Improved key-recovery attacks on reduced-round WEM-8

被引:0
|
作者
Jun Liu
Dachao Wang
Yupu Hu
Jie Chen
Baocang Wang
机构
[1] Xidian University,State Key Laboratory of Integrated Service Networks
[2] Guilin University of Electronic Technology,Guangxi Key Laboratory of Cryptography and Information Security
来源
关键词
White-box block cipher; Cryptanalysis; WEM family; Key-recovery attack; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Proposed in CT-RSA’2017, WEM is a family of white-box block ciphers based on the Even-Mansour structure and AES. Due to its elegant structure and impressive performance, WEM is a prominent primitive in white-box cryptography-oriented scenarios like digital rights management (DRM) and mobile payment. In this paper, we focus on the black-box key-recovery security of reduced-round WEM-8, one of the main instances in the WEM family, with the aim of gaining an intensive understanding of the security of WEM. Potential weaknesses of WEM-8 are explored, and a new approach to improving the efficiency of integral attacks is introduced, which constructs equations from the constant property, instead of the balance property. Aided by these observations, new competitive key-recovery attacks with lower time/data/memory complexity on reduced-round WEM-8 are proposed. In particular, the improved attack on 4-round WEM-8 requires only 28\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^8$$\end{document} adaptively chosen ciphertexts, whereas the current best attack has the data complexity of 240\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{40}$$\end{document} chosen plaintexts. The results in this work show the effectiveness of the constant property in enhancing integral attacks and can inspire novel techniques in key-recovery attacks against other (white-box) block ciphers.
引用
收藏
页码:2419 / 2448
页数:29
相关论文
共 50 条
  • [31] Improving Key-Recovery in Linear Attacks: Application to 28-Round PRESENT
    Florez-Gutierrez, Antonio
    Naya-Plasencia, Maria
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2020, PT I, 2020, 12105 : 221 - 249
  • [32] Key-Recovery Attacks on CRAFT and WARP
    Sun, Ling
    Wang, Wei
    Wang, Meiqin
    SELECTED AREAS IN CRYPTOGRAPHY, SAC 2022, 2024, 13742 : 77 - 95
  • [33] Key-Recovery Attacks on Full KRAVATTE
    Chaigneau, Colin
    Fuhr, Thomas
    Gilbert, Henri
    Guo, Jian
    Jean, Jeremy
    Reinhard, Jean-Rene
    Song, Ling
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (01) : 5 - 28
  • [34] Related-Key Attacks on Reduced-Round Hierocrypt-L1
    Taga, Bungo
    Moriai, Shiho
    Aoki, Kazumaro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 126 - 137
  • [35] Improved Meet-in-the Middle Attacks on Reduced-Round TWINE-128
    Liu, Ya
    Yang, Anren
    Dai, Bo
    Li, Wei
    Liu, Zhiqiang
    Gu, Dawu
    Zeng, Zhiqiang
    COMPUTER JOURNAL, 2018, 61 (08): : 1252 - 1258
  • [36] Improved meet-in-the-middle attacks on reduced-round Joltik-BC
    Li, Manman
    Chen, Shaozhen
    IET INFORMATION SECURITY, 2021, 15 (03) : 247 - 255
  • [37] Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon
    Rohit, Raghvendra
    Hu, Kai
    Sarkar, Sumanta
    Sun, Siwei
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (01) : 130 - 155
  • [38] Related-key impossible differential attacks on reduced-round AES-256
    State Key Laboratory of Information Security, Graduate University, Chinese Acad. of Sci., Beijing 100049, China
    不详
    Ruan Jian Xue Bao, 2007, 11 (2893-2901):
  • [39] New attacks against reduced-round versions of IDEA
    Junod, P
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 384 - 397
  • [40] Integral Attacks on Reduced-Round ARIA Block Cipher
    Li, Yanjun
    Wu, Wenling
    Zhang, Lei
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2010, 6047 : 19 - 29