Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik

被引:0
作者
Tolba, Mohamed [1 ]
Youssef, Amr M. [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
来源
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2017 | 2018年 / 10779卷
关键词
Cryptanalysis; Meet-in-the-middle attacks; Substitution permutation network; Block ciphers; Kuznyechik; MDS transformations;
D O I
10.1007/978-3-319-78556-1_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. The cipher employs a 256-bit key which is used to generate ten 128-bit round keys. The encryption procedure updates the 16-byte state by iterating the round function for nine rounds. In this work, we improve the previous 5-round Meet-in-the-Middle (MitM) attack on Kuznyechik by presenting a 6-round attack using the MitM with differential enumeration technique. Unlike previous distinguishers which utilize only the structural properties of the Maximum Distance Separable (MDS) linear transformation layer of the cipher, our 3-round distinguisher is computed based on the exact values of the coefficients of this MDS transformation. More specifically, first, we identified the MDS matrix that is utilized in this cipher. Then, we find all the relations that relate between subset of the inputs and outputs of this linear transformation. Finally, we utilized one of these relations in order to find the best distinguisher that can optimize the time complexity of the attack. Also, instead of placing the distinguisher in the middle rounds of the cipher as in the previous 5-round attack, we place it at the first 3 rounds which allows us to convert the attack from the chosen ciphertext model to the chosen plaintext model. Then, to extend the distinguisher by 3 rounds, we performed the matching between the offline and online phases around the linear transformation instead of matching on a state byte.
引用
收藏
页码:26 / 38
页数:13
相关论文
共 21 条
  • [1] A Meet in the Middle Attack on Reduced Round Kuznyechik
    Altawy, Riham
    Youssef, Amr M.
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (10) : 2194 - 2198
  • [2] AlTawy Riham, 2015, FAULT ANAL KUZNYECHI
  • [3] [Anonymous], 2015, R34112012 GOST
  • [4] [Anonymous], 2814789 GOST
  • [5] Biryukov A, 2017, IACR T SYMMETRIC CRY, V2016, P226
  • [6] Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
    Biryukov, Alex
    Perrin, Leo
    Udovenko, Aleksei
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2016, PT I, 2016, 9665 : 372 - 402
  • [7] Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
    Biryukov, Alex
    Derbez, Patrick
    Perrin, Leo
    [J]. FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 3 - 27
  • [8] Bogdanov A, 2011, LECT NOTES COMPUT SC, V6544, P229, DOI 10.1007/978-3-642-19574-7_16
  • [9] Daemen J, 1997, LECT NOTES COMPUT SC, V1267, P149
  • [10] Demirci H, 2008, LECT NOTES COMPUT SC, V5086, P116