Reference : Meet-in-the-Filter and Dynamic Counting with Applications to Speck
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
Security, Reliability and Trust
http://hdl.handle.net/10993/53222
Meet-in-the-Filter and Dynamic Counting with Applications to Speck
English
Biryukov, Alexei mailto [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS)]
Cardoso Dos Santos, Luan [University of Luxembourg > Faculty of Science, Technology and Medicine (FSTM) > Department of Computer Science (DCS) >]
Teh, Je Sen [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Cryptolux > ; Universiti Sains Malaysia]
Udovenko, Aleksei mailto [University of Luxembourg > Interdisciplinary Centre for Security, Reliability and Trust (SNT) > Cryptolux]
Velichkov, Vesselin [University of Edinburgh]
In press
Applied Cryptography and Network Security. 20th International Conference, ACNS 2022, Rome, Italy, June 20–23, 2022, Proceedings
Tibouchi, Mehdi
Wang, Xiaofeng
Springer
Yes
International
21st International Conference on Applied Cryptography and Network Security
from 19-06-2023 to 22-06-2023
Kyoto
Japan
[en] Symmetric-key ; Differential cryptanalysis ; ARX ; Speck
[en] We propose a new cryptanalytic tool for differential cryptanalysis, called meet-in-the-filter (MiF). It is suitable for ciphers with a slow or incomplete diffusion layer such as the ones based on Addition-Rotation-XOR (ARX). The main idea of the MiF technique is to stop the difference propagation earlier in the cipher, allowing to use differentials with higher probability. This comes at the expense of a deeper analysis phase in the bottom rounds possible due to the slow diffusion of the target cipher. The MiF technique uses a meet-in-the-middle matching to construct differential trails connecting the differential’s output and the ciphertext difference. The proposed trails are used in the key recovery procedure, reducing time complexity and allowing flexible time-data trade-offs. In addition, we show how to combine MiF with a dynamic counting technique for key recovery. We illustrate MiF in practice by reporting improved attacks on the ARXbased family of block ciphers Speck. We improve the time complexities of the best known attacks up to 15 rounds of Speck32 and 20 rounds of Speck64/128. Notably, our new attack on 11 rounds of Speck32 has practical analysis and data complexities of 224.66 and 226.70 respectively, and was experimentally verified, recovering the master key in a matter of seconds. It significantly improves the previous deep learning-based attack by Gohr from CRYPTO 2019, which has time complexity 238. As an important milestone, our conventional cryptanalysis method sets a new high benchmark to beat for cryptanalysis relying on machine learning.
Fonds National de la Recherche - FnR
Researchers ; Students
http://hdl.handle.net/10993/53222
https://ia.cr/2022/673
Author preprint
FnR ; FNR13641232 > Alex Biryukov > APLICA > Analysis And Protection Of Lightweight Cryptographic Algorithms > 01/01/2021 > 31/12/2023 > 2019

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
2022-673.pdfAuthor preprint1.21 MBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.