ICT: A Cryptanalysis Toolbox for Block Cipher Structure With Secret Components

被引:1
|
作者
Zhang, Jiyan [1 ]
Cui, Ting [1 ]
Jin, Chenhui [1 ]
机构
[1] PLA SSF Informat Engn Univ, Dept Appl Math, Zhengzhou 450000, Peoples R China
基金
中国国家自然科学基金;
关键词
Secret component recovery; block cipher structure; impossible differential cryptanalysis; equivalent structure; SKIPJACK;
D O I
10.1109/TIFS.2021.3108435
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we present a new technique for recovering the secret inner components of block cipher structures. This technique does not simply distinguish a block cipher structure from a random permutation but recovers the secret inner components. In addition, our technique is more general than ad hoc structural cryptanalysis for specific structures. A new tool, the Inequality Constraints Table ( ICT), is introduced to characterize the constraint relation of the secret inner components. If a complete ICT can be constructed, the secret components will be determined by a recursive algorithm. Based on the fundamental structure, an iterative method is proposed to construct an equivalent structure to simplify the initial guess regarding the secret components. Finally, we apply the new technique to several block cipher structures and obtain the secret component recovery results for the 5-round MISTY structure, 23- and 25- round Skipjack structure. To the best of our knowledge, this is the first time to present the structural cryptanalysis against the 5-round MISTY structure, 23- and 25- round Skipjack structure.
引用
收藏
页码:4482 / 4493
页数:12
相关论文
共 50 条
  • [21] Cryptanalysis of full skipjack block cipher
    Phan, RCW
    ELECTRONICS LETTERS, 2002, 38 (02) : 69 - 71
  • [22] Cryptanalysis of DBST, a lightweight block cipher
    Sadegh Sadeghi
    Nasour Bagheri
    Frontiers of Computer Science, 2024, 18
  • [23] A framework for describing block cipher cryptanalysis
    Phan, Raphael C. -W.
    Siddiqi, Mohammad Umar
    IEEE TRANSACTIONS ON COMPUTERS, 2006, 55 (11) : 1402 - 1409
  • [24] Improved Cryptanalysis of the FOX Block Cipher
    Wu, Zhongming
    Luo, Yiyuan
    Lai, Xuejia
    Zhu, Bo
    TRUSTED SYSTEMS, 2010, 6163 : 236 - 249
  • [25] Cryptanalysis of the Full MMB Block Cipher
    Wang, Meiqin
    Nakahara, Jorge, Jr.
    Sun, Yue
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 231 - +
  • [26] Impossible Differential Cryptanalysis of the FBC Block Cipher
    Lu, Jiqiang
    Zhang, Xiao
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 372 - 391
  • [27] Cryptanalysis of reduced versions of the Camellia block cipher
    Lu, J.
    Wei, Y.
    Fouque, P. A.
    Kim, J.
    IET INFORMATION SECURITY, 2012, 6 (03) : 228 - 238
  • [28] Towards a unifying view of block cipher cryptanalysis
    Wagner, D
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 16 - 33
  • [29] Truncated Differential Cryptanalysis of the SPRING Block Cipher
    Zhou, Wenchang
    Lu, Jiqiang
    CRYPTOLOGY AND NETWORK SECURITY, PT II, CANS 2024, 2025, 14906 : 240 - 264
  • [30] Impossible Differential Cryptanalysis of LiCi Block Cipher
    Wei Y.
    Shi J.
    Li L.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2019, 41 (07): : 1610 - 1617