Skip to main content
Erschienen in: Journal of Computer Virology and Hacking Techniques 1/2024

28.09.2023 | Original Paper

Provably minimum data complexity integral distinguisher based on conventional division property

verfasst von: Akram Khalesi, Zahra Ahmadian

Erschienen in: Journal of Computer Virology and Hacking Techniques | Ausgabe 1/2024

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Division property is an effective method for finding integral distinguishers for block ciphers, performing cube attacks on stream ciphers, and studying the algebraic degree of boolean functions. One of the main problems in this field is how to provably find the smallest input multiset leading to a balanced output. In this paper, we propose a new method, using the division property, to find integral distinguishers for permutation functions and block ciphers, with provably-minimum data complexity, in the conventional division property model. The new method is based on a precise and efficient analysis of the target output bit’s algebraic normal form. We examine the proposed method on LBlock, TWINE, SIMON, Present, Gift, and Clyde-128 block ciphers. Although in most cases, the results are consistent with the distinguishers reported in previous work, their optimality is proved, in the conventional division property model. Moreover, the proposed method can find distinguishers for 8-round Clyde-128 with less data complexity than previously reported. Based on the proposed method, we also develop an algorithm capable of determining the maximum number of balanced output bits for integral distinguishers with a certain number of active bits. Accordingly, for the ciphers under study, we determine the maximum number of balanced bits for integral distinguishers with data complexities set to minimum and slightly higher, resulting in improved distinguishers for Gift-64, Present, and SIMON64, in the conventional model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Lai, X.: Higher order derivatives and differential cryptanalysis. In Communications and cryptography, pp. 227–233. Springer, (1994) Lai, X.: Higher order derivatives and differential cryptanalysis. In Communications and cryptography, pp. 227–233. Springer, (1994)
2.
Zurück zum Zitat Daemen, J., Knudsen, L., Rijmen, V.: The block cipher square. In International Workshop on Fast Software Encryption, pp. 149–165. Springer, (1997) Daemen, J., Knudsen, L., Rijmen, V.: The block cipher square. In International Workshop on Fast Software Encryption, pp. 149–165. Springer, (1997)
3.
Zurück zum Zitat Knudsen, L., Wagner, D.: Integral cryptanalysis (extended abstract. In Proceedings of Fast Software Encryption–FSE’02, number 2365 in Lecture Notes in Computer Science. Citeseer, (2002) Knudsen, L., Wagner, D.: Integral cryptanalysis (extended abstract. In Proceedings of Fast Software Encryption–FSE’02, number 2365 in Lecture Notes in Computer Science. Citeseer, (2002)
4.
Zurück zum Zitat Todo, Y.: Structural evaluation by generalized integral property. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 287–314. Springer, (2015) Todo, Y.: Structural evaluation by generalized integral property. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 287–314. Springer, (2015)
5.
Zurück zum Zitat Xiang, Z., Zhang, W., Bao, Z., Lin, D.: Applying milp method to searching integral distinguishers based on division property for 6 lightweight block ciphers. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 648–678. Springer, (2016) Xiang, Z., Zhang, W., Bao, Z., Lin, D.: Applying milp method to searching integral distinguishers based on division property for 6 lightweight block ciphers. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 648–678. Springer, (2016)
6.
Zurück zum Zitat Todo, Y., Morii, M.: Bit-based division property and application to simon family. In International Conference on Fast Software Encryption, pp. 357–377. Springer, (2016) Todo, Y., Morii, M.: Bit-based division property and application to simon family. In International Conference on Fast Software Encryption, pp. 357–377. Springer, (2016)
7.
Zurück zum Zitat Wang, S., Hu, B., Guan, J., Zhang, K., Shi, T.: Milp-aided method of searching division property using three subsets and applications. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 398–427. Springer, (2019) Wang, S., Hu, B., Guan, J., Zhang, K., Shi, T.: Milp-aided method of searching division property using three subsets and applications. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 398–427. Springer, (2019)
8.
Zurück zum Zitat Hu, K., Wang, M.: Automatic search for a variant of division property using three subsets. In Cryptographers’ Track at the RSA Conference, pp. 412–432. Springer, (2019) Hu, K., Wang, M.: Automatic search for a variant of division property using three subsets. In Cryptographers’ Track at the RSA Conference, pp. 412–432. Springer, (2019)
9.
Zurück zum Zitat Hao, Y., Leander, G., Meier, W., Todo, Y., Wang, Q.: Modeling for three-subset division property without unknown subset. vol. 34, pp. 1–69. Springer, (2021) Hao, Y., Leander, G., Meier, W., Todo, Y., Wang, Q.: Modeling for three-subset division property without unknown subset. vol. 34, pp. 1–69. Springer, (2021)
11.
Zurück zum Zitat Eskandari, Z., Kidmose, A.B., Kölbl, S., Tiessen, T.: Finding integral distinguishers with ease. In International Conference on Selected Areas in Cryptography, pp. 115–138. Springer, (2018) Eskandari, Z., Kidmose, A.B., Kölbl, S., Tiessen, T.: Finding integral distinguishers with ease. In International Conference on Selected Areas in Cryptography, pp. 115–138. Springer, (2018)
12.
Zurück zum Zitat Hu, K., Sun, S., Wang, M., Wang, Q.: An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 446–476. Springer, (2020) Hu, K., Sun, S., Wang, M., Wang, Q.: An algebraic formulation of the division property: revisiting degree evaluations, cube attacks, and key-independent sums. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 446–476. Springer, (2020)
13.
Zurück zum Zitat Sun, L., Wang, W., Wang, M.Q.: Milp-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Inf. Secur. 14(1), 12–20 (2019)CrossRef Sun, L., Wang, W., Wang, M.Q.: Milp-aided bit-based division property for primitives with non-bit-permutation linear layers. IET Inf. Secur. 14(1), 12–20 (2019)CrossRef
14.
Zurück zum Zitat Derbez, P., Fouque, P.-A.: Increasing precision of division property. IACR Trans. Symmetr. Cryptol. 173–194 (2020) Derbez, P., Fouque, P.-A.: Increasing precision of division property. IACR Trans. Symmetr. Cryptol. 173–194 (2020)
15.
Zurück zum Zitat Khalesi, A., Ahmadian, Z.: Integral analysis of saturnin using bit-based division property. In 2021 18th International ISC Conference on Information Security and Cryptology (ISCISC), pp. 63–67. IEEE, (2021) Khalesi, A., Ahmadian, Z.: Integral analysis of saturnin using bit-based division property. In 2021 18th International ISC Conference on Information Security and Cryptology (ISCISC), pp. 63–67. IEEE, (2021)
16.
Zurück zum Zitat Bellizia, D., Berti, F., Bronchain, O., Cassiers, G., Duval, S., Guo, C., Leander, G., Leurent, G., Levi, I., Momin, C., et al.: Spook: sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher. IACR Trans. Symmetr. Cryptol. 2020, 295–349 (2020)CrossRef Bellizia, D., Berti, F., Bronchain, O., Cassiers, G., Duval, S., Guo, C., Leander, G., Leurent, G., Levi, I., Momin, C., et al.: Spook: sponge-based leakage-resistant authenticated encryption with a masked tweakable block cipher. IACR Trans. Symmetr. Cryptol. 2020, 295–349 (2020)CrossRef
17.
Zurück zum Zitat Sun, S., Hu, L., Wang, P., Qiao, K., Ma, X., Song, L.: Automatic security evaluation and (related-key) differential characteristic search: application to simon, present, lblock, des (l) and other bit-oriented block ciphers. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 158–178. Springer, (2014) Sun, S., Hu, L., Wang, P., Qiao, K., Ma, X., Song, L.: Automatic security evaluation and (related-key) differential characteristic search: application to simon, present, lblock, des (l) and other bit-oriented block ciphers. In International Conference on the Theory and Application of Cryptology and Information Security, pp. 158–178. Springer, (2014)
18.
Zurück zum Zitat Optimization, G.: LLC. Gurobi Optimizer Reference Manual, (2021) Optimization, G.: LLC. Gurobi Optimizer Reference Manual, (2021)
19.
Zurück zum Zitat Bisschop, J.: AIMMS optimization modeling. Lulu. com, (2006) Bisschop, J.: AIMMS optimization modeling. Lulu. com, (2006)
20.
Zurück zum Zitat Wu, W., Zhang, L.: Lblock: a lightweight block cipher. In International conference on applied cryptography and network security, pp. 327–344. Springer, (2011) Wu, W., Zhang, L.: Lblock: a lightweight block cipher. In International conference on applied cryptography and network security, pp. 327–344. Springer, (2011)
21.
Zurück zum Zitat Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: a lightweight block cipher for multiple platforms. In International Conference on Selected Areas in Cryptography, pp. 339–354. Springer, (2012) Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: a lightweight block cipher for multiple platforms. In International Conference on Selected Areas in Cryptography, pp. 339–354. Springer, (2012)
22.
Zurück zum Zitat Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In Proceedings of the 52nd Annual Design Automation Conference, pp. 1–6. (2015) Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L.: The simon and speck lightweight block ciphers. In Proceedings of the 52nd Annual Design Automation Conference, pp. 1–6. (2015)
23.
Zurück zum Zitat Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C: Present: an ultra-lightweight block cipher. In International workshop on cryptographic hardware and embedded systems, pp. 450–466. Springer, (2007) Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C: Present: an ultra-lightweight block cipher. In International workshop on cryptographic hardware and embedded systems, pp. 450–466. Springer, (2007)
24.
Zurück zum Zitat Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: Gift: a small present. In International Conference on cryptographic hardware and embedded systems, pp. 321–345. Springer, (2017) Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: Gift: a small present. In International Conference on cryptographic hardware and embedded systems, pp. 321–345. Springer, (2017)
Metadaten
Titel
Provably minimum data complexity integral distinguisher based on conventional division property
verfasst von
Akram Khalesi
Zahra Ahmadian
Publikationsdatum
28.09.2023
Verlag
Springer Paris
Erschienen in
Journal of Computer Virology and Hacking Techniques / Ausgabe 1/2024
Elektronische ISSN: 2263-8733
DOI
https://doi.org/10.1007/s11416-023-00502-0

Weitere Artikel der Ausgabe 1/2024

Journal of Computer Virology and Hacking Techniques 1/2024 Zur Ausgabe

Premium Partner