Improved Rectangle Attacks on SKINNY and CRAFT

نویسندگان

چکیده

The boomerang and rectangle attacks are adaptions of differential cryptanalysis that regard the target cipher E as a composition two sub-ciphers, i.e., = E1 ∘ E0, to construct distinguisher for with probability p2q2 by concatenating short trails E0 p q respectively. According previous research, dependency between these characteristics has great impact on distinguishers. Dunkelman et al. proposed sandwich attack formalise such regards three parts, Em where contains trails, satisfying some propagation r. Accordingly, entire is p2q2r. Recently, Song have general framework identify actual boundaries systematically evaluate any number rounds, applied their method accurately probabilities best SKINNY’s In this paper, using more advanced search distinguishers, we show distinguishers SKINNY can be significantly improved in terms rounds. More precisely, propose related-tweakey up 19, 21, 23, 25 rounds SKINNY-64-128, SKINNY-128-256, SKINNY-64-192 SKINNY-128-384 respectively, which improve variants 1, 2, 1 round Based SKINNY, provide 23 24 29 SKINNY-64-192, 30 SKINNY-128-384. It worth noting our SKINNY-128-256 directly same ForkSkinny-64-192, ForkSkinny-128-256 ForkSkinny-128-384 CRAFT another SKINNY-like tweakable block security analysis against first time. As result, 14-round single-tweak model based 18 cipher. Moreover, following research regarding evaluation switching multiple also introduce new tools called Double Boomerang Connectivity Table (DBCT), LBCT⫤, UBCT⊨ switch through accurately.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Results on Boomerang and Rectangle Attacks

The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and ciphertext nature of the attack, boomerang key recovery attacks that retrieve key material on both sides of the boomerang distinguisher are hard to mount. We also present a method for using a boomerang distinguisher, which enables retrieving subkey bits on both sides of the...

متن کامل

Rectangle Attacks on 49-Round SHACAL-1

SHACAL-1 is a 160-bit block cipher with variable key length of up to 512-bit key based on the hash function SHA-1. It was submitted to the NESSIE project and was accepted as a finalist for the 2nd phase of the evaluation. In this paper we present rectangle attacks on 49 rounds out of the 80 rounds of SHACAL-1. The attacks require 2 chosen plaintexts or ciphertexts and have time complexity of 2 ...

متن کامل

Related-Key Boomerang and Rectangle Attacks

This paper introduces the related-key boomerang and the related-key rectangle attacks. These new attacks can expand the cryptanalytic toolbox, and can be applied to many block ciphers. The main advantage of these new attacks, is the ability to exploit the related-key model twice. Hence, even ciphers which were considered resistant to either boomerang or related-key differential attacks may be b...

متن کامل

Differential and Rectangle Attacks on Reduced-Round SHACAL-1

SHACAL-1 is an 80-round block cipher with a 160-bit block size and a key of up to 512 bits. In this paper, we present rectangle attacks on the first 51 rounds and a series of inner 52 rounds of SHACAL-1, and also present differential attacks on the first 49 rounds and a series of inner 55 rounds of SHACAL-1. These are the best currently known cryptanalytic results on SHACAL-1 in an one key atta...

متن کامل

Improved Integral Attacks on Rijndael

In this paper, we present some improved integral attacks on Rijndael whose block sizes are larger than 128 bits. We will introduce some 4-round distinguishers for Rijndael with large blocks proposed by Marine Minier (AFRICACRYPT 2009), and propose a new 4th-order 4-round distinguisher for Rijndael-192. Based on these distinguishers, together with the partial sum technique proposed by Niels Ferg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IACR transaction on symmetric cryptology

سال: 2021

ISSN: ['2519-173X']

DOI: https://doi.org/10.46586/tosc.v2021.i2.140-198