Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE

被引:12
作者
Lin, Li [1 ,2 ,3 ]
Wu, Wenling [1 ,2 ,3 ]
Zheng, Yafei [1 ,2 ,3 ]
机构
[1] Chinese Acad Sci, Inst Software, TCA Lab, SKLCS, Beijing, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Grad Univ Chinese Acad Sci, Beijing 100190, Peoples R China
来源
FAST SOFTWARE ENCRYPTION (FSE 2016) | 2016年 / 9783卷
基金
中国国家自然科学基金;
关键词
Block ciphers; Key-bridging technique; Automatic search; Impossible differential cryptanalysis; Zero-correlation linear cryptanalysis; LBlock; TWINE; BLOCK CIPHER; DISTINGUISHER; ATTACKS;
D O I
10.1007/978-3-662-52993-5_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key schedules in block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. At ASI-ACRYPT 2011, Dunkelman et al. proposed a technique using the weakness in the key schedule of AES, called key-bridging technique, to improve the overall complexity. The advantage of key-bridging technique is that it allows the adversary to deduce some sub-key bits from some other sub-key bits, even though they are separated by many key mixing steps. Although the relations of successive rounds may be easy to see, the relations of two rounds separated by some mixing steps are very hard to find. In this paper, we describe a versatile and powerful algorithm for searching key-bridging technique on word-oriented and bit-oriented block ciphers. To demonstrate the usefulness of our approach, we apply our tool to the impossible differential and multidimensional zero correlation linear attacks on 23-round LBlock, 23-round TWINE-80 and 25-round TWINE128. To the best of our knowledge, these results are the currently best results on LBlock and TWINE in the single-key setting.
引用
收藏
页码:247 / 267
页数:21
相关论文
共 26 条
[1]  
[Anonymous], 2015, ADV MATER SCI ENG
[2]  
Beaulieu R., 2013, IACR Cryptol. ePrint Arch., V2013, P404
[3]   Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE [J].
Biryukov, Alex ;
Derbez, Patrick ;
Perrin, Leo .
FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 :3-27
[4]  
Biryukov A, 2009, LECT NOTES COMPUT SC, V5677, P231, DOI 10.1007/978-3-642-03356-8_14
[5]  
Bogdanov A, 2007, LECT NOTES COMPUT SC, V4727, P450
[6]  
Bogdanov A, 2011, LECT NOTES COMPUT SC, V6544, P229, DOI 10.1007/978-3-642-19574-7_16
[7]  
Boura C., 2014, 2014279 CRYPT PRINT
[8]  
Boura C, 2014, LECT NOTES COMPUT SC, V8873, P179, DOI 10.1007/978-3-662-45611-8_10
[9]  
Daemen J., 2002, DESIGN RIJNDAEL AES, DOI DOI 10.1007/978-3-662-04722-4
[10]  
Derbez P, 2013, LECT NOTES COMPUT SC, V7881, P371, DOI 10.1007/978-3-642-38348-9_23