Abstract
In this research, a recently proposed lightweight block cipher LBlock, not tested against the cube attack has been analyzed. 7, 8 and 9 round LBlock have been successfully attacked with complexities of O(210.76), O(211.11) and O(247.00) respectively. For the case of side channel cube attack, full version of LBlock has been attacked using a single bit leakage model with the complexity of O(255.00) cipher evaluations. For this purpose, a generic practical platform has been developed to test various stream and block ciphers against the latest cube attack.
Chapter PDF
Similar content being viewed by others
References
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. Cryptology ePrint Archive, Report 2008/385 (2008), http://eprint.iacr.org/
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)
De Cannière, C., Preneel, B.: Trivium specifications. ECRYPT Stream Cipher Project Report 2005/030 (2005)
De Cannière, C.: Trivium: A stream cipher construction inspired by block cipher design principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171–186. Springer, Heidelberg (2006)
eSTREAM: The ecrypt stream cipher project
Vielhaber, M.: Breaking one.fivium by aida an algebraic iv differential attack. Cryptology ePrint Archive, Report 2007/413 (2007), http://eprint.iacr.org/
Vielhaber, M.: Speeding up aida the algebraic iv differential attack by the fast reed-muller transform. In: Intelligent Decision Making Systems. World Scientific Proceedings Series on Computer Engineering and Information Science, vol. 2. World Scientific Publishing Co. (2010)
Vielhaber, M.: Aida vs. trivium 793: 1152 final score 980: 1152. Eurocrypt 2009 rump session (April 2009), http://eurocrypt2009rump.cr.yp.to/
Vielhaber, M.: Aida breaks bivium (a&b) in 1 minute dual core cpu time. Cryptology ePrint Archive, Report 2009/402 (2009), http://eprint.iacr.org/
Vielhaber, M.: Shamir’s “cube attack”: A remake of aida, the algebraic iv differential attack (2009)
Zhe, S., Shi-Wu, Z., Lei, W.: Chosen iv algebraic attack on one.fivium. In: 3rd International Conference on Intelligent System and Knowledge Engineering, ISKE 2008, pp. 1427–1431 (November 2008)
Englund, H., Johansson, T., Sönmez Turan, M.: A framework for chosen IV statistical analysis of stream ciphers. In: Srinathan, K., Pandu Rangan, C., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 268–281. Springer, Heidelberg (2007)
Fischer, S., Khazaei, S., Meier, W.: Chosen IV statistical analysis for key recovery attacks on stream ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236–245. Springer, Heidelberg (2008)
Mroczkowski, P., Szmidt, J.: Corrigendum to: The cube attack on stream cipher trivium and quadraticity tests. Cryptology ePrint Archive, Report 2011/032 (2011), http://eprint.iacr.org/
Sun, S., Hu, L., Xie, Y., Zeng, X.: Cube cryptanalysis of hitag2 stream cipher. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 15–25. Springer, Heidelberg (2011)
Babbage, S., Dodd, M.: The MICKEY stream ciphers. In: Robshaw, M., Billet, O. (eds.) New Stream Cipher Designs. LNCS, vol. 4986, pp. 191–209. Springer, Heidelberg (2008)
Stefan, D.: Analysis and Implementation of ESTREAM and SHA-3 Cryptographic Algorithms. Cooper Union for the Advancement of Science and Art, Albert Nerken School of Engineering, Graduate Division (2011)
Aumasson, J.P., Dinur, I., Meier, W., Shamir, A.: Cube testers and key recovery attacks on reduced-round md6 and trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1–22. Springer, Heidelberg (2009)
Rivest, R.L., Agre, B., Bailey, D.V., Crutchfield, C., Dodis, Y., Elliott, K., Khan, F.A., Krishnamurthy, J., Lin, Y., Reyzin, L., Shen, E., Sukha, J., Sutherland, D., Tromer, E., Yin, Y.L.: The md6 hash function a proposal to nist for sha-3 (2008)
Li, S., Wang, Y., Peng, J.: Cube testers on bivium. In: 2010 International Conference on Communications and Intelligence Information Security (ICCIIS), pp. 121–124 (October 2010)
Hell, M., Johansson, T., Maximov, E., Meier, W.: A stream cipher proposal: Grain-128. In: ISIT
Aumasson, J.P., Dinur, I., Henzen, L., Meier, W., Shamir, A.: Efficient fpga implementations of high-dimensional cube testers on the stream cipher grain-128. Cryptology ePrint Archive, Report 2009/218 (2009), http://eprint.iacr.org/
Dinur, I., Shamir, A.: Breaking grain-128 with dynamic cube attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 167–187. Springer, Heidelberg (2011)
Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional differential cryptanalysis of NLFSR-based cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 130–145. Springer, Heidelberg (2010)
Dinur, I., Shamir, A.: Applying cube attacks to stream ciphers in realistic scenarios. Cryptography and Communications 4, 217–232 (2012)
Dinur, I., Shamir, A.: Side channel cube attacks on block ciphers. Cryptology ePrint Archive, Report 2009/127 (2009), http://eprint.iacr.org/
Daemen, J., Rijmen, V.: Aes proposal: Rijndael (1998)
Biham, E., Anderson, R.J., Knudsen, L.R.: Serpent: A new block cipher proposal. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 222–238. Springer, Heidelberg (1998)
De Cannière, C., Dunkelman, O., Knežević, M.: KATAN and KTANTAN — A family of small and efficient hardware-oriented block ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272–288. Springer, Heidelberg (2009)
Daemen, J., Peeters, M., Vanassche, G.: Nessie proposal: Noekeon. Submitted as an NESSIE Candidate Algorithm, http://www.cryptonessie.org
Bogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C.: PRESENT: An ultra-lightweight block cipher. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 450–466. Springer, Heidelberg (2007)
Engels, D., Saarinen, M.-J.O., Schweitzer, P., Smith, E.M.: The hummingbird-2 lightweight authenticated encryption algorithm. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 19–31. Springer, Heidelberg (2012)
Bard, G.V., Courtois, N.T., Nakahara Jr., J., Sepehrdad, P., Zhang, B.: Algebraic, AIDA/Cube and side channel analysis of KATAN family of block ciphers. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 176–196. Springer, Heidelberg (2010)
Mroczkowski, P., Szmidt, J.: The algebraic cryptanalysis of the block cipher katan32 using modofied cube attack. In: Concepts and Implementations for Innovative Military Communications (2011)
Abdul-Latip, S., Reyhanitabar, M., Susilo, W., Seberry, J.: On the security of noekeon against side channel cube attacks. In: Kwak, J., Deng, R.H., Won, Y., Wang, G. (eds.) ISPEC 2010. LNCS, vol. 6047, pp. 45–55. Springer, Heidelberg (2010)
Yang, L., Wang, M., Qiao, S.: Side channel cube attack on present. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 379–391. Springer, Heidelberg (2009)
Zhao, X., Wang, T., Guo, S.: Improved side channel cube attacks on present. Cryptology ePrint Archive, Report 2011/165 (2011), http://eprint.iacr.org/
Fan, X., Gong, G.: On the security of hummingbird-2 against side channel cube attacks. In: Armknecht, F., Lucks, S. (eds.) WEWoRC 2011. LNCS, vol. 7242, pp. 18–29. Springer, Heidelberg (2012)
Courtois, N.T.: How fast can be algebraic attacks on block ciphers? In: Online Proceedings of Dagstuhl Seminar 07021, Symmetric Cryptography, pp. 7–12 (2006)
Mroczkowski, P., Szmidt, J.: Cube attack on courtois toy cipher. Cryptology ePrint Archive, Report 2009/497 (2009), http://eprint.iacr.org/
Mroczkowski, P., Szmidt, J.: The cube attack in the algebraic cryptanalysis of ctc2. Concepts and Implementations for Innovative Military Communications (2011)
Guo, J., Peyrin, T., Poschmann, A., Robshaw, M.: The LED block cipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 326–341. Springer, Heidelberg (2011)
Yap, H., Khoo, K., Poschmann, A., Henricksen, M.: EPCBC - A block cipher suitable for electronic product code encryption. In: Lin, D., Tsudik, G., Wang, X. (eds.) CANS 2011. LNCS, vol. 7092, pp. 76–97. Springer, Heidelberg (2011)
Borghoff, J., et al.: PRINCE – A low-latency block cipher for pervasive computing applications. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 208–225. Springer, Heidelberg (2012)
Shibutani, K., Isobe, T., Hiwatari, H., Mitsuda, A., Akishita, T., Shirai, T.: Piccolo: An ultra-lightweight blockcipher. In: Preneel, B., Takagi, T. (eds.) CHES 2011. LNCS, vol. 6917, pp. 342–357. Springer, Heidelberg (2011)
Lim, C.H., Korkishko, T.: mCrypton – A lightweight block cipher for security of low-cost RFID tags and sensors. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 243–258. Springer, Heidelberg (2006)
Ojha, S.K., Kumar, N., Jain, K., Sangeeta: TWIS – A lightweight block cipher. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 280–291. Springer, Heidelberg (2009)
Izadi, M., Sadeghiyan, B., Sadeghian, S., Khanooki, H.: MIBS: A new lightweight block cipher. In: Garay, J.A., Miyaji, A., Otsuka, A. (eds.) CANS 2009. LNCS, vol. 5888, pp. 334–348. Springer, Heidelberg (2009)
Robshaw, M.J.B.: Searching for compact algorithms: cgen. In: Nguyên, P.Q. (ed.) VIETCRYPT 2006. LNCS, vol. 4341, pp. 37–49. Springer, Heidelberg (2006)
Knudsen, L., Leander, G., Poschmann, A., Robshaw, M.J.B.: PRINTcipher: A block cipher for IC-printing. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol. 6225, pp. 16–32. Springer, Heidelberg (2010)
Gong, Z., Nikova, S., Law, Y.: Klein: A new family of lightweight block ciphers. In: Juels, A., Paar, C. (eds.) RFIDSec 2011. LNCS, vol. 7055, pp. 1–18. Springer, Heidelberg (2012)
Junod, P., Vaudenay, S.: FOX: A new family of block ciphers. In: Handschuh, H., Hasan, M.A. (eds.) SAC 2004. LNCS, vol. 3357, pp. 114–129. Springer, Heidelberg (2004)
Hong, D., et al.: Hight: A new block cipher suitable for low-resource device. In: Goubin, L., Matsui, M. (eds.) CHES 2006. LNCS, vol. 4249, pp. 46–59. Springer, Heidelberg (2006)
Standaert, F.-X., Piret, G., Rouvroy, G., Quisquater, J.-J., Legat, J.-D.: ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 279–299. Springer, Heidelberg (2004)
Tripathy, S., Nandi, S.: Lcase: Lightweight cellular automata-based symmetric-key encryption (2008)
Matsui, M.: New block encryption algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 54–68. Springer, Heidelberg (1997)
Cheng, H., Heys, H.M., Wang, C.: Puffin: A novel compact block cipher targeted to embedded digital systems. In: Proceedings of the 2008 11th EUROMICRO Conference on Digital System Design Architectures, Methods and Tools, DSD 2008, pp. 383–390. IEEE Computer Society, Washington, DC (2008)
Standaert, F.X., Piret, G., Gershenfeld, N., Quisquater, J.J.: Sea: A scalable encryption algorithm for small embedded applications. In: Domingo-Ferrer, J., Posegga, J., Schreckling, D. (eds.) CARDIS 2006. LNCS, vol. 3928, pp. 222–236. Springer, Heidelberg (2006)
Wheeler, D., Needham, R.: Tea, a tiny encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363–366. Springer, Heidelberg (1995)
Shirai, T., Shibutani, K., Akishita, T., Moriai, S., Iwata, T.: The 128-bit blockcipher CLEFIA (extended abstract). In: Biryukov, A. (ed.) FSE 2007. LNCS, vol. 4593, pp. 181–195. Springer, Heidelberg (2007)
Wu, W., Zhang, L.: Lblock: A lightweight block cipher. In: Lopez, J., Tsudik, G. (eds.) ACNS 2011. LNCS, vol. 6715, pp. 327–344. Springer, Heidelberg (2011)
Liu, Y., Gu, D., Liu, Z., Li, W.: Impossible differential attacks on reduced-round Lblock. In: Ryan, M.D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 97–108. Springer, Heidelberg (2012)
Karakoç, F., Demirci, H., Harmancı, A.E.: Impossible differential cryptanalysis of reduced-round LBlock. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds.) WISTP 2012. LNCS, vol. 7322, pp. 179–188. Springer, Heidelberg (2012)
Minier, M., Naya-Plasencia, M.: A related key impossible differential attack against 22 rounds of the lightweight block cipher Lblock. Inf. Process. Lett. 112(16), 624–629 (2012)
Liu, S., Gong, Z., Wang, L.: Improved related-key differential attacks on reduced-round Lblock. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 58–69. Springer, Heidelberg (2012)
Wang, Y., Wu, W., Yu, X., Zhang, L.: Security on LBlock against biclique cryptanalysis. In: Lee, D.H., Yung, M. (eds.) WISA 2012. LNCS, vol. 7690, pp. 1–14. Springer, Heidelberg (2012)
Crowley, P.: Trivium, sse2, corepy, and the “cube attack” (December 2008), http://www.lshift.net/blog/2008/12/09/trivium-sse2-corepy-and-the-cube-attack
Corepy: Assembly programming in python, http://www.corepy.org/
Zhu, B., Yu, W., Wang, T.: A practical platform for cube-attack-like cryptanalyses. Cryptology ePrint Archive, Report 2010/644 (2010), http://eprint.iacr.org/
Zhu, B., Yu, W., Wang, T.: A practical platform for cube-attack-like cryptanalyses, http://cube-attack.appspot.com
Cryptool 2 cryptography for everybody, http://www.cryptool.org/en/cryptool2
Blum, M., Luby, M., Rubinfeld, R.: Self-testing/correcting with applications to numerical problems. In: Proceedings of the Twenty-Second Annual ACM Symposium on Theory of Computing, STOC 1990, pp. 73–83. ACM, New York (1990)
Luby, M., Mitzenmacher, M., Shokrollahi, M., Spielman, D.: Efficient erasure correcting codes. IEEE Transactions on Information Theory 47(2), 569–584 (2001)
The openmp api specification for parallel programming, http://openmp.org/wp/
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 IFIP International Federation for Information Processing
About this paper
Cite this paper
Islam, S., Afzal, M., Rashdi, A. (2013). On the Security of LBlock against the Cube Attack and Side Channel Cube Attack. In: Cuzzocrea, A., Kittl, C., Simos, D.E., Weippl, E., Xu, L. (eds) Security Engineering and Intelligence Informatics. CD-ARES 2013. Lecture Notes in Computer Science, vol 8128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40588-4_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-40588-4_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40587-7
Online ISBN: 978-3-642-40588-4
eBook Packages: Computer ScienceComputer Science (R0)