Key Difference Invariant Bias in Block Ciphers

被引:0
|
作者
Bogdanov, Andrey [1 ]
Boura, Christina [1 ]
Rijmen, Vincent [2 ,3 ]
Wang, Meiqin [4 ]
Wen, Long [4 ]
Zhao, Jingyuan [4 ]
机构
[1] Tech Univ Denmark, Lyngby, Denmark
[2] Katholieke Univ Leuven, ESAT SCD COSIC, Leuven, Belgium
[3] Katholieke Univ Leuven, iMinds, Leuven, Belgium
[4] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Shandong, Peoples R China
关键词
block ciphers; key difference invariant bias; linear cryptanalysis; linear hull; key-alternating ciphers; LBlock; TWINE; CRYPTANALYSIS; PROBABILITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we reveal a fundamental property of block ciphers: There can exist linear approximations such that their biases epsilon are deterministically invariant under key difference. This behaviour is highly unlikely to occur in idealized ciphers but persists, for instance, in 5-round AES. Interestingly, the property of key difference invariant bias is independent of the bias value e itself and only depends on the form of linear characteristics comprising the linear approximation in question as well as on the key schedule of the cipher. We propose a statistical distinguisher for this property and turn it into an key recovery. As an illustration, we apply our novel cryptanalytic technique to mount related-key attacks on two recent block ciphers LBlock and TWINE. In these cases, we break 2 and 3 more rounds, respectively, than the best previous attacks.
引用
收藏
页码:357 / 376
页数:20
相关论文
共 50 条
  • [31] Block ciphers - A survey
    Knudsen, LR
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 18 - 48
  • [32] COMPARISON OF BLOCK CIPHERS
    GUSTAFSON, H
    DAWSON, E
    CAELLI, B
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 208 - 220
  • [33] Efficient and Secure Multiparty Computation from Fixed-Key Block Ciphers
    Guo, Chun
    Katz, Jonathan
    Wang, Xiao
    Yu, Yu
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), 2020, : 825 - 841
  • [34] Encasing Block Ciphers to Foil Key Recovery Attempts via Side Channel
    Agosta, Giovanni
    Barenghi, Alessandro
    Pelosi, Gerardo
    Scandale, Michele
    2016 IEEE/ACM INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN (ICCAD), 2016,
  • [35] The MESH block ciphers
    Nakahara, J
    Rijmen, V
    Preneel, B
    Vandewalle, J
    INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 458 - 473
  • [36] Contemporary block ciphers
    Knudsen, LR
    LECTURES ON DATA SECURITY, 1999, 1561 : 105 - 126
  • [37] A New Key Generation Technique based on Neural Networks for Lightweight Block Ciphers
    Rana, Sohel
    Mondal, M. Rubaiyat Hossain
    Parvez, A. H. M. Shahariar
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (06) : 208 - 216
  • [38] A General Framework for the Related-Key Linear Attack Against Block Ciphers with Linear Key Schedules
    Lee, Jung-Keun
    Koo, Bonwook
    Kim, Woo-Hwan
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 194 - 224
  • [39] Related-Key Zero-Correlation Linear Attacks on Block Ciphers with Linear Key Schedules
    Yi, Zhang
    Kai, Zhang
    Ting, Cui
    CHINESE JOURNAL OF ELECTRONICS, 2024, 33 (03) : 672 - 682
  • [40] Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
    Zhao, Boxin
    Dong, Xiaoyang
    Meier, Willi
    Jia, Keting
    Wang, Gaoli
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (06) : 1103 - 1126