Bit‐level evaluation of piccolo block cipher by satisfiability problem solver

نویسندگان

چکیده

In the field of symmetric key cryptography, security against distinguishing attacks is one crucial requirements. With advancements in computing capabilities and cryptanalysis techniques recent years, more efficient methods have been proposed for exploring distinguishers using Mixed-Integer Linear Programing (MILP) or satisfiability problem (SAT), thereby updating bounds various ciphers. Piccolo a lightweight block cipher at CHES 2011, with support 80-bit 128-bit keys. Designers undergone rough evaluation differential, impossible related-key differential attacks, based on nibble-wise estimations due to limitation computational resource. Here, authors perform bit-level evaluations integral by leveraging SAT-based approaches. For first time, succeed identifying optimal distinguisher 6 rounds single setting, 10/12 setting keys, respectively. find up 7 rounds. Although number attacked same as that previous attack, 56th ordered distinguisher, which enable reducing data complexity from 263 256. As result, 7-round differentials evaluation.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Fault Analysis on Block Cipher Piccolo

Piccolo is a 64-bit block cipher suitable for the constrained environments such as wireless sensor network environments. In this paper, we propose differential fault analysis on Piccolo. Based on a random byte fault model, our attack can recover the secret key of Piccolo-80 by using an exhaustive search of 2 and six random byte fault injections on average. It can be simulated on a general PC wi...

متن کامل

New Observations on Piccolo Block Cipher

To reduce the cost in hardware, key schedules of lightweight block ciphers are usually simple and some even are direct linear transformations on master keys. Designers always add some asymmetry rounddependent constants to prevent the well-known slide attack. For linear key schedules, the choice of round constants becomes important but lacks principles. In this paper, we aim at evaluating the ro...

متن کامل

A Novel Architecture for Lightweight Block Cipher, Piccolo

Security and privacy are going to be the key factors for the deployment of new applications, since people will only accept these deployments if these are based on secure, trustworthy and privacy-preserving infra-structures. Cryptography plays a major role in the security of data transmission and the development of computing technology imposes stronger requirements on the cryptography schemes. L...

متن کامل

A Block World Problem Based Sudoku Solver

There are many approaches proposed for solving Sudoku puzzles. One of them is by modelling the puzzles as block world problems. There have been three model for Sudoku solvers based on this approach. Each model expresses Sudoku solver as a parameterized multi agent systems. In this work, we propose a new model which is an improvement over the existing models. This paper presents the development ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iet Information Security

سال: 2023

ISSN: ['1751-8709', '1751-8717']

DOI: https://doi.org/10.1049/ise2.12119