Abstract | ||
---|---|---|
This paper proposes improved algebraic attacks that are effective for lightweight block ciphers. Concretely, we propose a new framework that leverages on algebraic preprocessing as well as modern SAT solvers to perform algebraic cryptanalysis on block ciphers. By combining with chosen plaintext attacks, we show that our framework can be applied to lightweight block ciphers that exhibit a nice differential trail. In particular, we demonstrate our techniques by performing algebraic cryptanalysis on both the Present cipher and the Simon cipher. For the Present cipher, we successfully solved up to 9 rounds with at most 32 key bits fixed and 8 chosen plaintexts. On the other hand, for the Simon cipher, we tested our method on Simon-32/64 and Simon-64/128. For these two versions, our attack can solve up to 13 rounds with only 8 chosen plaintexts by fixing 4 and 6 key bits for Simon-32/64 and Simon-64/128, respectively. Further, by considering a class of weak keys, we can extend our attacks to 16 rounds. As far as we are aware, these are the best algebraic attacks on these ciphers in the literature. |
Year | DOI | Venue |
---|---|---|
2021 | 10.1007/s13389-020-00237-4 | JOURNAL OF CRYPTOGRAPHIC ENGINEERING |
Keywords | DocType | Volume |
Algebraic attacks, SAT solvers, Lightweight block ciphers, Simon, Present | Journal | 11 |
Issue | ISSN | Citations |
1 | 2190-8508 | 0 |
PageRank | References | Authors |
0.34 | 0 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sze Ling Yeo | 1 | 40 | 8.76 |
Duc-Phong Le | 2 | 29 | 7.06 |
Khoongming Khoo | 3 | 250 | 23.29 |