Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.5.1059

Key Recovery Attacks on Zorro Using Related-Key Differential Characteristics, and Collision Attacks on PGV-Zorro  

Kim, Giyoon (Dept. of Information Security, Cryptology and Mathematics, Kookmin University)
Park, Eunhu (Dept. of Financial Information Security, Kookmin University)
Lee, Jonghyeok (Dept. of Information Security, Cryptology and Mathematics, Kookmin University)
Jang, Sungwoo (Dept. of Information Security, Cryptology and Mathematics, Kookmin University)
Kim, Jihun (Dept. of Financial Information Security, Kookmin University)
Kim, Hangi (Dept. of Financial Information Security, Kookmin University)
Kim, Jongsung (Dept. of Information Security, Cryptology and Mathematics, Kookmin University)
Abstract
The block cipher Zorro is designed to reduce the implementation cost for side-channel countermeasure. It has a structure similar to AES, but the number of S-Boxes used is small. However, since the master key is used as the round key, it can be vulnerable to related key attacks. In this paper, we show key recovery attacks on Zorro using related-key differential characteristics. In addition, the related key differential characteristics are fatal when Zorro is used as the base block cipher of the hash function. In this paper, we describe how these characteristics can be linked to collision attacks in the PGV models.
Keywords
block cipher, Zorro; Related-key differential characteristic; key recovery; PGV model; Collision attacks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 B. Gerard, V. Grosso, Naya-Plasencia, and M. Standaert, F.-X., "Block ciphers that are easier to mask: how far can we go?" In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 383-399, Aug 2013
2 S. Rasoolzadeh, Z. Ahmadian and M. Salmasizadeh, Aref, M.R. "Total break of Zorro using linear and differential attacks." IACR Cryptology ePrint Archive, 220, Jine. 2014.
3 B. Preneel, R. Govaerts and J. Vande walle "Hash functions based on block ciphers: A synthetic approach." In: Advances in Cryptology - Proceedings of CRYPTO'93, LNCS 773. Springer, pp 368-378, July. 2001
4 J. Black, P. Rogaway and T. Shrimpton, "Black-box analysis of the block-cip her-based hash-function constructions from pgv." In: Advances in Cryptology - Proceedings of CRYPTO '02, LNCS 2442. Springer, pp 320-335, Sep. 2002
5 H. Kim, D. Kim, O. Yi and J. Kim "Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security" - Multimedia Tools and Applications in Springer, pp 1-24, Mar. 2018