Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC

被引:2
|
作者
Shiba, Rentaro [1 ]
Sakamoto, Kosei [1 ]
Liu, Fukang [1 ,2 ]
Minematsu, Kazuhiko [3 ]
Isobe, Takanori [1 ,4 ]
机构
[1] Univ Hyogo, Grad Sch Appl Informat, Kobe, Hyogo, Japan
[2] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai, Peoples R China
[3] NEC Corp Ltd, Kawasaki, Kanagawa, Japan
[4] Natl Inst Informat & Commun Technol, Cybersecur Res Inst, Secur Fundamentals Lab, Tokyo, Japan
基金
日本学术振兴会;
关键词
cryptography; private key cryptography; BLOCK; DISTINGUISHERS;
D O I
10.1049/ise2.12044
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Lesamnta-LW-BC is the internal block cipher of the Lesamnta-LW lightweight hash function, specified in ISO/IEC 29192-5:2016. It is based on the unbalanced Feistel network and Advanced Encryption Standard round function. In this study, the security of Lesamnta-LW-BC against integral and impossible-differential attacks is evaluated. Specifically, the authors searched for the integral distinguishers and impossible differentials with Mixed-Integer Linear Programming-based methods. As a result, the discovered impossible differential can reach up to 21 rounds, while three integral distinguishers reaching 18, 19 and 25 rounds are obtained, respectively. Moreover, it is also feasible to construct a 47-round integral distinguisher in the known-key setting. Finally, a 20-round key-recovery attack is proposed based on the discovered 18-round integral distinguisher and a 19-round key-recovery attack using a 17-round impossible differential. To the best of the authors' knowledge, this is the first third-party cryptanalysis of Lesamnta-LW-BC.
引用
收藏
页码:75 / 85
页数:11
相关论文
共 50 条
  • [41] Integral Cryptanalysis on Reduced-round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Kaneko, Toshinobu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105 (08)
  • [42] Integral Cryptanalysis on Reduced-Round KASUMI
    Sugio, Nobuyuki
    Igarashi, Yasutaka
    Hongo, Sadayuki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2022, E105A (09) : 1309 - 1316
  • [43] Integral cryptanalysis on reduced-round PUFFIN
    Zhao, Guangyao
    Cheng, Lei
    Li, Ruilin
    Li, Chao
    Sun, Bing
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2015, 37 (06): : 129 - 134
  • [44] Improved Meet-in-the-Middle Attacks on Reduced-Round Kiasu-BC and Joltik-BC
    Liu, Ya
    Shi, Yifan
    Gu, Dawu
    Zeng, Zhiqiang
    Zhao, Fengyu
    Li, Wei
    Liu, Zhiqiang
    Bao, Yang
    COMPUTER JOURNAL, 2019, 62 (12): : 1761 - 1776
  • [45] Integral distinguishers for reduced-round Stribog
    AlTawy, Riham
    Youssef, Amr M.
    INFORMATION PROCESSING LETTERS, 2014, 114 (08) : 426 - 431
  • [46] Related-Tweakey Boomerang and Rectangle Attacks on Reduced-Round Joltik-BC
    Shi, Kangkang
    Ren, Jiongjiong
    Chen, Shaozhen
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2024, 2025, 15053 : 94 - 111
  • [47] Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256
    Liu, Ya
    Shi, Bing
    Gu, Dawu
    Zhao, Fengyu
    Li, Wei
    Liu, Zhiqiang
    COMPUTER JOURNAL, 2020, 63 (12): : 1859 - 1870
  • [48] Improved attacks against reduced-round Whirlwind
    Wei, Congming
    Dong, Bingyou
    Hua, Jialiang
    Dong, Xiaoyang
    Zhang, Guoyan
    DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (11) : 3581 - 3602
  • [49] Improved results on impossible differential cryptanalysis of reduced-round Camellia-192/256
    Liu, Ya
    Gu, Dawu
    Liu, Zhiqiang
    Li, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2451 - 2458
  • [50] Improved attacks against reduced-round Whirlwind
    Congming Wei
    Bingyou Dong
    Jialiang Hua
    Xiaoyang Dong
    Guoyan Zhang
    Designs, Codes and Cryptography, 2023, 91 : 3581 - 3602