[Resource Topic] 2014/272: Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm

Welcome to the resource topic for 2014/272

Title:
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm

Authors: Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su

Abstract:

Impossible differential cryptanalysis has been proved to be one of the most powerful techniques to attack block ciphers. Based on the impossible differential paths, we can usually add several rounds before or after to launch the key recovery attack. Impossible differential cryptanalysis is powerful not only because the number of rounds it can break is very competitive compared to other attacks, but also unlike differential attacks which are statistical attacks in the essential, impossible differential analysis does not require many statistical assumptions. In this paper, we investigate the key recovery attack part of the impossible differential cryptanalysis. We point out that when taking the (non-linear) key scheduling algorithm into consideration, we can further derive the redundancy among the subkeys, and thus can filter the wrong key at a rather early stage. This can help us control the time complexity and increase the number of rounds we can attack. As an application, we analyze recently proposed lightweight block cipher LBlock, and as a result, we can break 23 rounds with complexity 2^{77.4} encryptions without using the whole code block, which is by far the best attack against this cipher.

ePrint: https://eprint.iacr.org/2014/272

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .