A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules

被引:0
|
作者
Lee, Jung-Keun [1 ]
Koo, Bonwook [1 ]
Kim, Woo-Hwan [1 ]
机构
[1] Affiliated Inst ETRI, Daejeon, South Korea
来源
SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019 | 2020年 / 11959卷
关键词
Related-key attack; Linear cryptanalysis; Linear key schedule; SIMON; CRYPTANALYSIS;
D O I
10.1007/978-3-030-38471-5_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a general framework for the related-key linear attack that can be applied to iterative block ciphers with linear key schedules. The attack utilizes a newly introduced related-key linear approximation that is obtained directly from a linear trail. The attack makes use of a known related-key data consisting of triplets of a plaintext, a ciphertext, and a key difference such that the ciphertext is the encrypted value of the plaintext under the key that is the xor of the key to be recovered and the specified key difference. If such a block cipher has a linear trail with linear correlation epsilon, it admits attacks with related-key data of size O(epsilon(-2)) just as in the case of classical Matsui's Algorithms. But since the attack makes use of a related-key data, the attacker can use a linear trail with the squared correlation less than 2(-n), n being the block size, in case the key size is larger than n. Moreover, the standard key hypotheses seem to be appropriate even when the trail is not dominant as validated by experiments. The attack can be applied in two ways. First, using a linear trail with squared correlation smaller than 2(-n), one can get an effective attack covering more rounds than existing attacks against some ciphers, such as Simon48/96, Simon64/128 and Simon128/256. Secondly, using a trail with large squared correlation, one can use related-key data for key recovery even when the data is not suitable for existing linear attacks.
引用
收藏
页码:194 / 224
页数:31
相关论文
共 50 条
  • [1] Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
    Yi, Zhang
    Kai, Zhang
    Ting, Cui
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 672 - 682
  • [2] A Related-Key Attack on Block Ciphers with Weak Recurrent Key Schedules
    Pudovkina, Marina
    FOUNDATIONS AND PRACTICE OF SECURITY, 2011, 6888 : 90 - 101
  • [3] Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
    Boxin Zhao
    Xiaoyang Dong
    Willi Meier
    Keting Jia
    Gaoli Wang
    Designs, Codes and Cryptography, 2020, 88 : 1103 - 1126
  • [4] Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
    Zhao, Boxin
    Dong, Xiaoyang
    Meier, Willi
    Jia, Keting
    Wang, Gaoli
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (06) : 1103 - 1126
  • [5] A RELATED-KEY ATTACK ON ITERATED CHAOTIC CIPHERS
    Yang, Yang
    Jin, Chenhui
    KYBERNETIKA, 2008, 44 (04) : 501 - 510
  • [6] Ciphers secure against related-key attacks
    Lucks, S
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 359 - 370
  • [7] Related-key linear cryptanalysis
    Vora, Poorvi L.
    Mir, Darakhshan J.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1609 - +
  • [8] Anonymous Signcryption against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 165 - 183
  • [9] Signcryption Secure Against Linear Related-Key Attacks
    Cui, Hui
    Mu, Yi
    Au, Man Ho
    COMPUTER JOURNAL, 2014, 57 (10): : 1472 - 1483
  • [10] On the existence of related-key oracles in cryptosystems based on block ciphers
    Razali, Ermaliza
    Phan, Raphael C. -W.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2006: OTM 2006 WORKSHOPS, PT 1, PROCEEDINGS, 2006, 4277 : 425 - +