Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers

Siwei Sun*, Lei Hu, Peng Wang, Kexin Qiao, Xiaoshuang Ma, Ling Song

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

300 Citations (Scopus)

Abstract

We propose two systematic methods to describe the differential property of an S-box with linear inequalities based on logical condition modelling and computational geometry respectively. In one method, inequalities are generated according to some conditional differential properties of the S-box; in the other method, inequalities are extracted from the H-representation of the convex hull of all possible differential patterns of the S-box. For the second method, we develop a greedy algorithm for selecting a given number of inequalities from the convex hull. Using these inequalities combined with Mixed-integer Linear Programming (MILP) technique, we propose an automatic method for evaluating the security of bit-oriented block ciphers against the (related-key) differential attack with several techniques for obtaining tighter security bounds, and a new tool for finding (related-key) differential characteristics automatically for bit-oriented block ciphers.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I
EditorsPalash Sarkar, Tetsu Iwata
PublisherSpringer Verlag
Pages158-178
Number of pages21
ISBN (Electronic)9783662456101
DOIs
Publication statusPublished - 2014
Externally publishedYes
Event20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014 - Kaoshiung, Taiwan, Province of China
Duration: 7 Dec 201411 Dec 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8873
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference20th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2014
Country/TerritoryTaiwan, Province of China
CityKaoshiung
Period7/12/1411/12/14

Keywords

  • Automatic cryptanalysis
  • Convex hull
  • Mixed-integer Linear Programming
  • Related-key differential attack

Fingerprint

Dive into the research topics of 'Automatic security evaluation and (related-key) differential characteristic search: Application to SIMON, PRESENT, LBlock, DES(L) and other bit-oriented block ciphers'. Together they form a unique fingerprint.

Cite this