New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC

IF 1.6 4区 计算机科学 Q3 ENGINEERING, ELECTRICAL & ELECTRONIC
Jiamei Liu;Lin Tan;Hong Xu
{"title":"New Related-Tweakey Boomerang Attacks and Distinguishers on Deoxys-BC","authors":"Jiamei Liu;Lin Tan;Hong Xu","doi":"10.23919/cje.2022.00.383","DOIUrl":null,"url":null,"abstract":"Deoxys-BC is the primitive tweakable block cipher of the Deoxys family of authenticated encryption schemes. Based on existing related-tweakey boomerang distinguishers, this paper improves the boomerang attacks on 11-round Deoxys-BC-256 and 13-round Deoxys-BC-384 by the optimized key guessing and the precomputation technique. It transfers a part of subtweakey guess in the key-recovery phase to the precomputation resulting in a significant reduction of the overall time complexity. For 11-round Deoxys-BC-256, we give a related-tweakey boomerang attack with time/data/memory complexities of \n<tex>$2^{218.6}/2^{125.7}/2^{125.7}$</tex>\n, and give another attack with the less time complexity of \n<tex>$2^{215.8}$</tex>\n and memory complexity of \n<tex>$2^{120}$</tex>\n when the adversary has access to the full codebook. For 13-round Deoxys-BC-384, we give a related-tweakey boomerang attack with time/data/memory complexities of \n<tex>$2^{k-96}+2^{157.5}/2^{120.4}/2^{113}$</tex>\n. For the key size \n<tex>$k=256$</tex>\n, it reduces the time complexity by a factor of \n<tex>$2^{31}$</tex>\n compared with the previous 13-round boomerang attack. In addition, we present two new related-tweakey boomerang distinguishers on 11-round Deoxys-BC-384 with the same probability as the best previous distinguisher.","PeriodicalId":50701,"journal":{"name":"Chinese Journal of Electronics","volume":"33 3","pages":"683-693"},"PeriodicalIF":1.6000,"publicationDate":"2024-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10543216","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Chinese Journal of Electronics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10543216/","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Deoxys-BC is the primitive tweakable block cipher of the Deoxys family of authenticated encryption schemes. Based on existing related-tweakey boomerang distinguishers, this paper improves the boomerang attacks on 11-round Deoxys-BC-256 and 13-round Deoxys-BC-384 by the optimized key guessing and the precomputation technique. It transfers a part of subtweakey guess in the key-recovery phase to the precomputation resulting in a significant reduction of the overall time complexity. For 11-round Deoxys-BC-256, we give a related-tweakey boomerang attack with time/data/memory complexities of $2^{218.6}/2^{125.7}/2^{125.7}$ , and give another attack with the less time complexity of $2^{215.8}$ and memory complexity of $2^{120}$ when the adversary has access to the full codebook. For 13-round Deoxys-BC-384, we give a related-tweakey boomerang attack with time/data/memory complexities of $2^{k-96}+2^{157.5}/2^{120.4}/2^{113}$ . For the key size $k=256$ , it reduces the time complexity by a factor of $2^{31}$ compared with the previous 13-round boomerang attack. In addition, we present two new related-tweakey boomerang distinguishers on 11-round Deoxys-BC-384 with the same probability as the best previous distinguisher.
新相关-德克西斯-BC 上的特威克回旋镖攻击和辨别者
Deoxys-BC是Deoxys认证加密算法系列中最原始的可调整块密码。本文在现有的相关密钥回旋镖区分器的基础上,通过优化密钥猜测和预计算技术,改进了对 11 轮 Deoxys-BC-256 和 13 轮 Deoxys-BC-384 的回旋镖攻击。它将密钥恢复阶段的部分子密钥猜测转移到了预计算阶段,从而显著降低了整体时间复杂度。对于 11 轮 Deoxys-BC-256,我们给出了一种时间/数据/内存复杂度为 $2^{218.6}/2^{125.7}/2^{125.7}$ 的相关微凯子回旋镖攻击,并给出了另一种攻击,当对手可以访问完整密码本时,时间复杂度为 $2^{215.8}$ ,内存复杂度为 $2^{120}$ 。对于 13 轮 Deoxys-BC-384,我们给出了一种相关的三要素回旋镖攻击,其时间/数据/内存复杂度为 $2^{k-96}+2^{157.5}/2^{120.4}/2^{113}$ 。在密钥大小为 $k=256$ 的情况下,与之前的 13 轮回旋镖攻击相比,时间复杂度降低了 2^{31}$ 倍。此外,我们还在 11 轮 Deoxys-BC-384 上提出了两种新的相关三假回旋镖区分器,其概率与之前的最佳区分器相同。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Chinese Journal of Electronics
Chinese Journal of Electronics 工程技术-工程:电子与电气
CiteScore
3.70
自引率
16.70%
发文量
342
审稿时长
12.0 months
期刊介绍: CJE focuses on the emerging fields of electronics, publishing innovative and transformative research papers. Most of the papers published in CJE are from universities and research institutes, presenting their innovative research results. Both theoretical and practical contributions are encouraged, and original research papers reporting novel solutions to the hot topics in electronics are strongly recommended.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信