Provable Security Evaluation of Block Ciphers Against Demirci-Selcuk's Meet-in-the-Middle Attack

被引:2
|
作者
Sun, Bing [1 ,2 ,3 ]
机构
[1] Nanyang Technol Univ, Singapore 639798, Singapore
[2] Natl Univ Def Technol, Coll Liberal Arts & Sci, Changsha 410073, Peoples R China
[3] State Key Lab Cryptol, Beijing 100878, Peoples R China
基金
中国国家自然科学基金;
关键词
Ciphers; Cryptography; Tools; Sun; Upper bound; Indexes; Standards; Meet-in-the-middle; characteristic matrix; subset representation; primitive index; AES; CRYPTANALYSIS;
D O I
10.1109/TIT.2021.3058377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Demirci-Selcuk's meet-in-the-middle attack is one of the most important methods among all the cryptanalytic vectors, which gives the best result against the round-reduced AES with respect to the rounds, and tradeoffs between data, time and memory. While we have already built provable security models against the differential cryptanalysis, linear cryptanalysis cryptanalysis, impossible differential and zero-correlation linear cryptanalysis, the provable security against the meet-in-the-middle attack is missing. In this paper, we propose the subset representation of function based on which we could give an algorithm to compute the exact number of parameters of the Demirci-Selcuk's distinguisher given the input and output, respectively. Experiments show that this algorithm can be more efficient than the automatical tool presented by Shi et al. at Asiacrypt 2018. We further extract a formula based on this algorithm and show an upper bound for the length of the Demirci-Selcuk's distinguisher of an iterative SPN cipher. We prove that for an SPN block cipher whose block size equals the key size, an effective Demirci-Selcuk-type meet-in-the-middle distinguisher covers at most twice the maximum of the primitive indexes of the linear layer and its inverse. As a result, we show that the known length of the Demirci-Selcuk's distinguisher of the AES-128 cannot be improved unless the details of the S-boxes are exploited, which demonstrates that the AES has a provable security against the Demirci-Selcuk's meet-in-the-middle attack.
引用
收藏
页码:4838 / 4844
页数:7
相关论文
共 37 条
  • [21] Meet-in-the-middle fault analysis on word-oriented substitution-permutation network block ciphers
    Liu, Zhiqiang
    Liu, Ya
    Wang, Qingju
    Gu, Dawu
    Li, Wei
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (04) : 672 - 681
  • [22] Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
    Jiqiang Lu
    Wenchang Zhou
    Designs, Codes and Cryptography, 2024, 92 : 957 - 973
  • [23] Meet-in-the-Middle Attack on 11-Round 3D Block Cipher
    Li, Rongjia
    Jin, Chenhui
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2017, 28 (01) : 19 - 28
  • [24] Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE
    Biryukov, Alex
    Derbez, Patrick
    Perrin, Leo
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 3 - 27
  • [25] Differential fault analysis and meet-in-the-middle attack on the block cipher KATAN32
    Zhang W.-Y.
    Liu F.
    Liu X.
    Meng S.
    Journal of Shanghai Jiaotong University (Science), 2013, Shanghai Jiaotong University (18): : 147 - 152
  • [26] Differential Fault Analysis and Meet-in-the-Middle Attack on the Block Cipher KATAN32
    张文英
    刘枫
    刘宣
    孟帅
    JournalofShanghaiJiaotongUniversity(Science), 2013, 18 (02) : 147 - 152
  • [27] Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
    Lu, Jiqiang
    Zhou, Wenchang
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (04) : 957 - 973
  • [28] A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
    Bogdanov, Andrey
    Rechberger, Christian
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 229 - 240
  • [29] Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits
    Wei, Yongzhuang
    Lu, Jiqiang
    Hu, Yupu
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2011, 6672 : 222 - 232
  • [30] Meet-in-the-Middle Attack on the 15-Round Variant of the Lightweight Block Cipher Shakey for Protection of IoT Devices
    Yada, Kohan
    Igarashi, Yasutaka
    2024 IEEE TENTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS, ICCE 2024, 2024, : 433 - 438