Improved Meet-in-the-Middle Attacks on Crypton and mCrypton

被引:1
|
作者
Cui, Jingyi [1 ]
Guo, Jiansheng [1 ,2 ]
Huang, Yanyan [1 ]
Liu, Yipeng [1 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou, Peoples R China
[2] Sci & Technol Informat Assurance Lab, Beijing, Peoples R China
关键词
Cryptanalysis; Crypton; mCrypton; meet-in-the-middle attack; generalized delta-set; differential enumeration; TRUST MANAGEMENT;
D O I
10.3837/tiis.2017.05.020
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Crypton is a SP-network block cipher that attracts much attention because of its excellent performance on hardware. Based on Crypton, mCrypton is designed as a lightweight block cipher suitable for Internet of Things (IoT) and Radio Frequency Identification (RFID). The security of Crypton and mCrypton under meet-in-the-middle attack is analyzed in this paper. By analyzing the differential properties of cell permutation, several differential characteristics are introduced to construct generalized d-sets. With the usage of a generalized delta-set and differential enumeration technique, a 6-round meet-in-the-middle distinguisher is proposed to give the first meet-in-the-middle attack on 9-round Crypton-192 and some improvements on the cryptanalysis of 10-round Crypton-256 are given. Combined with the properties of nibble permutation and substitution, an improved meet-in-the-middle attack on 8-round mCrypton is proposed and the first complete attack on 9-round mCrypton-96 is proposed.
引用
收藏
页码:2660 / 2679
页数:20
相关论文
共 50 条
  • [41] Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
    Nobuyuki, Sugio
    IET INFORMATION SECURITY, 2023, 2023 (01)
  • [42] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2013, E96A (01) : 121 - 130
  • [43] Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
    Sasaki, Yu
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 378 - 396
  • [44] Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3
    Abdelkhalek, Ahmed
    AlTawy, Riham
    Tolba, Mohamed
    Youssef, Amr M.
    PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 2015, 9230 : 187 - 203
  • [45] Meet-in-the-middle attacks on 10-round AES-256
    Li, Rongjia
    Jin, Chenhui
    DESIGNS CODES AND CRYPTOGRAPHY, 2016, 80 (03) : 459 - 471
  • [46] Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE
    Derbez, Patrick
    Perrin, Leo
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 1184 - 1215
  • [47] Meet-in-the-middle attacks on 10-round AES-256
    Rongjia Li
    Chenhui Jin
    Designs, Codes and Cryptography, 2016, 80 : 459 - 471
  • [48] Improved Meet-in-the-Middle Attacks on 7 and 8-Round ARIA-192 and ARIA-256
    Akshima
    Chang, Donghoon
    Ghosh, Mohona
    Goel, Aarushi
    Sanadhya, Somitra Kumar
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2015, 2015, 9462 : 198 - 217
  • [49] Differential Meet-In-The-Middle Cryptanalysis
    Boura, Christina
    David, Nicolas
    Derbez, Patrick
    Leander, Gregor
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - CRYPTO 2023, PT III, 2023, 14083 : 240 - 272
  • [50] Meet-in-the-middle Cryptanalysis of IVLBC
    Uchiyama, Yuki
    Igarashi, Yasutaka
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 445 - 450