On the Key Schedule of Lightweight Block Ciphers

被引:7
|
作者
Huang, Jialin [1 ,2 ]
Vaudenay, Serge [1 ]
Lai, Xuejia [2 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Automatic tool; Meet-In-The-Middle; PRESENT; TWINE; Actual key information; DIFFERENTIAL CHARACTERISTICS; AUTOMATIC SEARCH; AES; CRYPTANALYSIS; PRINTCIPHER; ATTACKS;
D O I
10.1007/978-3-319-13039-2_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key schedules in lightweight block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. Today it remains an open problem on how to use limited operations to guarantee enough diffusion of key bits in lightweight key schedules. Also, there are few tools special for detecting weakness in the key schedule. In 2013 Huang et al. pointed out that insufficient actual key information (AKI) in computation chains is responsible for many attacks especially the meet-in-the-middle (MITM) attacks. Motivated by this fact, in this paper we develop an efficient (with polynomial time complexity) and effective tool to search the computation chains which involve insufficient AKI for iterated key schedules of lightweight ciphers. The effectiveness of this tool is shown by an application on TWINE-80. Then, we formulate the cause of key bits leakage phenomenon, where the knowledge of subkey bits is leaked or overlapped by other subkey bits in the same computation chain. Based on the interaction of diffusion performed by the key schedule and by the round function, a necessary condition is thus given on how to avoid key bits leakage. Therefore, our work sheds light on the design of lightweight key schedules by guiding how to quickly rule out unreasonable key schedules and maximize the security under limited diffusion.
引用
收藏
页码:124 / 142
页数:19
相关论文
共 50 条
  • [1] On the Design Strategies of Diffusion Layers and Key Schedule in Lightweight Block Ciphers
    Pehlivanoglu, Meltem Kurt
    Akleylek, Sedat
    Sakalli, M. Tolga
    Duru, Nevcihan
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 456 - 461
  • [2] Combinatorial Properties of Block Symmetric Ciphers Key Schedule
    Kuznetsov, Olexandr
    Gorbenko, Yuriy
    Kolovanova, Ievgeniia
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 55 - 58
  • [3] A review of lightweight block ciphers
    George Hatzivasilis
    Konstantinos Fysarakis
    Ioannis Papaefstathiou
    Charalampos Manifavas
    Journal of Cryptographic Engineering, 2018, 8 : 141 - 184
  • [4] A review of lightweight block ciphers
    Hatzivasilis, George
    Fysarakis, Konstantinos
    Papaefstathiou, Ioannis
    Manifavas, Charalampos
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (02) : 141 - 184
  • [5] Enhancing IoT Security: An Innovative Key Management System for Lightweight Block Ciphers
    Rana, Muhammad
    Mamun, Quazi
    Islam, Rafiqul
    SENSORS, 2023, 23 (18)
  • [6] A New Key Generation Technique based on Neural Networks for Lightweight Block Ciphers
    Rana, Sohel
    Mondal, M. Rubaiyat Hossain
    Parvez, A. H. M. Shahariar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 208 - 216
  • [7] A MAC Mode for Lightweight Block Ciphers
    Luykx, Atul
    Preneel, Bart
    Tischhauser, Elmar
    Yasuda, Kan
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 43 - 59
  • [8] The Simeck Family of Lightweight Block Ciphers
    Yang, Gangqiang
    Zhu, Bo
    Suder, Valentin
    Aagaard, Mark D.
    Gong, Guang
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2015, 2015, 9293 : 307 - 329
  • [9] The SIMON and SPECK lightweight block ciphers
    Beaulieu, Ray
    Shors, Douglas
    Smith, Jason
    Treatman-Clark, Stefan
    Weeks, Bryan
    Wingers, Louis
    2015 52ND ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2015,
  • [10] Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
    Zhao, Boxin
    Dong, Xiaoyang
    Meier, Willi
    Jia, Keting
    Wang, Gaoli
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (06) : 1103 - 1126