Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule
نویسندگان
چکیده
Automatic modelling to search distinguishers with high probability covering as many rounds possible, such MILP, SAT/SMT, CP models, has become a very popular cryptanalysis topic today. In those the optimizing objective is usually or number of distinguishers. If we want recover secret key for round-reduced block cipher, there are two phases, i.e., finding an efficient distinguisher and performing key-recovery attack by extending several before after distinguisher. The total attacked not only related chosen distinguisher, but also extended this paper, try combine phases in uniform automatic model.Concretely, apply idea automate related-key rectangle attacks on SKINNY ForkSkinny. We propose some new advantage perform attacks. Our few versions ForkSkinny cover 1 2 more than best previous
منابع مشابه
On the Key Schedule of Lightweight Block Ciphers
Key schedules in lightweight block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. Today it remains an open problem on how to use limited operations to guarantee enough diffusion of key bits in lightweight key schedules. Also, there are few tools special for detecting weakness in the key schedule. In 2013 Huang et al. pointed out that insufficie...
متن کاملApplying Conditional Linear Cryptanalysis to Ciphers with Key- Dependant Operations
Linear cryptanalysis has been proven to be a powerful attack that can be applied to a number of symmetric block ciphers. However, conventional linear cryptanalysis is ineffective in attacking ciphers that use key-dependent operations, such as ICE, Lucifer and SAFER. In this paper conditional linear cryptanalysis, which uses characteristics that depend on some key-bit values, is introduced. This...
متن کاملA Better Key Schedule for Des-like Ciphers
Several DES-like ciphers aren’t utilizing their full potential strength, because of the short key and linear or otherwise easily tractable algorithms they use to generate their key schedules. Using DES as example, we show a way to generate round subkeys to increase the cipher strength substantially by making relations between the round subkeys practically intractable.
متن کاملDecoding Running Key Ciphers
There has been recent interest in the problem of decoding letter substitution ciphers using techniques inspired by natural language processing. We consider a different type of classical encoding scheme known as the running key cipher, and propose a search solution using Gibbs sampling with a word language model. We evaluate our method on synthetic ciphertexts of different lengths, and find that...
متن کاملThe Security of Elastic Block Ciphers Against Key-Recovery Attacks
We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports any block size in the range of one to two times the length of the original block. Our method for creating an elastic block cipher involves inserting the round function of the original cipher into a substitution-permutati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IACR transaction on symmetric cryptology
سال: 2021
ISSN: ['2519-173X']
DOI: https://doi.org/10.46586/tosc.v2021.i2.249-291