Cryptanalysis of the XO-64 Suitable for Wireless Systems
- 76 Downloads
Abstract
Data-dependent operations (DDOs) that were introduced by Moldovyan in 2003 (Moldovyan in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int J Netw Secur 2(2):114–225, 6, in Proceedings of CCCT04, VII:123–128, 7), have been proposed as a primitive suitable for designing efficient ciphers with simple key scheduling. DDOs solve problems arising due to the weaknesses in key change process, and also the DDO-based ciphers provide a better performance with smaller hardware requirement for implementation. Along with Eagle-64 (Moldovyan et al. 7), Eagle-128 (Moldovyan et al. 6), MD-64 (Minh et al. in Int J Comput Sci Netw Secur 10(3):54–60, 15), KT-64 (Minh et al. in IJCSNS 19(1):10–18, 13) … block ciphers are being designed, XO-64 (Minh et al. in Advanced Technologies for Communications, ATC, 409–412, 1) is a block cipher of this type which is better in terms of applicability, flexibility in fast and efficient wireless system, as well as security against known attack methods, such as slide attack and differential attack. In this paper, by applying a way of related-key attacks, we present the possibility to break the XO-64 cipher with high probability. We propose a related-key amplified boomerang attack using the differential characteristics on a 7-round reduced XO-64, requiring complexities of 244 in data, 247 bytes in memory, and 265 in computational time. This study can be considered as the first cryptographic result on XO-64.
Keywords
Wireless system Security Cryptography Block cipher XO-64 Cryptanalysis Related-key amplified boomerang attackNotes
Compliance with ethical standards
Conflict of interest
The researcher claims no conflict of interest.
References
- 1.Biham, E., & Shamir, A. (1993). Differential cryptanalysis of the data encryption standard. New York: Springer.CrossRefMATHGoogle Scholar
- 2.Biham, E., Dunkelman, O., & Keller, N. (2005). Related-key boomerang and rectangle attacks. In: Advances in cryptology—EUROCRYPT’05, LNCS (Vol. 3494, pp. 507–525) Springer.Google Scholar
- 3.Goots, N., Izotov, B., Moldovyan, A., & Moldovyan, N. (2003). Modern cryptography: Protect your data with fast block ciphers. Wayne: A-LIST Publish.Google Scholar
- 4.Izotov, B. V., Moldovyan, N., Moldovyan, A. (2001). Controlled operations as a cryptographic primitive. In Information assurance in computer networks (Vol. 2052, pp. 230–241). Berlin, Springer.Google Scholar
- 5.Jeong, K., Lee, C., Kim, J., & Hong, S. (2009). Security analysis of the SCO-family using key schedules. Information Sciences, 179, 4232–4242.MathSciNetCrossRefGoogle Scholar
- 6.Kang, J., Jeong, K., Hong, S., & Lee, C. (2013). Related-key amplified boomerang attacks on KT-64 and MD-64 suitable for wireless sensor networks. Sensor Letters, 11(9), 1765–1770.CrossRefGoogle Scholar
- 7.Kang, J., Jeong, K., Lee, C., & Hong, S. (2014). Distinguishing attack on SDDO-based block cipher BMD-128. Ubiquitous Information Technologies and Applications, CUTE, 280, 595–602.CrossRefGoogle Scholar
- 8.Kang, J., Jeong, K., Yeo, S., Lee, C. (2012). Related-key attack on the MD-64 block cipher suitable for pervasive computing environment. In Proceedings of international conference on advance information networking and application workshops, No. 26, pp. 726–731.Google Scholar
- 9.Kelsey, J., Kohno, T., Schneier, B. (2000). Amplified boomerang attacks against reduced-round MARS and serpent. In Proceedings of fast software encryption 7, lecture notes in computer science 1978 (pp. 75–93). Springer.Google Scholar
- 10.Ko, Y., Lee, C., Hong, S., Sung, J., & Lee, S. (2004). Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H. In Indocrypt’04, LNCS 3348 (pp. 191–205). Springer.Google Scholar
- 11.Lee, C., Kim, J., Sung, J., Hong, S., & Lee, S. (2008). Security analysis of the full-round DDO-64 block cipher. The Journal of Systems and Software, 84(12), 2328–2335.CrossRefGoogle Scholar
- 12.Lee, C., Kim, J., Sung, J., Hong, S., Lee, S., & Moon, D. (2010). Related-key differential attacks on Cobra-H64 and Cobra-H128. In CCC 2005, LNCS 3796 (pp. 201–219). Springer.Google Scholar
- 13.Minh, N., Bac, D., & Duy, H. (2010). New SDDO-based block cipher for wireless sensor network security. International Journal of Computer Science and Network Security, 10(3), 54–60.Google Scholar
- 14.Minh, N., Luan, N., & Dung, L. (2010). KT-64: A new block cipher suitable to efficient FPGA implementation. IJCSNS, 19(1), 10–18.Google Scholar
- 15.Minh N. H., Duy H. N., & Dung L. H. (2008). Design and estimate of a new fast block cipher for wireless communication devices.In Advanced technologies for communications, ATC, pp. 409–412.Google Scholar
- 16.Moldovyan, N., & Moldovyan, A. (2000). A rapid transformation method for the protection of information in ACSs. Avtomatika i Telemekhanika, 4, 151–165.MATHGoogle Scholar
- 17.Moldovyan, A., & Moldovyan, N. (2002). A cipher based on data-dependent permutations. Journal of Cryptology, 15(1), 61–72.MathSciNetCrossRefMATHGoogle Scholar
- 18.Moldovyan, N., & Moldovyan, A. (2008). Data-driven ciphers for fast telecommunication systems (pp. 77–185). New York, London: Auerbach Publication, Talor & Francis Group.MATHGoogle Scholar
- 19.Moldovyan, N., Moldovyan, A., Eremeev, M., & Sklavos, N. (2006). New class of cryptographic primitives and cipher design for networks security. International Journal of Network Security, 2(2), 114–225.Google Scholar
- 20.Moldovyan, N. (2003) On cipher design based on switchable controlled operations. In MMM-ACNS 2003, LNCS (Vol. 2776, pp. 316–327). Springer, Heidelberg.Google Scholar
- 21.Moldovyan, N., Moldovyan, A., Eremeev, M., Summerville, D. (2004). Wireless networks security and cipher design based on data-dependent operations: Classification of the FPGA suitable controlled elements. In Proceedings of CCCT04 (Vol. VII, pp. 123–128). Texas, USA.Google Scholar
- 22.Sklavos, N., Moldovyan, N., & Koufopavlou, O. (2005). High speed networking security: Design and implementation of two new DDP-based ciphers. Mobile Networks and Applications MONET, 25(1–2), 219–231.CrossRefGoogle Scholar
- 23.Wagner, D. (1999). The boomerang attack. In Proceedings of fast software encryption 6, lecture notes in computer science 1636 (pp. 156–170). Springer.Google Scholar