[Resource Topic] 2024/1614: Related-Key Cryptanalysis of FUTURE

Welcome to the resource topic for 2024/1614

Title:
Related-Key Cryptanalysis of FUTURE

Authors: Amit Jana, Smita Das, Ayantika Chatterjee, Debdeep Mukhopadhyay

Abstract:

In Africacrypt 2022, Gupta \etal introduced a 64-bit lightweight \mds matrix-based \spn-like block cipher designed to encrypt data in a single clock cycle with minimal implementation cost, particularly when unrolled. While various attack models were discussed, the security of the cipher in the related-key setting was not addressed. In this work, we bridge this gap by conducting a security analysis of the cipher under related-key attacks using \milp(Mixed Integer Linear Programming)-based techniques. Our model enables a related-key distinguishing attack on 8 rounds of FUTURE, requiring 2^{64} plaintexts, 2^{63} \xor operations, and negligible memory. Additionally, we present a 10-round boomerang distinguisher with a probability of 2^{-45}, leading to a distinguishing attack with 2^{46} plaintexts, 2^{46} \xor operations, and negligible memory. This result demonstrates a full break of the cipher’s 64-bit security in the related-key setting.

ePrint: https://eprint.iacr.org/2024/1614

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .