Abstract

We apply McKay’s pseudo-linear approximation of addition modular 2n to lightweight ARX block ciphers with large words, specifically the Speck family. We demonstrate that a pseudo-linear approximation can be combined with a linear approximation using the meet-in-the-middle attack technique to recover several key bits. Thus we illustrate improvements to Speck linear distinguishers based solely on Cho–Pieprzyk approximations by combining them with pseudo-linear approximations, and propose key recovery attacks.

Highlights

  • We begin our work by implementing the pseudo-linear cryptanalysis on four rounds of S PECK 32/64, as a meet-in-the-middle attack with a four-bit window approximated by two rounds in the forward direction and two backward

  • We show that linear cryptanalysis relying on Cho–Pieprzyk approximations of modular addition is improved by replacing some rounds of linear approximation with pseudo-linear approximations

  • This paper presents a new cryptanalysis of the ARX block cipher Partly-Pseudo-Linear attack: combining linear and the pseudo-linear cryptanalysis

Read more

Summary

Introduction

This paper presents a new approximation and corresponding key recovery attack, Partly-Pseudo-Linear attack, combining pseudo-linear approximation with linear cryptanalysis of addition modulo 2n using Cho and Pieprzyk’s property of modular addition [6,7]. Cryptography 2021, 5, 1 for more than a single bit of key, because its use requires nonlinear operations with some key bits Though they do not discuss this, the linear distinguishers of [9,10] could possibly be extended to key recovery attacks, bias permitting, by appending rounds of encryption and/or decryption. In this instance, our attack covers more rounds for the variants S PECK.

Notation
The S PECK Cipher
Related Works
Linear Cryptanalysis
Pseudo-Linear Cryptanalysis
Some Observations Regarding the Addition Window
Pseudo-Linear Approximations of ARX Round Functions
Comparison between Pseudo-Linear Cryptanalysis and Linear Cryptanalysis
Cryptanalysis of S PECK
Different Methods of Cryptanalysis on S PECK
Linear Cryptanalysis of S PECK
Four-Round Attack
Six-Round Attack
Partly-Pseudo-Linear Cryptanalysis with Illustration on S PECK
Six-Round Partly-Pseudo-Linear Attack
Nine-Round Partly-Pseudo-Linear Attack
The Partly-Pseudo-Linear Attack on the Large Variants of S PECK
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.