2018
DOI: 10.46586/tosc.v2018.i1.74-100
|View full text |Cite
|
Sign up to set email alerts
|

Searching for Subspace Trails and Truncated Differentials

Abstract: Grassi et al. [Gra+16] introduced subspace trail cryptanalysis as a generalization of invariant subspaces and used it to give the first five round distinguisher for Aes. While it is a generic method, up to now it was only applied to the Aes and Prince. One problem for a broad adoption of the attack is a missing generic analysis algorithm. In this work we provide efficient and generic algorithms that allow to compute the provably best subspace trails for any substitution permutation cipher.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(17 citation statements)
references
References 28 publications
0
15
0
Order By: Relevance
“…From now on, we only work with S-boxes that do not have any nontrivial linear structures. That is, for an S-box S over F, we assume that it is not possible to find nontrivial subspaces U, V ⊂ F (that is, U, V = {0}, F) such that for each u ∈ F there exists v ∈ F such that S(U + u) = V + v. If the S-box has no nontrivial linear structures, there are only two essential subspace trails ({0} → {0} and F → F) when working at word level, as was shown in [LTW18]. Under this assumption, one can work independently of the details of the S-box.…”
Section: Infinitely Long Subspace Trails For P-spn Schemes (Active S-boxes)mentioning
confidence: 94%
See 2 more Smart Citations
“…From now on, we only work with S-boxes that do not have any nontrivial linear structures. That is, for an S-box S over F, we assume that it is not possible to find nontrivial subspaces U, V ⊂ F (that is, U, V = {0}, F) such that for each u ∈ F there exists v ∈ F such that S(U + u) = V + v. If the S-box has no nontrivial linear structures, there are only two essential subspace trails ({0} → {0} and F → F) when working at word level, as was shown in [LTW18]. Under this assumption, one can work independently of the details of the S-box.…”
Section: Infinitely Long Subspace Trails For P-spn Schemes (Active S-boxes)mentioning
confidence: 94%
“…Subspace Trails. Subspace trails were first defined in [GRR16a], and they are strictly related to truncated differential attacks, as shown in [LTW18]. Definition 1 (Subspace Trail).…”
Section: Invariant Subspaces and Subspace Trailsmentioning
confidence: 99%
See 1 more Smart Citation
“…Göloglu et al [58] list the division properties of Ascon's S-box S and conclude that these values are optimal with respect to the degree (Table 18a). Subspace Trails Leander et al [69] analyze the existence of subspace trails. For Ascon's permutation, they show that the longest subspace trails using 1-linear structures cover 3 rounds (dimension 298) or 1 inverse round (dimension 125).…”
Section: Linearization and Initial Structuresmentioning
confidence: 99%
“…Apart from the self-analysis provided by the designers [DEMS16], Ascon has gone through substantial third-party cryptanalysis. First of all, without considering the AEAD context, the security of the underlying permutation of Ascon was evaluated with respect to (impossible) differential cryptanalysis [Tez16], (zero-correlation) linear cryptanalysis [DEM15], differential-linear cryptanalysis [DEMS15,BDKW19], integral (based on division properties) or zero-sum distinguishing attacks [YLW + 19, DEMS15, GRW16, Tod15], and subspace trail cryptanalysis [LTW18]. While these works do provide a deeper understanding of the security of Ascon permutation, generally they do not directly translate into meaningful attacks in the AEAD setting.…”
Section: Introductionmentioning
confidence: 99%