Abstract
In January 2016, a new standard for symmetric block encryption was established in the Russian Federation. The standard contains two encryption algorithms: Magma and Kuznyechik. In this paper we propose to consider the possibility of applying the algebraic analysis method to these ciphers. To do this, we use the simplified algorithms Magma ⊕ and S-KN2. To solve sets of nonlinear Boolean equations, we choose two different approaches: a reduction and solving of the Boolean satisfiability problem (by using the CryptoMiniSat solver) and an extended linearization method (XL). In our research, we suggest using a security assessment approach that identifies the resistance of block ciphers to algebraic cryptanalysis. The algebraic analysis of an eight-round Magma (68 key bits were fixed) with the CryptoMiniSat solver demanded four known text pairs and took 3029.56 s to complete (the search took 416.31 s). The algebraic analysis of a five-round Magma cipher with weakened S-boxes required seven known text pairs and took 1135.61 s (the search took 3.36 s). The algebraic analysis of a five-round Magma cipher with disabled S-blocks (equivalent value substitution) led to getting only one solution for five known text pairs in 501.18 s (the search took 4.92 s). The complexity of the XL algebraic analysis of a four-round S-KN2 cipher with three text pairs was 236.33 s (took 1.191 Gb RAM).
Subject
Applied Mathematics,Modeling and Simulation,General Computer Science,Theoretical Computer Science
Reference44 articles.
1. Algebraic Complexity Reduction and Cryptanalysis of GOST
http://www.nicolascourtois.com/papers/gostac11.pdf
2. Communication Theory of Secrecy Systems*
3. Algebraic Attack Efficiency Versus S-Box Representation
https://eprint.iacr.org/2017/007.pdf
4. Cryptographic Properties of Addition Modulo 2n
https://eprint.iacr.org/2016/181.pdf
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. On Inequalities Between Convex, Concave, and Multilinear Continuations of Boolean Functions;Keldysh Institute Preprints;2024
2. Algebraic Attack on 2-Round SMALLPRESENT-[2] Algorithm;2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs);2023-08-22
3. Gost R 34.12-2015 (Kuznechik) analysis of a cryptographic algorithm;NOVEL TRENDS IN RHEOLOGY IX;2023
4. Atomic Formulation of the Boolean Curve Fitting Problem;International Journal of Mathematical, Engineering and Management Sciences;2022-10-01
5. Application of the algebraic cryptanalysis method to the Kuznyechik encryption algorithm;2021 International Conference on Information Science and Communications Technologies (ICISCT);2021-11-03