Browse > Article
http://dx.doi.org/10.3837/tiis.2019.01.024

An Upper Bound of the Longest Impossible Differentials of Several Block Ciphers  

Han, Guoyong (School of Information Science and Engineering, Shandong Normal University)
Zhang, Wenying (School of Information Science and Engineering, Shandong Normal University)
Zhao, Hongluan (School of Computer Science and Technology, Shandong Jianzhu University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.1, 2019 , pp. 435-451 More about this Journal
Abstract
Impossible differential cryptanalysis is an essential cryptanalytic technique and its key point is whether there is an impossible differential path. The main factor of influencing impossible differential cryptanalysis is the length of the rounds of the impossible differential trail because the attack will be more close to the real encryption algorithm with the number becoming longer. We provide the upper bound of the longest impossible differential trails of several important block ciphers. We first analyse the national standard of the Russian Federation in 2015, Kuznyechik, which utilizes the 16-byte LFSR to achieve the linear transformation. We conclude that there is no any 3-round impossible differential trail of the Kuznyechik without the consideration of the specific S-boxes. Then we ascertain the longest impossible differential paths of several other important block ciphers by using the matrix method which can be extended to many other block ciphers. As a result, we show that, unless considering the details of the S-boxes, there is no any more than or equal to 5-round, 7-round and 9-round impossible differential paths for KLEIN, Midori64 and MIBS respectively.
Keywords
Impossible differential; SPN structure; Feistel structure; Kuznyechik; KLEIN; Midori; MIBS;
Citations & Related Records
연도 인용수 순위
  • Reference
1 E. Biham and A. Shamir, "Differential Cryptanalysis of the Data Encryption Standard," Springer-Verlag, pp. 1-151, 1993.
2 E. Biham and A. Biryukov and A. Shamir, "Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials," Advances in Cryptology - EUROCRYPT '99, Vol. 1592, pp. 12-23, 1999.
3 L.R. Knudsen, "DEAL-A 128-bit block cipher," Complexity, pp. 1-151, 1998.
4 C. Blondeau, "Impossible differential attack on 13-round Camellia-192," Information Processing Letters, Vol. 115, pp.660-666, 2015.   DOI
5 R. Li and B. Sun and C. Li, "Impossible differential cryptanalysis of SPN ciphers," IET Information Security, Vol. 5, pp. 111-120, 2011.   DOI
6 B. Sun and P. Zhang and C. Li, "Impossible Differential and Integral Cryptanalysis of Zodiac," Journal of Software, Vol. 22, pp. 1911-1917, 2011.   DOI
7 C. Du and J. Chen, "Impossible Differential Cryptanalysis of ARIA Reduced to 7 rounds," CANS, Vol.6467, pp. 20-30, 2010.
8 S. Sun and L. Hu and P. Wang, "Automatic Security Evaluation and (Related-key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES(L) and Other Bit-Oriented Block Ciphers," ASIACRYPT, Vol. 8873, pp. 158-178, 2014.
9 J. Kim and S. Hong and J. Lim, "Impossible differential cryptanalysis using matrix method," Discrete Mathematics, Vol. 310, pp. 988-1002, 2010.   DOI
10 Y. Luo and X. Lai and Z. Wu and G. Gong, "A unified method for finding impossible differentials of block cipher structures," Information Science, Vol. 263, pp. 211-220, 2014.   DOI
11 S. Wu and M. Wang, "Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers," INDOCRYPT, Vol. 7668, pp. 283-302, 2012.
12 B. Sun and Z. Liu and V. Rijmen and R. Li and L. Cheng and Q. Wang and H. AlKhzaimi and C. Li, "Links Among Impossible Differential, Integral and Zero Correlation Linear Cryptanalysis," CRYPTO, Vol.9215, pp. 95-115, 2015.
13 A. Bay and J. Nakahara and S. Vaudenay, "Cryptanalysis of reduced-round MIBS block cipher," CANS, Vol. 6467, pp. 1-19, 2010.
14 Z. Ahmadian and M. Salmasizadeh and M.R. Aref, "Biclique Cryptanalysis of the Full-Round KLEIN Block Cipher," Iet Information Security, Vol. 9, pp. 294-301, 2015.   DOI
15 S. Banik and A. Bogdanov and T. Isobe and K. Shibutani and H. Hiwatari and T. Akishita and F. Regazzoni, "Midori: A Block Cipher for Low Energy (Extended Version)," ASIACRYPT, Vol. 9453, pp. 411-436, 2015.
16 M. Zadi and B. Sadeghiyan and S. Sadeghian, "MIBS: a new lightweight block cipher," CANS, Vol. 5888, pp. 334-348, 2009.
17 Z. Chen and X. Wang, "Impossible differential cryptanalysis of midori," Cryptology ePrint Archive, Report 2016/535.
18 S. Yu and Y. Todo, "New Impossible Differential Search Tool from Design and Cryptanalysis Aspects," Vol. 2017, pp.185-215.
19 B. Sun and M. Liu and J. Guo and V. Rijmen and R. Li, "Provable Security Evaluation of Structures against Impossible Differential and Zero Correlation Linear Cryptanalysis," EUROCRYPT, Vol. 9665, pp. 196-213, 2016.
20 C. Boura and M. Naya-Plasencia and V. Suder, "Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon," ASIACRYPT, Vol. 8873, pp. 179-199, 2014.
21 "Information technology CRYPTOGRAPHIC DATA SECURITY Block ciphers," NATIONAL STANDARD OF THE RUSSIAN FEDERATION, GOST R 34.12-2015, 2015.
22 Z. Gong and S. Nikova and Y. Law, "KLEIN: A New Family of Lightweight Block Ciphers," RFIDSec, Vol. 7055, pp. 1-18, 2012.