Affiliation:
1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences , Beijing 100093 , China
2. School of Cyber Security, University of Chinese Academy of Sciences , Beijing 100049 , China
Abstract
Abstract
In truncated differential cryptanalysis of symmetric primitives, a generalized framework is to search a distinguisher concerning part of output differences, like truncated differential distribution (TDD) on certain bits (e.g. a nibble) first, and then append several rounds before and after it to recover the secret key. The logarithmic likelihood ratio statistic with respect to the TDD is usually used to distinguish guessed key bits. In this paper, we study how to improve the effect of truncated differential cryptanalysis by considering key schedules of the attacked ciphers. It turns out that for a cipher with a simple key schedule, certain guessed subkey bits may reveal information of the master key, which will help build a stronger TDD distinguisher and reduce the key recovery complexity or attack more rounds. As a result, we explore heuristic techniques to search key-recovery-friendly TDDs and construct automatic search models based on MILP. The refined methods are applied to two recent designs of symmetric primitives, WARP and Orthros, together with peculiarities of their structures as well. For WARP, after making two observations on relations between certain differences with key bits, we propose an algorithm that can find TDDs with low complexities and having potentialities to cover more rounds. Consequently, we launch key recovery attacks on 24 to 27 rounds of WARP. When it comes to Orthros, we present a two-step search algorithm to balance the number of guessed key bits and TDDs, obtaining a key recovery attack on a 7-round variant of it in the weak-key setting. Finally, we perform several verification experiments on round-reduced versions of WARP and Orthros, and the experimental results are consistent with the theoretical distributions and the analysis of generalized key recovery attack framework.
Funder
National Natural Science Foundation of China
Climbing Program from Institute of Information Engineering CAS
Publisher
Oxford University Press (OUP)
Reference29 articles.
1. KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers;Cannière,2009
2. The LED block cipher;Guo,2011
3. Midori: A block cipher for low energy;Banik,2015
4. GIFT: A small present - towards reaching the limit of lightweight encryption;Banik,2017
5. CRAFT: lightweight tweakable block cipher with efficient protection against DFA attacks;Beierle;IACR Trans. Symmetric Cryptol.,2019