Author:
Dutta Pranjal,Rajasree Mahesh Sreekumar,Sarkar Santanu
Abstract
AbstractIn this paper, we study NIST lightweight 3rd round candidate $$\text{ TinyJAMBU }$$
TinyJAMBU
. The core component of $$\text{ TinyJAMBU }$$
TinyJAMBU
is the keyed permutation $$\mathcal {P}_n$$
P
n
, which is based on a non-linear feedback shift register. By analysing this permutation carefully, we are able to find good cubes that are used to build distinguishers in the weak-key setting. In particular, we show that there are at least $$2^{108}$$
2
108
keys for which TinyJAMBU can be distinguished from a random source for up to 476 rounds. These distinguishers outperform the best-known distinguishers, which were proposed in ‘Scientific Reports - Nature’ by Teng et al. We are the first to study the exact degree of the feedback polynomial $$\mathcal {P}_n$$
P
n
in the nonce variables. This helped us in concluding that $$\text{ TinyJAMBU }$$
TinyJAMBU
with more than 445 rounds is secure against distinguishers using 32 sized cubes in the normal setting. Finally, we give new key-recovery attacks against $$\text{ TinyJAMBU }$$
TinyJAMBU
using the concepts of monomial trail presented by Hu et al. at ASIACRYPT 2020. Our attacks are unlikely to jeopardise the security of the entire 640 rounds $$\text{ TinyJAMBU }$$
TinyJAMBU
, but we strongly anticipate that they will shed new lights on the cipher’s security.
Funder
Google Ph. D. Fellowship
Prime Minister’s Research Fellowship
Publisher
Springer Science and Business Media LLC
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献