Higher Order Differential Attack on the Lightweight Block Cipher LBC-3

被引:0
|
作者
Shibayama, Naoki [1 ]
Igarashi, Yasutaka [1 ]
机构
[1] Tokyo Univ Sci, 2641 Yamazaki, Noda, Chiba 2788510, Japan
关键词
Lightweight block cipher; LBC-3; Cryptanalysis; Higher order differential attack;
D O I
10.1109/ICCE62051.2024.10634621
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
LBC-3 is the lightweight block cipher proposed by Nyssanbayeva et al. in 2022. The block size is 64 bits, the secret key size is 80 bits, and the number of rounds is 20, respectively. The designer investigated the avalanche effect of LBC-3, and Yasushi et al. evaluated the security against differential and linear cryptanalysis. Meanwhile, the security against higher order differential cryptanalysis, one of the most powerful attacks on block cipher, has not been evaluated. In this paper, we evaluated the security of LBC-3 by applying a higher order differential attack. By computer experiments, we discovered the 12-round characteristic using the 28-th order differential. We clarified the reason for this characteristic through a detailed analysis of the nibble values. Then, by using the 60-th order differential, we also show the 18-round characteristic, which is a 6-round extension of the 12-round one theoretically. Exploiting the 18-round characteristic, it is possible to apply the higher order differential attack to full-round LBC-3 with 2(61.6) data and times of encryption.
引用
收藏
页码:457 / 462
页数:6
相关论文
共 50 条
  • [31] A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
    Bogdanov, Andrey
    Rechberger, Christian
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 229 - 240
  • [32] New differential cryptanalysis results for the lightweight block cipher BORON
    Teh, Je Sen
    Tham, Li Jing
    Jamil, Norziana
    Yap, Wun-She
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 66
  • [33] Differential Fault Attack of Lightweight Cipher GIFT Based on Byte Model
    Gao, Yuan
    Zhang, Zhongya
    Zhang, Zhiyong
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (01): : 435 - 444
  • [34] Differential Fault Attack and Meet-in-the-Middle Attack on Block Cipher LED
    Liu, Feng
    Liu, Xuan
    Meng, Shuai
    ADVANCES IN APPLIED SCIENCES AND MANUFACTURING, PTS 1 AND 2, 2014, 850-851 : 529 - 532
  • [35] Differential Power Attack on SM4 block cipher
    Bai, Guoqiang
    Fu, Hailiang
    Li, Wei
    Wu, Xingjun
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1494 - 1497
  • [36] Full-round differential attack on DoT block cipher
    Kumar, Manoj
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (02): : 507 - 519
  • [37] New Impossible Differential Attack on SAFER Block Cipher Family
    Zhao, Jingyuan
    Wang, Meiqin
    Chen, Jiazhe
    Zheng, Yuliang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (03) : 843 - 852
  • [38] Full-Round Differential Attack on TWIS Block Cipher
    Su, Bozhan
    Wu, Wenling
    Zhang, Lei
    Li, Yanjun
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 234 - +
  • [39] Differential Attack on Five Rounds of the SC2000 Block Cipher
    Lu, Jiqiang
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 50 - 59
  • [40] Differential Attack on Five Rounds of the SC2000 Block Cipher*
    Lv, Ji-Qiang
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2011, 26 (04) : 722 - 731