 5821
  • [47] Efficient constructions of variable-input-length block ciphers
    Patel, Sarvar
    Ramzan, Zulfikar
    Sundaram, Ganapathy S.
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3357 : 326 - 340
  • [48] Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY
    Zhang, Wenying
    Cao, Meichun
    Guo, Jian
    Pasalic, Enes
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 171 - 191
  • [49] Higher-Order Mixture Differentials for AES-Based Block Ciphers and Applications to TweAES
    List, Eik
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2024, 2024, 14977 : 45 - 64
  • [50] A new mode of operation for block ciphers and length-preserving MACs
    Dodis, Yevgeniy
    Pietrzak, Krzysztof
    Puniya, Prashant
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 198 - +