Affiliation:
1. The Affiliated Institute of Electronics and Telecommunications Research Institute, Daejeon 34044, Republic of Korea
Abstract
CHAM is a family of lightweight block ciphers designed for resource-constrained environments like IoT devices and embedded systems, which require low power consumption and high performance. Despite numerous cryptanalytic evaluations, the security of CHAM remains robust. Differential–linear cryptanalysis, a method that combines two of the strongest attack methods on block ciphers—differential cryptanalysis and linear cryptanalysis—has been successfully applied to many block ciphers. This study introduces the first concrete differential–linear approximations of CHAM, marking a significant advancement in the cryptanalysis of this cipher family. Utilizing a Boolean satisfiability problem framework, we present a 46-round differential–linear approximation of CHAM-64/128 with a correlation of 2−31.08 and a 58-round approximation for CHAM-128/128 and CHAM-128/256 with correlations of 2−58.86 and 2−59.08, respectively. These findings significantly exceed the designers’ expectations for differential–linear approximations using CHAM. Furthermore, the 46-round differential–linear approximation of CHAM-64/128 is the best distinguisher of CHAM-64/128 to date in a single-key attack model. Notably, our findings do not threaten the security of CHAM but provide deeper insights into its cryptanalytic resistance.
Funder
Institute of Information & communications Technology Planning & Evaluation (IITP) grant funded by the Korea government
Reference35 articles.
1. Koo, B., Roh, D., Kim, H., Jung, Y., Lee, D.G., and Kwon, D. (December, January 29). CHAM: A family of lightweight block ciphers for resource-constrained devices. Proceedings of the Information Security and Cryptology–ICISC 2017: 20th International Conference, Seoul, Republic of Korea. Revised Selected Papers 20.
2. Roh, D., Koo, B., Jung, Y., Jeong, I.W., Lee, D.G., Kwon, D., and Kim, W.H. (2019, January 4–6). Revised version of block cipher CHAM. Proceedings of the Information Security and Cryptology–ICISC 2019: 22nd International Conference, Seoul, Republic of Korea. Revised Selected Papers 22.
3. Hao, F., Ruj, S., and Sen Gupta, S. (2019). Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications. Progress in Cryptology—INDOCRYPT 2019, Springer.
4. Validity of Differential Characteristics of ARX Block Ciphers;Roh;IEEE Access,2023
5. Automatic search for the linear (hull) characteristics of ARX ciphers: Applied to SPECK, SPARX, CHASKEY, and CHAM-64;Huang;Secur. Commun. Netw.,2020