http://iet.metastore.ingenta.com
1887

MILP-aided bit-based division property for primitives with non-bit-permutation linear layers

MILP-aided bit-based division property for primitives with non-bit-permutation linear layers

For access to this article, please select a purchase option:

Buy article PDF
$19.95
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Information Security — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

In this study, the authors settle the feasibility of mixed integer linear programming (MILP)-aided bit-based division property for ciphers with non-bit-permutation linear layers. First, they transform the complicated linear layers to their primitive representations. Then, the original Copy and exclusive OR models are generalised, and these models are exploited to depict the primitive representations. Accord- ingly, the MILP-aided bit-based division property can be applied to much more primitives with complicated linear layers. As an illus- tration, they rst evaluate the bit-based division properties of some word-oriented block ciphers. For Midori64, they obtain a 7-round integral distinguisher, which achieves one more round than the previous results. At the same time, the data requirements of some existing distinguishers are also reduced. They decrease the data complexities of 4-round and 5-round distinguishers for LED and Joltik-BC by half. Then, the bit-based division properties of some bit-oriented ciphers such as Serpent and Noekeon are considered. The data complexities of their distinguishers for short rounds are reduced. Besides, they evaluate the bit-based division properties of the internal permutations in some hash functions. An 18-round zero-sum distinguisher for SPONGENT-88 is proposed, which achieves four more rounds than the previous ones. Some integral distinguishers for PHOTON permutations are improved.

References

    1. 1)
      • 1. Daemen, J., Knudsen, L.R., Rijmen, V.: ‘The block cipher square’. Fourth Int. workshop Fast Software Encryption, FSE ‘97, Haifa, Israel, 20–22 January 1997, pp. 149165.
    2. 2)
      • 2. Z'aba, M.R., Raddum, H., Henricksen, M., et al: ‘Bit-pattern based integral attack’. 15th Int. Workshop Fast Software Encryption, FSE 2008, Lausanne, Switzerland, 10–13 February 2008, pp. 363381.
    3. 3)
      • 3. Daemen, J., Peeters, M., Van Assche, G., et al: ‘Nessie proposal: Noekeon’. First Open NESSIE Workshop, 2000, pp. 213230.
    4. 4)
      • 4. Bogdanov, A., Knudsen, L. R., Leander, G., et al: ‘PRESENT: an ultra-lightweight block cipher’. Ninth Int. Workshop Cryptographic Hardware and Embedded Systems – CHES 2007, Vienna, Austria, 10–13 September 2007, pp. 450466.
    5. 5)
      • 5. Biham, E., Anderson, R.J., Knudsen, L.R.: ‘Serpent: a new block cipher proposal’. Fast Software Encryption, Fifth Int. Workshop FSE ‘98, Paris, France, 23–25 March 1998, pp. 222238.
    6. 6)
      • 6. Todo, Y.: ‘Structural evaluation by generalized integral property’. Advances in Cryptology – EUROCRYPT 2015–34th Annual Int. Conf. Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26–30 April 2015, pp. 287314.
    7. 7)
      • 7. Todo, Y.: ‘Integral cryptanalysis on full MISTY1’. Proc. Part I Advances in Cryptology – CRYPTO 2015–35th Annual Cryptology Conf., Santa Barbara, CA, USA, 16–20 August 2015, vol. 2015, pp. 413432.
    8. 8)
      • 8. Matsui, M.: ‘New block encryption algorithm MISTY’. Fourth Int. Workshop Fast Software Encryption FSE ‘97, Haifa, Israel, 20–22 January 1997, pp. 5468.
    9. 9)
      • 9. Todo, Y., Morii, M.: ‘Bit-based division property and application to SIMON family’. 23rd Int. Conf. Fast Software Encryption – FSE 2016, Bochum, Germany, 20–23 March 2016, pp. 357377.
    10. 10)
      • 10. Beaulieu, R., Shors, D., Smith, J., et al: ‘The SIMON and SPECK lightweight block ciphers’. Proc. 52nd Annual Design Automation Conf., San Francisco, CA, USA, 7–11 June 2015, pp. 16.
    11. 11)
      • 11. Boura, C., Canteaut, A.: ‘Another view of the division property’. Advances in Cryptology – CRYPTO 2016–36th Annual Int. Cryptology Conf., Santa Barbara, CA, USA, 14–18 August 2016, pp. 654682.
    12. 12)
      • 12. Sun, L., Wang, M.: ‘Towards a further understanding of bit-based division property’, IACR Cryptology ePrint Archive, 2016o:392.
    13. 13)
      • 13. Zhang, W., Bao, Z., Lin, D., et al: ‘RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms’, Sci. China Inf. Sci., 2015, 58, (12), pp. 115.
    14. 14)
      • 14. Bogdanov, A., Knezevic, M., Leander, G., et al: ‘SPONGENT: the design space of lightweight cryptographic hashing’, IEEE Trans. Comput., 2013, 62, (10), pp. 20412053.
    15. 15)
      • 15. Xiang, Z., Zhang, W., Bao, Z., et al: ‘Applying MILP method to searching integral distinguishers based on division property for 6 lightweight block ciphers’. Advances in Cryptology – ASIACRYPT 2016–22nd Int. Conf. Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, 4–8 December 2016, pp. 648678.
    16. 16)
      • 16. Yang, G., Zhu, B., Suder, V., et al: ‘The Simeck family of lightweight block ciphers’. Cryptographic Hardware and Embedded Systems – CHES 2015–17th Int. Workshop, Saint-Malo, France, 13–16 September 2015, pp. 307329.
    17. 17)
      • 17. Wu, W., Zhang, L.: ‘LBlock: a lightweight block cipher’. Ninth Int. Conf. Applied Cryptography and Network Security – ACNS 2011, Nerja, Spain, 7–10 June 2011, pp. 327344.
    18. 18)
      • 18. Suzaki, T., Minematsu, K., Morioka, S., et al: ‘TWINE: a lightweight block cipher for multiple platforms’. 19th Int. Conf. Selected Areas in Cryptography SAC 2012, Windsor, ON, Canada, 15–16 August 2012, pp. 339354.
    19. 19)
      • 19. Banik, S., Bogdanov, A., Isobe, T., et al: ‘Midori A block cipher for low energy’. Advances in Cryptology – ASIACRYPT 2015–21st Int. Conf. Theory and Application of Cryptology and Information Security, Auckland, New Zealand, 29 November–3 December 2015, pp. 411436.
    20. 20)
      • 20. Guo, J., Peyrin, T., Poschmann, A., et al: ‘The LED block cipher’. Cryptographic Hardware and Embedded Systems – CHES 2011–13th Int. Workshop, Nara, Japan, 28 September–1 October 2011, pp. 326341.
    21. 21)
      • 21. Jean, J., Nikolić, I., Peyrin, T.: ‘Joltik v1. 3’, CAESAR Round, 2, 2015.
    22. 22)
      • 22. NIST FIPS Pub. 197.: ‘Advanced encryption standard (AES)’, Fed. Inf. Process. Stand. Publ., 2001, 197, (441), pp. 151.
    23. 23)
      • 23. Guo, J., Peyrin, T., Poschmann, A.: ‘The PHOTON family of lightweight hash functions’. Advances in Cryptology – CRYPTO 2011–31st Annual Cryptology Conf., Santa Barbara, CA, USA, 14–18 August 2011, pp. 222239.
    24. 24)
      • 24. Dong, L., Wu, W.-L., Wu, S., et al: ‘Another look at the integral attack by the higher-order differential attack’, Jisuanji Xuebao (Chin. J. Comput.), 2012, 35, (9), pp. 19061917.
    25. 25)
      • 25. Fan, S., Duan, M.: ‘Improved zero-sum distinguisher for SPONGENT-88’. Int. Conf. Electromechanical Control Technology and Transportation – ICECTT 2015 – Zhuhai City, Guangdong Province, China, 31 October–1 November 2015, pp. 582587.
    26. 26)
      • 26. Boura, C., Canteaut, A., Cannière, C.D.: ‘Higher-order differential properties of Keccak and Luffa’. Fast Software Encryption – 18th Int. Workshop FSE 2011, Lyngby, Denmark, 13–16 February 2011, pp. 252269.
    27. 27)
      • 27. Sun, S., Hu, L., Wang, M., et al: ‘Towards finding the best characteristics of some bit-oriented block ciphers and automatic enumeration of (related-key) differential and linear characteristics with predefined properties’, Technical Report Cryptology ePrint Archive, Report 2014/747, 2014.
    28. 28)
      • 28. Sun, B., Liu, Z., Rijmen, V., et al: ‘Links among impossible differential, integral and zero correlation linear cryptanalysis’. Advances in Cryptology – CRYPTO 2015–35th Annual Cryptology Conf., Santa Barbara, CA, USA, 16–20 August 2015, pp. 95115.
    29. 29)
      • 29. Sun, L., Wang, W., Wang, M.: ‘MILP-aided bit-based division property for primitives with non-bit-permutation linear layers’, IACR Cryptology ePrint Archive, 2016o:811.
    30. 30)
      • 30. Knudsen, L.R., Wagner, D.: ‘Integral cryptanalysis’. Ninth Int. Workshop Fast Software Encryption FSE 2002, Leuven, Belgium, 4–6 February 2002, vol. 2002, pp. 112127.
    31. 31)
      • 31. Todo, Y., Isobe, T., Hao, Y., et al: ‘Cube attacks on non-blackbox polynomials based on division property’. Advances in Cryptology – CRYPTO 2017–37th Annual Int. Cryptology Conf., Santa Barbara, CA, USA, Leuven, Belgium, 20–24 August 2017, pp. 250279.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-ifs.2018.5283
Loading

Related content

content/journals/10.1049/iet-ifs.2018.5283
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address