Skip to main content

Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARP

  • Conference paper
  • First Online:
Selected Areas in Cryptography (SAC 2022)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 13742))

Included in the following conference series:

  • 13 Accesses

Abstract

This paper presents a heuristic approach to searching the key recovery-friendly distinguishers for block ciphers, which aims to attack more rounds with lower complexities. Firstly, we construct an SAT model to search for a set of distinguishers with the minimum number of active input-output words (and optimal probability). Subsequently, based on the discovered distinguishers, we select the advantageous distinguisher with fewer key bits involved in the key recovery phase. Finally, the guess-and-check for the key recovery attack is performed using the manual approach to compute the attack parameters accurately. By applying our new technique to \(\texttt{WARP}\) proposed in SAC 2020, we identify some 19-round and 20-round advantageous differentials. Simultaneously, the high-probability chain of Sbox leads to a stronger clustering effect of the differential trails for \(\texttt{WARP}\), so we effectively improve the probability of the advantageous distinguisher. Also, the first 25-round differential attacks are performed by extending a 19-round distinguisher and a 20-round distinguisher, respectively. The results cover 2 more rounds than the previous known differential attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 74.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/msoos/cryptominisat.

  2. 2.

    https://web.archive.org/web/20131022021257/http:/www.sontrak.com/.

  3. 3.

    https://github.com/stp/stp.

  4. 4.

    http://www.gurobi.com.

References

  1. Banik, S., et al.: WARP: Revisiting GFN for lightweight 128-bit block cipher. In: Dunkelman, O., Jr., M.J.J., O’Flynn, C. (eds.) SAC 2020. LNCS, vol. 12804, pp. 535–564. Springer, Heidelberg (2020). https://doi.org/10.1007/978-3-030-81652-0_21

  2. Banik, S., et al.: Midori: a block cipher for low energy. In: Iwata, T., Cheon, J.H. (eds.) ASIACRYPT 2015. LNCS, vol. 9453, pp. 411–436. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-030-81652-0_21

  3. Banik, S., Pandey, S.K., Peyrin, T., Sasaki, Y., Sim, S.M., Todo, Y.: GIFT: a small present - towards reaching the limit of lightweight encryption. In: Fischer, W., Homma, N. (eds.) CHES 2017. LNCS, vol. 10529, pp. 321–345. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-319-66787-4_16

  4. Beierle, C., et al.: The SKINNY family of block ciphers and its low-latency variant MANTIS. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9815, pp. 123–153. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53008-5_5

  5. Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO’90. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1990). https://doi.org/10.1007/BF00630563

  6. Hadipour, H., Bagheri, N., Song, L.: Improved rectangle attacks on SKINNY and CRAFT. IACR Trans. Symm. Cryptol. 2021(2), 140–198 (2021)

    Article  Google Scholar 

  7. Hadipour, H., Eichlseder, M.: Integral cryptanalysis of WARP based on monomial prediction. IACR Trans. Symm. Cryptol. 2022(2), 92–112 (2022)

    Article  Google Scholar 

  8. Kölbl, S., Leander, G., Tiessen, T.: Observations on the SIMON block cipher family. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9215, pp. 161–185. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47989-6_8

  9. Kumar, M., Yadav, T.: MILP based differential attack on round reduced WARP. In: Batina, L., Picek, S., Mondal, M. (eds.) SPACE 2021. LNCS, vol. 13162, pp. 42–59. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-95085-9_3

  10. Lallemand, V., Minier, M., Rouquette, L.: Automatic search of rectangle attacks on feistel ciphers: application to WARP. IACR Trans. Symm. Cryptol. 2022(2), 113–140 (2022)

    Article  Google Scholar 

  11. Liu, Y., Wang, Q., Rijmen, V.: Automatic search of linear trails in ARX with applications to SPECK and chaskey. In: Manulis, M., Sadeghi, A., Schneider, S.A. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 485–499. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-319-39555-5_26

  12. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT ’93. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1993). https://doi.org/10.1007/3-540-48285-7_33

  13. Mouha, N., Wang, Q., Gu, D., Preneel, B.: Differential and linear cryptanalysis using mixed-integer linear programming. In: Wu, C., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 57–76. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-34704-7_5

  14. Qin, L., Dong, X., Wang, X., Jia, K., Liu, Y.: Automated search oriented to key recovery on ciphers with linear key schedule applications to boomerangs in SKINNY and forkskinny. IACR Trans. Symm. Cryptol. 2021(2), 249–291 (2021)

    Article  Google Scholar 

  15. Sinz, C.: Towards an optimal CNF encoding of boolean cardinality constraints. In: van Beek, P. (ed.) CP 2005. LNCS, vol. 3709, pp. 827–831. Springer, Heidelberg (2005). https://doi.org/10.1007/11564751_73

  16. Sun, L., Wang, W., Wang, M.: Accelerating the search of differential and linear characteristics with the SAT method. IACR Trans. Symm. Cryptol. 2021(1), 269–315 (2021)

    Article  Google Scholar 

  17. Sun, L., Wang, W., Wang, M.: Improved attacks on GIFT-64. In: AlTawy, R., Hülsing, A. (eds.) SAC 2021. LNCS, vol. 13203, pp. 246–265. Springer, Heidelberg (2021). DOI: https://doi.org/10.1007/11564751_73

  18. Sun, S., Gérault, D., Lafourcade, P., Yang, Q., Todo, Y., Qiao, K., Hu, L.: Analysis of aes, skinny, and others with constraint programming. IACR Trans. Symm. Cryptol. 2017(1), 281–306 (2017)

    Article  Google Scholar 

  19. Sun, S., Hu, L., Wang, P., Qiao, K., Ma, X., Song, L.: Automatic security evaluation and (related-key) differential characteristic search: Application to simon, present, lblock, DES(L) and other bit-oriented block ciphers. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8873, pp. 158–178. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45611-8_9

  20. Suzaki, T., Minematsu, K., Morioka, S., Kobayashi, E.: Twine: a lightweight block cipher for multiple platforms. In: Knudsen, L.R., Wu, H. (eds.) SAC 2012. LNCS, vol. 7707, pp. 339–354. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35999-6_22

  21. Teh, J.S., Biryukov, A.: Differential cryptanalysis of WARP. IACR Cryptol. ePrint Arch., p. 1641 (2021)

    Google Scholar 

  22. Todo, Y., Sasaki, Y.: Designing s-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR. In: AlTawy, R., Hülsing, A. (eds.) SAC 2021. LNCS, vol. 13203, pp. 179–199. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-99277-4_9

  23. Zong, R., Dong, X., Chen, H., Luo, Y., Wang, S., Li, Z.: Towards key-recovery-attack friendly distinguishers: application to GIFT-128. IACR Trans. Symm. Cryptol. 2021(1), 156–184 (2021)

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the reviewers for their valuable comments. This work is supported by the National Natural Science Foundation of China (No. 61702537, No. 62172427).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guoqiang Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shi, J., Liu, G., Li, C. (2024). Improved the Automated Evaluation Algorithm Against Differential Attacks and Its Application to WARP. In: Smith, B., Wu, H. (eds) Selected Areas in Cryptography. SAC 2022. Lecture Notes in Computer Science, vol 13742. Springer, Cham. https://doi.org/10.1007/978-3-031-58411-4_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-58411-4_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-58410-7

  • Online ISBN: 978-3-031-58411-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics