|
|
Zero-correlation linear attack on reduced-round SKINNY |
Yi ZHANG, Ting CUI( ), Congjun WANG |
Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou 450000, China |
|
|
Abstract At ToSC 2019, Ankele et al. proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model. This paper further clarifies this principle and gives a search model for zero-correlation distinguishers. As a result, for the first time, the authors construct 14-round and 16-round zero-correlation linear distinguishers for SKINNY-- and SKINNY--, respectively, which are both two rounds longer than Anekele et al.’s. Based on these distinguishers, the paper presents related-tweakey zero-correlation linear attacks on 21-round SKINNY-- and 25-round SKINNY--, respectively.
|
Keywords
tweakable block cipher
zero-correlation
related-tweakey
SKINNY
|
Corresponding Author(s):
Ting CUI
|
About author: * These authors contributed equally to this work. |
Just Accepted Date: 06 July 2022
Issue Date: 12 December 2022
|
|
1 |
A, Bogdanov V Rijmen . Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Designs, Codes and Cryptography, 2014, 70( 3): 369–383
|
2 |
A, Bogdanov M Wang . Zero correlation linear cryptanalysis with reduced data complexity. In: Proceedings of the 19th International Workshop on Fast Software Encryption. 2012, 29–48
|
3 |
A, Bogdanov G, Leander K, Nyberg M Wang . Integral and multidimensional linear distinguishers with correlation zero. In: Proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security. 2012, 244–261
|
4 |
R, Ankele C, Dobraunig J, Guo E, Lambooij G, Leander Y Todo . Zero-correlation attacks on tweakable block ciphers with linear Tweakey expansion. IACR Transactions on Symmetric Cryptology, 2019, 2019( 1): 192–235
https://doi.org/10.13154/tosc.v2019.i1.192-235
|
5 |
Z, Gu H, Li S, Khan L, Deng X, Du M, Guizani Z Tian . IEPSBP: a cost-efficient image encryption algorithm based on parallel chaotic system for green IoT. IEEE Transactions on Green Communications and Networking, 2022, 6( 1): 89–106
https://doi.org/10.1109/TGCN.2021.3095707
|
6 |
H, Li Z, Gu L, Deng Y, Han C, Yang Z Tian . A fine-grained video encryption service based on the cloud-fog-local architecture for public and private videos. Sensors, 2019, 19( 24): 5366
https://doi.org/10.3390/s19245366
|
7 |
C, Beierle J, Jean S, Kölbl G, Leander A, Moradi T, Peyrin Y, Sasaki P, Sasdrich S M Sim . The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Proceedings of the 36th Annual International Cryptology Conference. 2016, 123–153
|
8 |
M, Liskov R L, Rivest D Wagner . Tweakable block ciphers. Journal of Cryptology, 2011, 24( 3): 588–613
|
9 |
J, Jean I, Nikolić T Peyrin . Tweaks and keys for block ciphers: the TWEAKEY framework. In: Proceedings of the 20th International Conference on the Theory and Application of Cryptology and Information Security. 2014, 274–288
|
10 |
Iwata T, Khairallah M, Minematsu K, Peyrin T. Remus v1.0. Submission to NIST Lightweight Cryptography Project. See Csrc.nist.gov/projects/lightweight-cryptography/round-1-candidates website, 2019
|
11 |
Iwatas T, Khairallah M, Minematsu K, Peyrin T. Romulus v1.0. Submission to NIST Lightweight Cryptography Project. See Csrc.nist.gov/projects/lightweight-cryptography/round-1-candidates website, 2019
|
12 |
S, Sadeghi T, Mohammadi N Bagheri . Cryptanalysis of reduced round skinny block cipher. IACR Transactions on Symmetric Cryptology, 2018, 2018( 3): 124–162
|
13 |
M, Tolba A, Abdelkhalek A M Youssef . Impossible differential cryptanalysis of reduced-round SKINNY. In: Proceedings of the 9th International Conference on Cryptology in Africa. 2017, 117–134
|
14 |
G, Liu M, Ghosh L Song . Security analysis of skinny under related-Tweakey settings. IACR Transactions on Symmetric Cryptology, 2017, 2017( 3): 37–72
|
15 |
R, Ankele S, Banik A, Chakraborti E, List F, Mendel S M, Sim G Wang . Related-key impossible-differential attack on reduced-round SKINNY. In: Proceedings of the 15th International Conference on Applied Cryptography and Network Security. 2017, 208–228
|
16 |
L, Qin X, Dong X, Wang K, Jia Y Liu . Automated search oriented to key recovery on ciphers with linear key schedule: applications to boomerangs in SKINNY and ForkSkinny. IACR Transactions on Symmetric Cryptology, 2021, 2021( 2): 249–291
|
17 |
X, Dong L, Qin S, Sun X Wang . Key guessing strategies for linear key-schedule algorithms in rectangle attacks. In: Proceedings of the 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2022, 3–33
|
18 |
C, Niu M, Li S, Sun M Wang . Zero-correlation linear cryptanalysis with equal treatment for plaintexts and Tweakeys. In: Proceedings of Cryptographers’ Track at the RSA Conference. 2021, 126–147
|
19 |
J, Daemen R, Govaerts J Vandewalle . Correlation matrices. In: Proceedings of the 2nd International Workshop on Fast Software Encryption. 1994, 275–285
|
20 |
E Biham . On Matsui’s linear cryptanalysis. In: Proceedings of Workshop on the Theory and Application of of Cryptographic Techniques. 1994, 341–355
|
21 |
T, Kranz G, Leander F Wiemer . Linear cryptanalysis: key schedules and tweakable block ciphers. IACR Transactions on Symmetric Cryptology, 2017, 2017( 1): 474–505
|
22 |
Rijmen V. Cryptanalysis and design of iterated block ciphers. Doctoral Dissertation, KU Leuven, 1997
|
23 |
S, Galice M Minier . Improving integral attacks against rijndael-256 up to 9 rounds. In: Proceedings of the 1st International Conference on Cryptology in Africa. 2008, 1–15
|
24 |
B, Sun Z, Liu V, Rijmen R, Li L, Cheng Q, Wang H, AlKhzaimi C Li . Links among impossible differential, integral and zero correlation linear cryptanalysis. In: Proceedings of the 35th Annual Cryptology Conference. 2015, 95–115
|
25 |
H, Hadipour S, Sadeghi M Eichlseder . Finding the impossible: automated search for full impossible-differential, zero-correlation, and integral attacks. In: Proceedings of the 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2023, 128–157
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|