Exploiting Non-full Key Additions: Full-Fledged Automatic Demirci-Selçuk Meet-in-the-Middle Cryptanalysis of SKINNY

نویسندگان

چکیده

The Demirci-Selçuk meet-in-the-middle (DS-MITM) attack is a sophisticated variant of differential attacks. Due to its sophistication, it hard efficiently find the best DS-MITM attacks on most ciphers except for AES. Moreover, current automatic tools only capture basic version attacks, and critical techniques developed enhancing (e.g., enumeration key-dependent-sieve) still rely manual work. In this paper, we develop full-fledged framework integrating all known (differential enumeration, key-dependent-sieve, key bridging, etc.) that can produce key-recovery directly rather than search distinguishers. new technique able exploit partial additions generate more linear relations beneficial We apply SKINNY family block significantly improved results are obtained. particular, respective versions by at least 2 rounds, data, memory, or time complexities some reduced even compared previous penetrating less rounds.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Green Cryptanalysis: Meet-in-the-Middle Key-Recovery for the Full KASUMI Cipher

KASUMI is a block cipher with eight Feistel rounds and a key of up to 128 bits. Proposed more than 10 years ago, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI. In the practically interesting single key setting that we are aiming for in this work, no attack is known. For the full 8-round KASUMI we show for the first time a wide variety of ...

متن کامل

Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES

In this paper, we revisit Demirci and Selçuk meet-in-themiddle attacks on AES. We nd a way to automatically model SPN block cipher and meet-in-the-middle attacks that allows to perform exhaustive search of this kind of attacks. This search uses the tool developed by Bouillaguet, Derbez and Fouque at CRYPTO 2011 as a subroutine to solve speci c systems. We also take into account ideas introduced...

متن کامل

Meet RODA, a Full-Fledged Digital Repository for Long-Term Preservation

RODA is an open-source full-fledged digital preservation repository capable of ingesting, managing and providing continuous access to various types of digital objects, namely textdocuments, raster images, relational databases, video and audio. It is supported by open-source technologies and makes use of existing standards such as the OAIS [1], METS [2], EAD [3] and PREMIS [4].

متن کامل

Czeżowski’s axiological concepts as full-fledged modalities

This short note provides a tentative formalization of Czeżowski’s ideas about axiological concepts: Good and Evil are conceived of as modalities rather than as predicates. A natural account of the resulting “ethical logic” appears to be very close to standard deontic logic. If one does not resolve to become an antirealist regarding moral values, a possible way out is to become a revisionist abo...

متن کامل

Cryptanalysis of Full Sprout

A new method for reducing the internal state size of stream cipher registers has been proposed in FSE 2015, allowing to reduce the area in hardware implementations. Along with it, an instantiated proposal of a cipher was also proposed: Sprout. In this paper, we analyze the security of Sprout, and we propose an attack that recovers the whole key more than 2 times faster than exhaustive search an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2023

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-031-30634-1_3