Practical distinguishing attack against the IoT‐friendly block cipher ALLPC

نویسندگان

چکیده

The issue of security and privacy plays an important role in the Internet Things (IoT) directly affects its wide applications. In order to meet requirements IoT environment, a series lightweight encryption schemes have been proposed. Meanwhile, cryptanalysis against these is critical IoT. this paper, practical distinguishing attack on IoT-friendly cipher ALLPC presented. Specifically, it found that there exists fixed point differential ALLPC's S-box, then trail with period 14-round has By connecting periodic trail, constructed for full-round probability 2−24. Applying such property, one can distinguish block from random permutation about 10 min laptop.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Practical-time Attack on the Full MMB Block Cipher

Modular Multiplication based Block Cipher (MMB) is a block cipher designed by Daemen et al. as an alternative to the IDEA block cipher. In this paper, we give a practical-time attack on the full MMB with adaptive chosen plaintexts and ciphertexts. By the constructive sandwich distinguisher for 5 of the 6 rounds of MMB with amazingly high probability 1, we give the key recovery attack on the ful...

متن کامل

A Statistical Saturation Attack against the Block Cipher PRESENT

Then, in the third extension of Section 2.2, it is proposed to reduce the data complexity of the attack at the cost of an increased time complexity, by performing a partial decryption of two rounds. Straightforwardly applying this trick implies 8 active S-boxes in the last round and 4 active S-boxes in the penultimate one. Hence, the same correction of the time complexity has to be applied, whi...

متن کامل

Protecting Cipher Block Chaining Against Adaptive Chosen Plaintext Attack

In the literature, several encryption modes of operation based on cipher block chaining (CBC) has been proven to be secure under non-adaptive chosen plaintext attack (CPA-1) in the left-or-right (LOR) or find-then-guess (FTG) security models. However, it was shown by Joux et. al. at Crypto 2002 that if we allow the adversary to perform an adaptive chosen plaintext attack (CPA-2), then CBC, ABC ...

متن کامل

Review of a New Distinguishing Attack Using Block Cipher with a Neural Network

This paper describes a new distinguishing type attack to identify block ciphers, which grounded in a neural network, by means of a linguistic approach and an information retrieval approach, from patterns which is found on a ciphertexts set collection. The ideas were performed on a set of ciphertexts, which were encrypted by the finalist algorithms of AES contest: MARS, RC6, Rijndael, Serpent an...

متن کامل

Impossible Boomerang Attack for Block Cipher Structures

Impossible boomerang attack [5] (IBA) is a new variant of differential cryptanalysis against block ciphers. Evident from its name, it combines the ideas of both impossible differential cryptanalysis and boomerang attack. Though such an attack might not be the best attack available, its complexity is still less than that of the exhaustive search. In impossible boomerang attack, impossible boomer...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Electronics Letters

سال: 2022

ISSN: ['0013-5194', '1350-911X']

DOI: https://doi.org/10.1049/ell2.12544