Improved key-recovery attacks on reduced-round WEM-8

被引:0
|
作者
Jun Liu
Dachao Wang
Yupu Hu
Jie Chen
Baocang Wang
机构
[1] Xidian University,State Key Laboratory of Integrated Service Networks
[2] Guilin University of Electronic Technology,Guangxi Key Laboratory of Cryptography and Information Security
来源
关键词
White-box block cipher; Cryptanalysis; WEM family; Key-recovery attack; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Proposed in CT-RSA’2017, WEM is a family of white-box block ciphers based on the Even-Mansour structure and AES. Due to its elegant structure and impressive performance, WEM is a prominent primitive in white-box cryptography-oriented scenarios like digital rights management (DRM) and mobile payment. In this paper, we focus on the black-box key-recovery security of reduced-round WEM-8, one of the main instances in the WEM family, with the aim of gaining an intensive understanding of the security of WEM. Potential weaknesses of WEM-8 are explored, and a new approach to improving the efficiency of integral attacks is introduced, which constructs equations from the constant property, instead of the balance property. Aided by these observations, new competitive key-recovery attacks with lower time/data/memory complexity on reduced-round WEM-8 are proposed. In particular, the improved attack on 4-round WEM-8 requires only 28\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^8$$\end{document} adaptively chosen ciphertexts, whereas the current best attack has the data complexity of 240\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{40}$$\end{document} chosen plaintexts. The results in this work show the effectiveness of the constant property in enhancing integral attacks and can inspire novel techniques in key-recovery attacks against other (white-box) block ciphers.
引用
收藏
页码:2419 / 2448
页数:29
相关论文
共 50 条
  • [1] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [2] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
    Cui, Tingting
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
  • [3] New Key-Recovery Attack on Reduced-Round AES
    Bardeh, Navid Ghaedi
    Rijmen, Vincent
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2022, 2022 (02) : 43 - 62
  • [4] Improved key recovery attacks on reduced-round Salsa20
    Dey, Sabyasachi
    Leander, Gregor
    Sharma, Nitin Kumar
    DESIGNS CODES AND CRYPTOGRAPHY, 2025, 93 (01) : 243 - 262
  • [5] Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting
    Derbez, Patrick
    Fouque, Pierre-Alain
    Jean, Jeremy
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 371 - 387
  • [6] Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
    Bar-On, Achiya
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 185 - 212
  • [7] Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
    Achiya Bar-On
    Orr Dunkelman
    Nathan Keller
    Eyal Ronen
    Adi Shamir
    Journal of Cryptology, 2020, 33 : 1003 - 1043
  • [8] Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
    Bar-On, Achiya
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    JOURNAL OF CRYPTOLOGY, 2020, 33 (03) : 1003 - 1043
  • [9] Gain: Practical Key-Recovery Attacks on Round-Reduced PAEQ
    Dhiman Saha
    Sourya Kakarla
    Srinath Mandava
    Dipanwita Roy Chowdhury
    Journal of Hardware and Systems Security, 2017, 1 (3) : 282 - 296
  • [10] Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V
    Hoki, Jin
    Isobe, Takanori
    Ito, Ryoma
    Liu, Fukang
    Sakamoto, Kosei
    INFORMATION SECURITY AND PRIVACY, ACISP 2021, 2021, 13083 : 171 - 190