Searching all truncated impossible differentials in SPN

被引:9
作者
Cui, Ting [1 ]
Jin, Chenhui [1 ]
Zhang, Bin [1 ,2 ]
Chen, Zhuo [1 ]
Zhang, Guoshuang [1 ,3 ]
机构
[1] Informat Sci & Technol Inst, Dept Appl Math, Zhengzhou 450000, Peoples R China
[2] POB 1936, Beijing 100193, Peoples R China
[3] Sci & Technol Informat Assurance Lab, Beijing 100000, Peoples R China
关键词
cryptography; matrix algebra; Galois fields; truncated impossible differentials; substitution-permutation network ciphers; miss-in-the-middle approach; r+1 rounds SPN cipher; differential pattern matrix; DPM; bit-shuffles; GF(2(n)); MDS matrix;
D O I
10.1049/iet-ifs.2015.0052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This study concentrates on finding all truncated impossible differentials in substitution-permutation networks (SPNs) ciphers. Instead of using the miss-in-the-middle approach, the authors propose a mathematical description of the truncated impossible differentials. First, they prove that all truncated impossible differentials in an r+1 rounds SPN cipher could be obtained by searching entry 0' in D(P)(r), where D(P) denotes the differential pattern matrix (DPM) of P-layer, thus the length of impossible differentials of an SPN cipher is upper bounded by the minimum integer r such that there is no entry 0' in D(P)(r). Second, they provide two efficient algorithms to compute the DPMs for both bit-shuffles and matrices over GF(2(n)). Using these tools they prove that the longest truncated impossible differentials in SPN structure is 2-round, if the P-layer is designed as an maximum distance separable (MDS) matrix. Finally, all truncated impossible differentials of advanced encryption standard (AES), ARIA, AES-MDS, PRESENT, MAYA and Puffin are obtained.
引用
收藏
页码:89 / 96
页数:8
相关论文
共 21 条
[1]  
Biham E, 1999, LECT NOTES COMPUT SC, V1592, P12
[2]  
Biham E, 2000, 3 AES C
[3]  
Biham E., 1990, CRYPTO, P2
[4]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[5]   PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems [J].
Cheng, Huiju ;
Heys, Howard M. ;
Wang, Cheng .
11TH EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN - ARCHITECTURES, METHODS AND TOOLS : DSD 2008, PROCEEDINGS, 2008, :383-390
[6]  
Daemen J., 2002, DESIGN RIJNDAEL AES, DOI DOI 10.1007/978-3-662-04722-4
[7]  
Gomathisankaran M., 2009, INT WORKSH COD CRYPT
[8]  
Kanda M, 2002, LECT NOTES COMPUT SC, V2355, P286
[9]  
Kim J, 2003, LECT NOTES COMPUT SC, V2904, P82
[10]  
Knudsen L., 1998, COMPLEXITY, V258, P216