A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics

被引:0
作者
Soleimany, Hadi [1 ]
Moazami, Farokhlagha [1 ]
机构
[1] Shahid Beheshti Univ, Cyberspace Res Inst, Tehran, Iran
关键词
Block cipher; Cryptanalysis; Related-key model; Single-key model; BLOCK CIPHER; CRYPTANALYSIS;
D O I
10.1007/s11416-021-00401-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The deterministic related-key characteristic in DES can be used to accelerate the exhaustive search in the single-key setting even if an adversary cannot obtain the ciphertexts for arbitrary plaintexts in the related-keymodel. Inspired by this observation, it has become a common belief that if there exist 2(m) deterministic differential characteristics for a block cipher with the key size of k, they can be employed to decrease the security to k - m bits. The adversary should be able to efficiently partition the key space according to eliminated related keys in order to accelerate the exhaustive search. However, the conventional technique utilized to exploit one deterministic related-key differential characteristic is not extendable. Several deterministic related-key differential properties, regardless of the differences' values cannot be exploited by applying this technique. In this paper, we describe a precise framework for utilizing several deterministic related-key differential distinguishers, which provides a general methodology to reduce the security of cryptographic primitives. It takes the advantage of deterministic related-key properties. We demonstrate our proposed framework can be used to evaluate the security of block ciphers by presenting straightforward applications of our framework on different variants of block ciphers. In particular, we present a new attack on the well-known FX and Even-Mansour constructions. The latter is quite simpler than the former.
引用
收藏
页码:141 / 146
页数:6
相关论文
共 26 条
[1]  
Albrecht MR, 2014, LECT NOTES COMPUT SC, V8616, P57, DOI 10.1007/978-3-662-44371-2_4
[2]  
Avanzi R, 2017, IACR T SYMMETRIC CRY, V2017, P4, DOI 10.13154/tosc.v2017.i1.4-44
[3]   Midori: A Block Cipher for Low Energy [J].
Banik, Subhadeep ;
Bogdanov, Andrey ;
Isobe, Takanori ;
Shibutani, Kyoji ;
Hiwatari, Harunaga ;
Akishita, Toru ;
Regazzoni, Francesco .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II, 2015, 9453 :411-436
[4]   CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection Against DFA Attacks [J].
Beierle, Christof ;
Leander, Gregor ;
Moradi, Amir ;
Rasoolzadeh, Shahram .
IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (01) :5-45
[5]  
Bernstein Daniel J., 2004, Cache-timing attacks on AES
[6]  
BIHAM E, 1992, LECT NOTES COMPUT SC, V576, P156
[7]  
BIHAM E, 1994, J CRYPTOL, V7, P229, DOI 10.1007/BF00203965
[8]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1807, P589
[9]  
Biryukov A, 2009, LECT NOTES COMPUT SC, V5912, P1, DOI 10.1007/978-3-642-10366-7_1
[10]  
Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14