Key Difference Invariant Bias in Block Ciphers

被引:0
|
作者
Bogdanov, Andrey [1 ]
Boura, Christina [1 ]
Rijmen, Vincent [2 ,3 ]
Wang, Meiqin [4 ]
Wen, Long [4 ]
Zhao, Jingyuan [4 ]
机构
[1] Tech Univ Denmark, Lyngby, Denmark
[2] Katholieke Univ Leuven, ESAT SCD COSIC, Leuven, Belgium
[3] Katholieke Univ Leuven, iMinds, Leuven, Belgium
[4] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Shandong, Peoples R China
关键词
block ciphers; key difference invariant bias; linear cryptanalysis; linear hull; key-alternating ciphers; LBlock; TWINE; CRYPTANALYSIS; PROBABILITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we reveal a fundamental property of block ciphers: There can exist linear approximations such that their biases epsilon are deterministically invariant under key difference. This behaviour is highly unlikely to occur in idealized ciphers but persists, for instance, in 5-round AES. Interestingly, the property of key difference invariant bias is independent of the bias value e itself and only depends on the form of linear characteristics comprising the linear approximation in question as well as on the key schedule of the cipher. We propose a statistical distinguisher for this property and turn it into an key recovery. As an illustration, we apply our novel cryptanalytic technique to mount related-key attacks on two recent block ciphers LBlock and TWINE. In these cases, we break 2 and 3 more rounds, respectively, than the best previous attacks.
引用
收藏
页码:357 / 376
页数:20
相关论文
共 50 条
  • [1] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
    Cao, Wenqin
    Zhang, Wentao
    CYBERSECURITY, 2021, 4 (01)
  • [2] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
    Wenqin Cao
    Wentao Zhang
    Cybersecurity, 4
  • [3] On the Key Schedule of Lightweight Block Ciphers
    Huang, Jialin
    Vaudenay, Serge
    Lai, Xuejia
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2014, 2014, 8885 : 124 - 142
  • [4] The Key-Dependent Attack on Block Ciphers
    Sun, Xiaorui
    Lai, Xuejia
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 19 - 36
  • [5] Efficiency of public key cryptosystems as block ciphers
    Hassoun, Youssef
    Owayjan, Michel
    Counsell, Steve
    2016 IEEE INTERNATIONAL MULTIDISCIPLINARY CONFERENCE ON ENGINEERING TECHNOLOGY (IMCET), 2016, : 138 - 143
  • [6] Stream/block ciphers, difference equations and algebraic attacks
    La Scala, Roberto
    Tiwari, Sharwan K.
    JOURNAL OF SYMBOLIC COMPUTATION, 2022, 109 : 177 - 198
  • [7] Chaos based key expansion function for block ciphers
    Kazmi, Shagufta
    Ikram, Nassar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2013, 66 (02) : 267 - 281
  • [8] Known and Chosen Key Differential Distinguishers for Block Ciphers
    Nikolic, Ivica
    Pieprzyk, Josef
    Sokolowski, Przemyslaw
    Steinfeld, Ron
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010, 2011, 6829 : 29 - +
  • [9] Combinatorial Properties of Block Symmetric Ciphers Key Schedule
    Kuznetsov, Olexandr
    Gorbenko, Yuriy
    Kolovanova, Ievgeniia
    2016 THIRD INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS SCIENCE AND TECHNOLOGY (PIC S&T), 2016, : 55 - 58
  • [10] A related key attack on the feistel type block ciphers
    Computer Engineering Department, Sharif University of Technology, P. O. Box 11155-8639, Azadi Avenue, 14588 Tehran, Iran
    不详
    Int. J. Netw. Secur., 2009, 3 (221-226): : 221 - 226