TY - JOUR
T1 - Improved integral attacks without full codebook
AU - Chu, Zhihui
AU - Chen, Huaifeng
AU - Wang, Xiaoyun
AU - Li, Lu
AU - Dong, Xiaoyang
AU - Ding, Yaoling
AU - Hao, Yonglin
N1 - Publisher Copyright:
© 2018 The Institution of Engineering and Technology.
PY - 2018/11/1
Y1 - 2018/11/1
N2 - The integral attack, exploits the balanced property of the output in the distinguisher. Usually, adversaries append some rounds after the distinguisher, guess the corresponding key bits and check whether the target bits are balanced. Few works add rounds before the distinguisher to make the key recovery attack. In the first full-round attack on MISTY1, Todo adds one FL layer (key-dependent linear function) before the distinguisher. In this study, the authors extend his method and give a general method, which they can use to extend some rounds (non-linear) before the distinguisher to attack more rounds with data complexity smaller than the whole space and little extra time consumption. The basic idea is that for different subkeys guessed in the forward rounds, they set different constant values for the input of the distinguisher. Finally, the selected data space is not full. For substitution permutation network (SPN) (Feistel with SPN round function) structures with 4 bit S-box and bit permutation, they estimate the data complexity when adding one round before the distinguishers for all 4 bit S-boxes. Using the method, they improve the integral attacks on PRESENT, RECTANGLE, TWINE and LBlock, and their results could cover one more round.
AB - The integral attack, exploits the balanced property of the output in the distinguisher. Usually, adversaries append some rounds after the distinguisher, guess the corresponding key bits and check whether the target bits are balanced. Few works add rounds before the distinguisher to make the key recovery attack. In the first full-round attack on MISTY1, Todo adds one FL layer (key-dependent linear function) before the distinguisher. In this study, the authors extend his method and give a general method, which they can use to extend some rounds (non-linear) before the distinguisher to attack more rounds with data complexity smaller than the whole space and little extra time consumption. The basic idea is that for different subkeys guessed in the forward rounds, they set different constant values for the input of the distinguisher. Finally, the selected data space is not full. For substitution permutation network (SPN) (Feistel with SPN round function) structures with 4 bit S-box and bit permutation, they estimate the data complexity when adding one round before the distinguishers for all 4 bit S-boxes. Using the method, they improve the integral attacks on PRESENT, RECTANGLE, TWINE and LBlock, and their results could cover one more round.
UR - http://www.scopus.com/inward/record.url?scp=85055879540&partnerID=8YFLogxK
U2 - 10.1049/iet-ifs.2017.0388
DO - 10.1049/iet-ifs.2017.0388
M3 - Article
AN - SCOPUS:85055879540
SN - 1751-8709
VL - 12
SP - 513
EP - 520
JO - IET Information Security
JF - IET Information Security
IS - 6
ER -