TY - JOUR
T1 - Generalized related-key rectangle attacks on block ciphers with linear key schedule
T2 - applications to SKINNY and GIFT
AU - Zhao, Boxin
AU - Dong, Xiaoyang
AU - Meier, Willi
AU - Jia, Keting
AU - Wang, Gaoli
N1 - Publisher Copyright:
© 2020, Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2020/6/1
Y1 - 2020/6/1
N2 - This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2 331 to 2 294. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2 123 and a data complexity of 2 123 chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 2 91.58, while the best previous attack on GIFT-64 only reaches 23 rounds at most.
AB - This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2 331 to 2 294. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2 123 and a data complexity of 2 123 chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 2 91.58, while the best previous attack on GIFT-64 only reaches 23 rounds at most.
KW - GIFT
KW - Key recovery
KW - Rectangle attack
KW - Related-key
KW - SKINNY
KW - SKINNY AEAD
UR - https://www.scopus.com/pages/publications/85079698177
U2 - 10.1007/s10623-020-00730-1
DO - 10.1007/s10623-020-00730-1
M3 - 文章
AN - SCOPUS:85079698177
SN - 0925-1022
VL - 88
SP - 1103
EP - 1126
JO - Designs, Codes, and Cryptography
JF - Designs, Codes, and Cryptography
IS - 6
ER -