On the Key Schedule of Lightweight Block Ciphers

被引:7
|
作者
Huang, Jialin [1 ,2 ]
Vaudenay, Serge [1 ]
Lai, Xuejia [2 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
来源
PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014 | 2014年 / 8885卷
基金
中国国家自然科学基金;
关键词
Automatic tool; Meet-In-The-Middle; PRESENT; TWINE; Actual key information; DIFFERENTIAL CHARACTERISTICS; AUTOMATIC SEARCH; AES; CRYPTANALYSIS; PRINTCIPHER; ATTACKS;
D O I
10.1007/978-3-319-13039-2_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Key schedules in lightweight block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. Today it remains an open problem on how to use limited operations to guarantee enough diffusion of key bits in lightweight key schedules. Also, there are few tools special for detecting weakness in the key schedule. In 2013 Huang et al. pointed out that insufficient actual key information (AKI) in computation chains is responsible for many attacks especially the meet-in-the-middle (MITM) attacks. Motivated by this fact, in this paper we develop an efficient (with polynomial time complexity) and effective tool to search the computation chains which involve insufficient AKI for iterated key schedules of lightweight ciphers. The effectiveness of this tool is shown by an application on TWINE-80. Then, we formulate the cause of key bits leakage phenomenon, where the knowledge of subkey bits is leaked or overlapped by other subkey bits in the same computation chain. Based on the interaction of diffusion performed by the key schedule and by the round function, a necessary condition is thus given on how to avoid key bits leakage. Therefore, our work sheds light on the design of lightweight key schedules by guiding how to quickly rule out unreasonable key schedules and maximize the security under limited diffusion.
引用
收藏
页码:124 / 142
页数:19
相关论文
共 50 条
  • [21] Improved algebraic attacks on lightweight block ciphers
    Sze Ling Yeo
    Duc-Phong Le
    Khoongming Khoo
    Journal of Cryptographic Engineering, 2021, 11 : 1 - 19
  • [22] A Comparative Analysis of Symmetric Lightweight Block Ciphers
    Poojari, Asmita
    Nagesh, H. R.
    EMERGING TECHNOLOGIES IN DATA MINING AND INFORMATION SECURITY, IEMIS 2018, VOL 1, 2019, 755 : 705 - 711
  • [23] Triathlon of lightweight block ciphers for the Internet of things
    Dinu, Daniel
    Le Corre, Yann
    Khovratovich, Dmitry
    Perrin, Leo
    Grossschadl, Johann
    Biryukov, Alex
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2019, 9 (03) : 283 - 302
  • [24] Evaluation of Lightweight Block Ciphers for Embedded Systems
    Barahtian, Oana
    Cuciuc, Mihai
    Petcana, Lucian
    Leordeanu, Catalin
    Cristea, Valentin
    INNOVATIVE SECURITY SOLUTIONS FOR INFORMATION TECHNOLOGY AND COMMUNICATIONS, 2015, 9522 : 49 - 58
  • [25] Secure key-alternating Feistel ciphers without key schedule
    Shen, Yaobin
    Yan, Hailun
    Wang, Lei
    Lai, Xuejia
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (01)
  • [26] Secure key-alternating Feistel ciphers without key schedule
    Yaobin Shen
    Hailun Yan
    Lei Wang
    Xuejia Lai
    Science China Information Sciences, 2021, 64
  • [27] Secure key-alternating Feistel ciphers without key schedule
    Yaobin SHEN
    Hailun YAN
    Lei WANG
    Xuejia LAI
    Science China(Information Sciences), 2021, 64 (01) : 251 - 253
  • [28] A Deeper Look at the Energy Consumption of Lightweight Block Ciphers
    Caforio, Andrea
    Balli, Fatih
    Banik, Subhadeep
    Regazzoni, Francesco
    PROCEEDINGS OF THE 2021 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION (DATE 2021), 2021, : 170 - 175
  • [29] Securing the internet of vehicles through lightweight block ciphers *
    Castiglione, Arcangelo
    Palmieri, Francesco
    Colace, Francesco
    Lombardi, Marco
    Santaniello, Domenico
    D'Aniello, Giuseppe
    PATTERN RECOGNITION LETTERS, 2020, 135 : 264 - 270
  • [30] Towards an ultra lightweight block ciphers for Internet of Things
    Sliman, Layth
    Omrani, Tasnime
    Tari, Zahir
    Samhat, Abed Ellatif
    Rhouma, Rhouma
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 61