Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY
نویسندگان
چکیده
The Demirci-Selçuk meet-in-the-middle (DS-MITM) attack is a sophisticated variant of differential attacks. Due to its sophistication, it hard efficiently find the best DS-MITM attacks on most ciphers except for AES. Moreover, current automatic tools only capture basic version attacks, and critical techniques developed enhancing (e.g., enumeration key-dependent-sieve) still rely manual work. In this paper, we develop full-fledged framework integrating all known (differential enumeration, key-dependent-sieve, key bridging, etc.) that can produce key-recovery directly rather than search distinguishers. new technique able exploit partial additions generate more linear relations beneficial We apply SKINNY family block significantly improved results are obtained. particular, respective versions by at least 2 rounds, data, memory, or time complexities some reduced even compared previous penetrating less rounds.
منابع مشابه
Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher
KASUMI is a block cipher with eight Feistel rounds and a key of up to 128 bits. Proposed more than 10 years ago, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI. In the practically interesting single key setting that we are aiming for in this work, no attack is known. For the full 8-round KASUMI we show for the first time a wide variety of ...
متن کاملExhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
In this paper, we revisit Demirci and Selçuk meet-in-themiddle attacks on AES. We nd a way to automatically model SPN block cipher and meet-in-the-middle attacks that allows to perform exhaustive search of this kind of attacks. This search uses the tool developed by Bouillaguet, Derbez and Fouque at CRYPTO 2011 as a subroutine to solve speci c systems. We also take into account ideas introduced...
متن کاملMeet RODA, a Full-Fledged Digital Repository for Long-Term Preservation
RODA is an open-source full-fledged digital preservation repository capable of ingesting, managing and providing continuous access to various types of digital objects, namely textdocuments, raster images, relational databases, video and audio. It is supported by open-source technologies and makes use of existing standards such as the OAIS [1], METS [2], EAD [3] and PREMIS [4].
متن کاملCzeżowski’s axiological concepts as full-fledged modalities
This short note provides a tentative formalization of Czeżowski’s ideas about axiological concepts: Good and Evil are conceived of as modalities rather than as predicates. A natural account of the resulting “ethical logic” appears to be very close to standard deontic logic. If one does not resolve to become an antirealist regarding moral values, a possible way out is to become a revisionist abo...
متن کاملCryptanalysis of Full Sprout
A new method for reducing the internal state size of stream cipher registers has been proposed in FSE 2015, allowing to reduce the area in hardware implementations. Along with it, an instantiated proposal of a cipher was also proposed: Sprout. In this paper, we analyze the security of Sprout, and we propose an attack that recovers the whole key more than 2 times faster than exhaustive search an...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-30634-1_3