Welcome to the resource topic for 2024/1614
Title:
Related-Key Cryptanalysis of FUTURE
Authors: Amit Jana, Smita Das, Ayantika Chatterjee, Debdeep Mukhopadhyay
Abstract:In Africacrypt 2022, Gupta \etal introduced a 64-bit lightweight \mds matrix-based \spn-like block cipher designed to encrypt data in a single clock cycle with minimal implementation cost, particularly when unrolled. While various attack models were discussed, the security of the cipher in the related-key setting was not addressed. In this work, we bridge this gap by conducting a security analysis of the cipher under related-key attacks using \milp(Mixed Integer Linear Programming)-based techniques. Our model enables a related-key distinguishing attack on 8 rounds of FUTURE, requiring 2^{64} plaintexts, 2^{63} \xor operations, and negligible memory. Additionally, we present a 10-round boomerang distinguisher with a probability of 2^{-45}, leading to a distinguishing attack with 2^{46} plaintexts, 2^{46} \xor operations, and negligible memory. This result demonstrates a full break of the cipher’s 64-bit security in the related-key setting.
ePrint: https://eprint.iacr.org/2024/1614
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .