New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128

Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi
{"title":"New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128","authors":"Zhichao Xu, Hong Xu, Lin Tan, Wenfeng Qi","doi":"10.1007/s12095-024-00708-z","DOIUrl":null,"url":null,"abstract":"<p>Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear cryptanalysis of another ARX-based block cipher SPARX-64/128. We first construct multiple 6-round differential-linear distinguishers based on the structure of SPARX-64/128, and then extend them into 14-round differential-linear distinguishers by adding a 7-round differential characteristic before and a one-round linear approximation after the distinguishers. Then we introduce a new linear approximation of modular addition, and use it to extend one more round after the 14-round differential-linear distinguishers. With the 15-round differential-linear distinguishers, we present a differential-linear attack on 18-round SPARX-64/128.</p>","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"18 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cryptography and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1007/s12095-024-00708-z","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Differential-linear cryptanalysis is an efficient cryptanalysis method to attack ARX ciphers, which have been used to present the best attacks on many ARX primitives such as Chaskey and Chacha. In this paper, we present the differential-linear cryptanalysis of another ARX-based block cipher SPARX-64/128. We first construct multiple 6-round differential-linear distinguishers based on the structure of SPARX-64/128, and then extend them into 14-round differential-linear distinguishers by adding a 7-round differential characteristic before and a one-round linear approximation after the distinguishers. Then we introduce a new linear approximation of modular addition, and use it to extend one more round after the 14-round differential-linear distinguishers. With the 15-round differential-linear distinguishers, we present a differential-linear attack on 18-round SPARX-64/128.

模块加法的新线性近似和 SPARX-64/128 的改进微分线性密码分析
差分线性密码分析是一种攻击 ARX 密码的高效密码分析方法,已被用于对许多 ARX 基元(如 Chaskey 和 Chacha)进行最佳攻击。本文介绍了对另一种基于 ARX 的块密码 SPARX-64/128 的差分线性密码分析。我们首先根据 SPARX-64/128 的结构构建了多个 6 轮差分线性区分器,然后通过在区分器之前添加一个 7 轮差分特征和在区分器之后添加一个 1 轮线性近似,将它们扩展为 14 轮差分线性区分器。然后,我们引入一种新的模块加法线性近似,并利用它在 14 轮微分线性区分器之后再扩展一轮。利用 15 轮差分线性区分器,我们提出了对 18 轮 SPARX-64/128 的差分线性攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信