Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64

نویسندگان

  • Itai Dinur
  • Orr Dunkelman
  • Nathan Keller
  • Adi Shamir
چکیده

In this paper, we describe new techniques in meet-in-themiddle attacks. Our basic technique is called a linear key sieve since it exploits as filtering conditions linear dependencies between key bits that are guessed from both sides of the attack. This should be contrasted with related previous attacks, which only exploited a linear state sieve (i.e., linear dependencies between state bits that are computed from both sides of the attack). We apply these techniques to the lightweight block cipher LED-64, and improve some of the best known attacks on step-reduced variants of this cipher in all attack models. As a first application of the linear key sieve, we describe a chosen plaintext attack on 2-step LED64, which reduces the time complexity of the best previously published attack on this variant from 2 to 2. Then, we present the first attack on 2-step LED-64 in the known plaintext model. In this attack, we show for the first time that the splice-and-cut technique (which inherently requires chosen messages) can also be applied in the known plaintext model, and we use the linear key sieve in order to obtain an attack with the same time complexity as our chosen plaintext attack. Finally, we describe a related-key attack on 3-step LED-64 which improves the best previously published attack (presented at Asiacrypt 2012) in all the complexity parameters of time/data/memory from 2 to 2. As our first two single-key attacks, the related-key attack is also based on the linear key sieve, but it uses additional techniques in differential meet-inthe-middle which are interesting in their own right.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Thrust Ripple Reduction of Permanent Magnet Linear Synchronous Motor Based on Improved Pole Shape for Electromagnetic Launcher System

In this paper, a new design of permanent magnet linear synchronous motor (PMLSM) for electromagnetic launcher system (EMLs) has been investigated in terms of the requisite amount of average launching thrust force and thrust force ripple minimization through finite element method. EMLs are a kind of technology used to develop thrust force and launch heavy loads with different applications includ...

متن کامل

Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques

Simeck is a new family of lightweight block ciphers proposed by Yang et al. in CHES’15, which has efficient hardware implementation. In this paper, we find differentials with low hamming weight and high probability for Simeck using Kölbl’s tool, then we consider the links between the differential and linear characteristic to construct linear hulls for Simeck. We give improved linear hull attack...

متن کامل

Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro

This paper aims to enhance the application of slide attack which is one of the most well-known cryptanalysis methods using selfsimilarity of a block cipher. The typical countermeasure against slide cryptanalysis is to use round-dependent constants. We present a new probabilistic technique and show how to overcome round-dependent constants in a slide attack against a block cipher based on the ge...

متن کامل

Mersenne Factorization Factory

We present new factors of seventeen Mersenne numbers, obtained using a variant of the special number field sieve where sieving on the algebraic side is shared among the numbers. It reduced the overall factoring effort by more than 50%. As far as we know this is the first practical application of Coppersmith’s “factorization factory” idea. Most factorizations used a new double-product approach t...

متن کامل

Faster tuple lattice sieving using spherical locality-sensitive filters

To overcome the large memory requirement of classical lattice sieving algorithms for solving hard lattice problems, Bai–Laarhoven–Stehlé [ANTS 2016] studied tuple lattice sieving, where tuples instead of pairs of lattice vectors are combined to form shorter vectors. Herold–Kirshanova [PKC 2017] recently improved upon their results for arbitrary tuple sizes, for example showing that a triple sie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2013  شماره 

صفحات  -

تاریخ انتشار 2013