Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis

Siwei Sun, Lei Hu*, Meiqin Wang, Qianqian Yang, Kexin Qiao, Xiaoshuang Ma, Ling Song, Jinyong Shan

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

We focus on extending the applicability of the mixed-integer programming (MIP) based method in differential cryptanalysis such that more work can be done automatically. Firstly, we show how to use the MIP-based technique to obtain almost all high probability 2-round iterative related-key differential characteristics of PRIDE (a block cipher proposed in CRYPTO 2014) automatically by treating the (formula presented) function with a special kind of modulo addition operations in the key schedule algorithm of PRIDE as an 8 × 8 S-box and partially modelling its differential behavior with linear inequalities. Note that some of the characteristics presented in this paper has not been found before, and all the characteristics we found can be used to attack the full-round PRIDE in the related-key model. Secondly, we show how to construct MIP models whose feasible regions are exactly the sets of all possible differential characteristics of SIMON (a family of lightweight block ciphers designed by the U.S. National Security Agency). With this method, there is no need to filter out invalid characteristics due to the dependent inputs of the AND operations. Finally, we present an MIP-based method which can be used to automatically analyze how the differences at the beginning and end of a differential distinguisher propagate upwards and downward. Note that how the differences at the ends of a differential distinguisher propagate, together with the probability of the differential distinguisher, determine how many outer rounds can be added to the distinguisher, which key bits can be recovered without exhaustive search, and how to identify wrong pairs in the filtering process. We think this work serves to further strengthens the position of the MIP as a promising tool in automatic differential cryptanalysis.

Original languageEnglish
Title of host publicationInformation Security - 18th International Conference, ISC 2015, Proceedings
EditorsJavier Lopez, Chris J. Mitchell
PublisherSpringer Verlag
Pages141-157
Number of pages17
ISBN (Print)9783319233178
DOIs
Publication statusPublished - 2015
Externally publishedYes
Event18th International Conference on Information Security, ISC 2015 - Trondheim, Norway
Duration: 9 Sept 201511 Sept 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9290
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference18th International Conference on Information Security, ISC 2015
Country/TerritoryNorway
CityTrondheim
Period9/09/1511/09/15

Keywords

  • Automatic cryptanalysis
  • Mixed-integer programming
  • PRIDE
  • Related-key differential attack

Fingerprint

Dive into the research topics of 'Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis'. Together they form a unique fingerprint.

Cite this