Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
نویسندگان
چکیده
Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of important on block ciphers. For example, the impossible attack was first cryptanalytic 7 rounds AES. Evaluating security ciphers against these is very but also challenging: Finding usually implies combinatorial optimization problem involving many parameters constraints that hard to solve using manual approaches. Automated solvers, such as Constraint Programming (CP) can help cryptanalyst find suitable attacks. However, previous CP-based methods focus finding only ID, ZC, distinguishers, often in limited search space. Notably, none be extended unified for full attacks, including efficient key-recovery steps. In this paper, we present new method distinguishers extend it constraint To show effectiveness usefulness our method, applied several ciphers, SKINNY, CRAFT, SKINNYe-v2, SKINNYee. ISO standard cipher significantly improve all existing particular, SKINNY-n-3n SKINNY-n-2n by 3 2 rounds, respectively, obtaining best results variants single-key setting. We ZC SKINNY-n-n (SKINNY-n-2n) (resp. 1) rounds. ID SKINNY. Particularly, time complexity single-tweakey (related-tweakey) SKINNY-128-256 SKINNY-128-384) factor $$2^{22.57}$$ $$2^{15.39}$$ ). On propose 21-round (20-round) ZC) attack, which improves Using model, provide practical reduced-round Deoxys-BC. Our generic applicable other strongly aligned
منابع مشابه
Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis
1 College of Science, National University of Defense Technology, Changsha, Hunan, P. R. China, 410073 2 Dept. Computer Science and Engineering, Shanghai Jiao Tong University, China 3 Dept. Electrical Engineering (ESAT), KU Leuven and iMinds, Belgium 4 College of Electronic Science and Engineering, National University of Defense Technology, Changsha, Hunan, P. R. China, 410073 5 Technical Univer...
متن کاملNote on Impossible Differential Attacks
While impossible di erential cryptanalysis is a well-known and popular cryptanalytic method, errors in the analysis are often discovered and many papers in the literature present aws. Wishing to solve that, Boura et al. [1] presented at ASIACRYPT'14 a generic vision of impossible di erential attacks with the aim of simplifying and helping the construction and veri cation of this type of cryptan...
متن کاملNew Impossible Differential Attacks on AES
In this paper we apply impossible differential attacks to reduced round AES. Using various techniques, including the early abort approach and key schedule considerations, we significantly improve previously known attacks due to Bahrak-Aref and Phan. The improvement of these attacks leads to the best known impossible differential attacks on 7-round AES-128 and AES-192, as well as to the best kno...
متن کاملRelated-Key Impossible Differential Attacks on Crypton
Crypton is a 12-round block cipher proposed as an AES candidate and Crtpton v1.0 is the revised version. In this paper, we present two related-key impossible differential attacks to reduced-round Crypton and Crypton v1.0. By carefully choosing the relations of keys, constructing some 6round related-key differential trials and using some observations on the cipher, we first break 9-round Crypton...
متن کاملNew Impossible Differential Attacks on AES
Some new near 5 rounds impossible differential properties of AES are first presented in this paper, in which active bytes of 1 round or 5 round are in different columns and in favor of extension. Additionally, we first propose the complexities expressions of an universal impossible differential attack, which can help us to rapidly search appropriate impossible differential paths. More important...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Lecture Notes in Computer Science
سال: 2023
ISSN: ['1611-3349', '0302-9743']
DOI: https://doi.org/10.1007/978-3-031-30634-1_5