2020
DOI: 10.46586/tosc.v2019.i4.171-191
|View full text |Cite
|
Sign up to set email alerts
|

Improved Security Evaluation of SPN Block Ciphers and its Applications in the Single-key Attack on SKINNY

Abstract: In this paper, a new method for evaluating the integral property, truncated and impossible differentials for substitution-permutation network (SPN) block ciphers is proposed. The main assumption is an explicit description/expression of the internal state words in terms of the plaintext (ciphertext) words. By counting the number of times these words occur in the internal state expression, we can evaluate the resistance of a given block cipher to integral and impossible/truncated differential attacks more accura… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Zhang et al. [21] proposed a method to use algebraic expressions to express the dependencies of intermediate states on the outputs. Inspired by this method, the output difference of the 84‐round ciphertext is expressed by the 97‐round ciphertext and subkeys.…”
Section: Key Recovery Attack Of Katan32mentioning
confidence: 99%
“…Zhang et al. [21] proposed a method to use algebraic expressions to express the dependencies of intermediate states on the outputs. Inspired by this method, the output difference of the 84‐round ciphertext is expressed by the 97‐round ciphertext and subkeys.…”
Section: Key Recovery Attack Of Katan32mentioning
confidence: 99%
“…Key-Recovery Attack on 97-Round KATAN32. Inspired by the technique representing the dependence of the intermediate state on the output by an algebraic representation in [34], we give the algebraic representation of the intermediate state using the ciphertext and round keys. Using Equations ( 2) and ( 3), we can get the expression of l t , s t in decryption direction:…”
Section: -Bit Keymentioning
confidence: 99%
“…From the per-SKINNY spective of distinguishing attacks, the cryptanalysts try to construct an impossible differential which covers as many rounds as possible. At EUROCRYPT 2016, Sun et al proved that the upper bound on the length of impossible differentials of substitution-permutation network (SPN) structure by the primitive index of the linear layers [12] without considering the details inside Sboxes. Inspired by this method, Zhang et al evaluated the resistance of SPN block cipher against impossible differential attack by counting the occurrences of the plaintext (ciphertext) words appearing in the expression of the internal state words [13].…”
Section: Introductionmentioning
confidence: 99%