Improved Meet-in-the-Middle Attacks on Reduced Round Kuznyechik

被引:0
|
作者
Tolba, Mohamed [1 ]
Youssef, Amr M. [1 ]
机构
[1] Concordia Univ, Concordia Inst Informat Syst Engn, Montreal, PQ, Canada
关键词
Cryptanalysis; Meet-in-the-middle attacks; Substitution permutation network; Block ciphers; Kuznyechik; MDS transformations;
D O I
10.1007/978-3-319-78556-1_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Kuznyechik is an SPN block cipher that has been chosen recently to be standardized by the Russian federation as a new GOST cipher. The cipher employs a 256-bit key which is used to generate ten 128-bit round keys. The encryption procedure updates the 16-byte state by iterating the round function for nine rounds. In this work, we improve the previous 5-round Meet-in-the-Middle (MitM) attack on Kuznyechik by presenting a 6-round attack using the MitM with differential enumeration technique. Unlike previous distinguishers which utilize only the structural properties of the Maximum Distance Separable (MDS) linear transformation layer of the cipher, our 3-round distinguisher is computed based on the exact values of the coefficients of this MDS transformation. More specifically, first, we identified the MDS matrix that is utilized in this cipher. Then, we find all the relations that relate between subset of the inputs and outputs of this linear transformation. Finally, we utilized one of these relations in order to find the best distinguisher that can optimize the time complexity of the attack. Also, instead of placing the distinguisher in the middle rounds of the cipher as in the previous 5-round attack, we place it at the first 3 rounds which allows us to convert the attack from the chosen ciphertext model to the chosen plaintext model. Then, to extend the distinguisher by 3 rounds, we performed the matching between the offline and online phases around the linear transformation instead of matching on a state byte.
引用
收藏
页码:26 / 38
页数:13
相关论文
共 50 条
  • [21] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Ping Wang
    Xiaomei Chen
    Guohao Jiang
    International Journal of Theoretical Physics, 2022, 61
  • [22] Improved meet-in-the-middle attacks on Crypton and mCrypton
    Li, Rongjia
    Jin, Chenhui
    IET INFORMATION SECURITY, 2017, 11 (02) : 97 - 103
  • [23] Improved Meet-in-the-Middle Attacks on Crypton and mCrypton
    Cui, Jingyi
    Guo, Jiansheng
    Huang, Yanyan
    Liu, Yipeng
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2660 - 2679
  • [24] Quantum Demiric-Selcuk Meet-in-the-Middle Attacks on Reduced-Round AES
    Wang, Ping
    Chen, Xiaomei
    Jiang, Guohao
    INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, 2022, 61 (01)
  • [25] Improved Meet-in-the-middle Attacks on Reduced-roundMIBS-80 Cipher br
    Ren, Jiongjiong
    Hou, Zezhou
    Li, Manman
    Lin, Dongdong
    Chen, Shaozhen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (08) : 2914 - 2923
  • [26] A meet-in-the-middle attack on reduced-round ARIA
    Tang, Xuehai
    Sun, Bing
    Li, Ruilin
    Li, Chao
    Yin, Juhua
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (10) : 1685 - 1692
  • [27] Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
    Li Lin
    Wenling Wu
    Designs, Codes and Cryptography, 2018, 86 : 721 - 741
  • [28] A New Method for Meet-in-the-Middle Attacks on Reduced AES
    Dong Xiaoli
    Hu Yupu
    Wei Yongzhuang
    Chen Jie
    CHINA COMMUNICATIONS, 2011, 8 (02) : 21 - 25
  • [29] Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
    Lin, Li
    Wu, Wenling
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (04) : 721 - 741
  • [30] Meet-in-the-middle attacks on round-reduced tweakable block cipher Deoxys-BC
    Li, Rongjia
    Jin, Chenhui
    IET INFORMATION SECURITY, 2019, 13 (01) : 70 - 75