Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 5980251, 9 pages
https://doi.org/10.1155/2017/5980251
Research Article

Improvements for Finding Impossible Differentials of Block Cipher Structures

1School of Electronics and Information, Shanghai Dian Ji University, Shanghai, China
2Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China
3Westone Cryptologic Research Center, Beijing 100070, China

Correspondence should be addressed to Yiyuan Luo; nc.ude.ujds@yyoul

Received 30 March 2017; Accepted 17 July 2017; Published 29 August 2017

Academic Editor: Jesús Díaz-Verdejo

Copyright © 2017 Yiyuan Luo and Xuejia Lai. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. E. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of Skipjack reduced to 31 rounds using impossible differentials,” Journal of Cryptology. The Journal of the International Association for Cryptologic Research, vol. 18, no. 4, pp. 291–311, 2005. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  2. L. R. Knudsen, “DEAL-A 128-bit block cipher,” Tech. Rep. 151, Department of Informatics, University of Bergen, 1998. View at Google Scholar
  3. R. Zong, X. Dong, and X. Wang, “Impossible Differential Attack on Simpira v2,” Science China Information Sciences, 2017. View at Publisher · View at Google Scholar
  4. L. Cheng, B. Sun, and C. Li, “Revised cryptanalysis for sms4,” Science China Information Sciences, vol. 60, no. 12, article 122101, 2017. View at Google Scholar
  5. Y. Dai and S. Chen, “Cryptanalysis of full PRIDE block cipher,” Science China. Information Sciences, vol. 60, no. 5, 052108, 12 pages, 2017. View at Publisher · View at Google Scholar · View at MathSciNet
  6. W. Zhang, Z. Bao, D. Lin, V. Rijmen, B. Yang, and I. Verbauwhede, “RECTANGLE: a bit-slice lightweight block cipher suitable for multiple platforms,” Science China Information Sciences, pp. 1–15, 2015. View at Publisher · View at Google Scholar · View at Scopus
  7. G.-Q. Liu and C.-H. Jin, “Algebraic techniques in slender-set differential cryptanalysis of PRESENT-like cipher,” Science China Information Sciences, vol. 59, no. 9, Article ID 99104, 2016. View at Publisher · View at Google Scholar · View at Scopus
  8. T. Lin, X. Lai, W. Xue, and G. Huang, “Discussion on the theoretical results of white-box cryptography,” Science China Information Sciences, vol. 59, no. 11, Article ID 112101, 2016. View at Publisher · View at Google Scholar · View at Scopus
  9. Y. Ding, J. Zhao, L. Li, and H. Yu, “Impossible differential analysis on round-reduced PRINCE,” Journal of Information Science and Engineering, vol. 33, no. 4, pp. 1041–1053, 2017. View at Google Scholar
  10. W. Wu, L. Zhang, and X. Yu, “The DBlock family of block ciphers,” Science China Information Sciences, vol. 58, no. 3, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Boura, M. a. Naya-Plasencia, and V. Suder, “Scrutinizing and improving impossible differential attacks: applications to CLEFIA, Camellia, LBlock and Simon,” in Advances in cryptology—ASIACRYPT 2014. Part I, vol. 8873 of Lecture Notes in Comput. Sci., pp. 179–199, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  12. J. Kim, S. Hong, J. Sung, S. Lee, J. Lim, and S. Sung, “Impossible differential cryptanalysis for block cipher structures,” in Progress in cryptology—INDOCRYPT 2003, vol. 2904 of Lecture Notes in Comput. Sci., pp. 82–96, Springer, Berlin, Germany, 2003. View at Publisher · View at Google Scholar · View at MathSciNet
  13. J. Kim, S. Hong, and J. Lim, “Impossible differential cryptanalysis using matrix method,” Discrete Mathematics, vol. 310, no. 5, pp. 988–1002, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  14. Y. Luo, X. Lai, Z. Wu, and G. Gong, “A unified method for finding impossible differentials of block cipher structures,” Information Sciences, vol. 263, pp. 211–220, 2014. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Yap, “Impossible differential characteristics of extended feistel networks with provable security against differential cryptanalysis,” Communications in Computer and Information Science, vol. 29, pp. 103–121, 2009. View at Publisher · View at Google Scholar · View at Scopus
  16. G. Liu, C. Jin, and Z. Kong, “Key recovery attack for PRESENT using slender-set linear cryptanalysis,” Science China Information Sciences, vol. 59, no. 3, Article ID 32110, 2016. View at Publisher · View at Google Scholar · View at Scopus
  17. R. Zhao, R. Zhang, Y. Li, and B. Wu, “Construction of MDS block diffusion matrices for block ciphers and hash functions,” Science China. Information Sciences, vol. 59, no. 9, Article ID 99101, 099101, 3 pages, 2016. View at Publisher · View at Google Scholar · View at MathSciNet
  18. T. P. Berger, M. Minier, and G. Thomas, “Extended generalized Feistel networks using matrix representation,” in Selected areas in cryptography—SAC 2013, vol. 8282 of Lecture Notes in Comput. Sci., pp. 289–305, Springer, Berlin, Germany, 2014. View at Publisher · View at Google Scholar · View at MathSciNet
  19. T. P. Berger and M. Minier, “Some results using the matrix methods on impossible, integral and zero-correlation distinguishers for Feistel-like ciphers,” in Progress in cryptology—INDOCRYPT 2015, vol. 9462 of Lecture Notes in Comput. Sci., pp. 180–197, Springer, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  20. C. Blondeau and M. Minier, “Analysis of impossible, integral and zero-correlation attacks on type-II generalized feistel networks using the matrix method,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 9054, pp. 92–113, 2015. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Wu and M. Wang, “Automatic search of truncated impossible differentials for word-oriented block ciphers,” in Progress in cryptology---{INDOCRYPT} 2012, vol. 7668 of Lecture Notes in Comput. Sci., pp. 283–302, Springer, Heidelberg, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  22. B. Sun, Z. Liu, V. Rijmen et al., “Links among impossible differential, integral and zero correlation linear cryptanalysis,” in Advances in cryptology—CRYPTO 2015. Part I, vol. 9215 of Lecture Notes in Comput. Sci., pp. 95–115, Springer, Berlin, Germany, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  23. J. Sung, S. Lee, J. Lim, S. Hong, and S. Park, “Provable security for the Skipjack-like structure against differential cryptanalysis and linear cryptanalysis,” in Advances in cryptology—ASIACRYPT 2000 (Kyoto), vol. 1976 of Lecture Notes in Comput. Sci., pp. 274–288, Springer, Berlin, Germany, 2000. View at Publisher · View at Google Scholar · View at MathSciNet
  24. J. Choy, G. Chew, K. Khoo, and H. Yap, “Cryptographic properties and application of a generalized unbalanced feistel network structure,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5594, pp. 73–89, 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. M. Matsui, “New block encryption algorithm MISTY,” in Fast Software Encryption, vol. 1267 of Lecture Notes in Computer Science, pp. 54–68, Springer-Verlag, 1997. View at Publisher · View at Google Scholar
  26. M. Izadi, B. Sadeghiyan, S. S. Sadeghian, and H. A. Khanooki, “MIBS: A new lightweight block cipher,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5888, pp. 334–348, 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. K. Aoki, T. Ichikawa, M. Kanda et al., “Camellia: a 128-bit block cipher suitable for multiple platforms—design and analysis,” in Selected areas in cryptography (Waterloo, ON, 2000), vol. 2012 of Lecture Notes in Comput. Sci., pp. 39–56, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  28. W. Wu and L. Zhang, “LBlock: A lightweight block cipher,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6715, pp. 327–344, 2011. View at Publisher · View at Google Scholar · View at Scopus
  29. M. Kanda, S. Moriai, K. Aoki et al., “E2-A new 128-bit block cipher,” IEICE Transactions Fundamentals - Special Section on Cryptography and Information Security, vol. E83-A, no. 1, pp. 48–59, 2000. View at Google Scholar · View at Scopus
  30. C. Lee and Y. Cha, “The block cipher: SNAKE with provable resistance against DC and LC attacks,” in JW-ISC 1997, pp. 3–17, 1997. View at Google Scholar
  31. S. Wu and M. Wang, “Automatic search of truncated impossible differentials for word-oriented block ciphers,” http://eprint.iacr.org/2012/214.pdf.
  32. RosettacodeOrg. How to compute the reduced row echelon form of a matrix. http://rosettacode.org/wiki/Reduced_row_echelon_form.
  33. S. Moriai and S. Vaudenay, “On the pseudorandomness of top-level schemes of block ciphers,” in Advances in cryptology—ASIACRYPT 2000 (Kyoto), vol. 1976 of Lecture Notes in Comput. Sci., pp. 289–302, Springer, Berlin, Germany, 2000. View at Publisher · View at Google Scholar · View at MathSciNet
  34. SMS4. Specication of SMS4, block cipher for WLAN products SMS4. Avaiable at: http://www.oscca.gov.cn/UpFile/200621016423197990.pdf.
  35. Y. Luo, Source codes and results for finding impossible differentials for block cipher structures. https://github.com/ianroo/impossibledifferential.
  36. A. Bogdanov, L. R. Knudsen, G. Leander, F.-X. Standaert, J. Steinberger, and E. Tischhauser, “Key-alternating ciphers in a provable setting: encryption using a small number of public permutations (extended abstract),” in Advances in cryptology—EUROCRYPT 2012, vol. 7237 of Lecture Notes in Comput. Sci., pp. 45–62, Springer, Berlin, Germany, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  37. C. Blondeau, A. Bogdanov, and M. Wang, “On the (in)equivalence of impossible differential and zero-correlation distinguishers for Feistel- and Skipjack-type ciphers,” in Applied Cryptography and Network Security, vol. 8479 of Lecture Notes in Computer Science, pp. 271–288, Springer-Verlag, 2014. View at Publisher · View at Google Scholar