Automated Key Recovery Attacks on Round-Reduced Orthros

被引:3
|
作者
Li, Muzhou [1 ,2 ]
Sun, Ling [1 ,2 ]
Wang, Meiqin [1 ,2 ,3 ]
机构
[1] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan, Peoples R China
[2] Shandong Univ, Sch Cyber Sci & Technol, Qingdao, Peoples R China
[3] Quan Cheng Shandong Lab, Jinan, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Differential-linear; Differential; Automated key recovery attack;
D O I
10.1007/978-3-031-17433-9_9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Orthros is a low-latency keyed pseudo-random function designed by Banik et al. in FSE 2022. It adopts the parallel structure composed of two keyed permutations. Both branches take the same 128-bit input and their outputs are XORed to generate the final 128-bit output. Benefiting from this special structure, it's security is hard to evaluate, especially for key recovery attacks. In its specification, the most effective distinguisher proposed is a 7-round integral one. However, it can only lead to key recovery attacks worse than exhaustive attack. Besides, there is no key recovery attack presented in the design document. Therefore, we are motivated to see whether a valid key recovery attack exists and how powerful it can be. In this paper, we aim to proceed differential and differentiallinear key recovery attacks on Orthros. To deal with the special structure, we introduce two automated key recovery attack frameworks that work for such twobranch ciphers. With the help of them, we finally got a 7-round differential-linear key recovery attack and a 6-round differential one. Both attacks are the first key recovery attacks on this cipher. However, they are so far from threatening its fullround security.
引用
收藏
页码:189 / 213
页数:25
相关论文
共 50 条
  • [1] Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Dhiman Saha
    Sourya Kakarla
    Srinath Mandava
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2017, 1 (3) : 282 - 296
  • [2] Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT
    Seok, Byoungjin
    ELECTRONICS, 2024, 13 (20)
  • [3] Faster Key Recovery Attack on Round-Reduced PRINCE
    Rasoolzadeh, Shahram
    Raddum, Havard
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, 2017, 10098 : 3 - 17
  • [4] Cube attacks on round-reduced TinyJAMBU
    Teng, Wil Liam
    Salam, Iftekhar
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C-W
    SCIENTIFIC REPORTS, 2022, 12 (01)
  • [5] Practical attacks on the round-reduced PRINCE
    Morawiecki, Pawel
    IET INFORMATION SECURITY, 2017, 11 (03) : 146 - 151
  • [6] Conditional Cube Key Recovery Attack on Round-Reduced Xoodyak
    Vaziri, Mohammad
    Velichkov, Vesselin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, ACNS 2023 SATELLITE WORKSHOPS, ADSC 2023, AIBLOCK 2023, AIHWS 2023, AIOTS 2023, CIMSS 2023, CLOUD S&P 2023, SCI 2023, SECMT 2023, SIMLA 2023, 2023, 13907 : 43 - 62
  • [7] Algebraic Attacks on Round-Reduced Keccak
    Liu, Fukang
    Isobe, Takanori
    Meier, Willi
    Yang, Zhonghao
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 91 - 110
  • [8] Cube attacks on round-reduced TinyJAMBU
    Wil Liam Teng
    Iftekhar Salam
    Wei-Chuen Yau
    Josef Pieprzyk
    Raphaël C.-W. Phan
    Scientific Reports, 12
  • [9] Practical Key-Recovery Attacks On Round-Reduced Ketje Jr, Xoodoo-AE And Xoodyak
    Zhou, Haibo
    Li, Zheng
    Dong, Xiaoyang
    Jia, Keting
    Meier, Willi
    COMPUTER JOURNAL, 2020, 63 (08): : 1231 - 1246
  • [10] Truncated differential based known-key attacks on round-reduced SIMON
    Hao, Yonglin
    Meier, Willi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 83 (02) : 467 - 492