Depending on DEEPAND: Cryptanalysis of NLFSR-Based Lightweight Ciphers TinyJAMBU, KATAN, and KTANTAN

IF 2.9 3区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Amit Jana;Mostafizar Rahman;Dhiman Saha
{"title":"Depending on DEEPAND: Cryptanalysis of NLFSR-Based Lightweight Ciphers TinyJAMBU, KATAN, and KTANTAN","authors":"Amit Jana;Mostafizar Rahman;Dhiman Saha","doi":"10.1109/TIT.2025.3580774","DOIUrl":null,"url":null,"abstract":"Automated cryptanalysis has taken center stage in the arena of cryptanalysis since the pioneering work by Mouha et al. which showcased the power of Mixed Integer Linear Programming (<inline-formula> <tex-math>$\\textsf {MILP}$ </tex-math></inline-formula>) in solving cryptanalysis problems that otherwise, required significant effort. Since the inception, research in this area has moved in primarily two directions. One is to model more and more classical cryptanalysis tools as optimization problems to leverage the ease provided by state-of-the-art solvers. The other direction is to improve existing models to make them more efficient and/or accurate. The current work is an attempt to contribute to the latter. In this work, a general model referred to as <inline-formula> <tex-math>$\\textsf {DEEPAND}$ </tex-math></inline-formula> has been devised to capture the correlation between <inline-formula> <tex-math>$\\textsf {AND}$ </tex-math></inline-formula> gates in <inline-formula> <tex-math>$\\textsf {NLFSR}$ </tex-math></inline-formula>-based lightweight block ciphers. <inline-formula> <tex-math>$\\textsf {DEEPAND}$ </tex-math></inline-formula> builds upon and generalizes the idea of joint propagation of differences through <inline-formula> <tex-math>$\\textsf {AND}$ </tex-math></inline-formula> gates captured using refined <inline-formula> <tex-math>$\\textsf {MILP}$ </tex-math></inline-formula> modeling of <inline-formula> <tex-math>$\\textsf {TinyJAMBU}$ </tex-math></inline-formula> by Saha et al. in FSE 2020. The proposed model has been applied to <inline-formula> <tex-math>$\\textsf {TinyJAMBU}$ </tex-math></inline-formula>, <inline-formula> <tex-math>$\\textsf {KATAN}$ </tex-math></inline-formula>, <inline-formula> <tex-math>$\\textsf {KTANTAN}$ </tex-math></inline-formula> and can detect correlations that were missed by earlier models. This leads to more accurate differential bounds for both the ciphers. In particular, a 384-round (<italic>full-round</i> as per earlier specification) <inline-formula> <tex-math>$\\textsf {Type-IV}$ </tex-math></inline-formula> trail is found for <inline-formula> <tex-math>$\\textsf {TinyJAMBU}$ </tex-math></inline-formula> with 14-active <inline-formula> <tex-math>$\\textsf {AND}$ </tex-math></inline-formula> gates using the new model, while the refined model reported this figure to be 19. This also reaffirms the decision of the designers to increase the number of rounds from 384 to 640. Moreover, the model succeeds in searching a <italic>full round</i> <inline-formula> <tex-math>$\\textsf {Type-IV}$ </tex-math></inline-formula> trail of <inline-formula> <tex-math>$\\textsf {TinyJAMBU}$ </tex-math></inline-formula> keyed permutation <inline-formula> <tex-math>${\\mathcal {P}}_{1024}$ </tex-math></inline-formula> with probability <inline-formula> <tex-math>$2^{-105} (\\gg 2^{-128})$ </tex-math></inline-formula>. This reveals the non-random properties of <inline-formula> <tex-math>${\\mathcal {P}}_{1024}$ </tex-math></inline-formula> thereby showing it to be <italic>non-ideal</i>. Hence it cannot be expected to provide the same security levels as robust block ciphers. Further, the provable security of <inline-formula> <tex-math>$\\textsf {TinyJAMBU}$ </tex-math></inline-formula> <inline-formula> <tex-math>$\\textsf {AEAD}$ </tex-math></inline-formula> scheme should be carefully revisited. Similarly, for the variants of <inline-formula> <tex-math>$\\textsf {KATAN}$ </tex-math></inline-formula>, several previously reported trails are improved upon by employing the <inline-formula> <tex-math>$\\textsf {DEEPAND}$ </tex-math></inline-formula> model. Moreover, in the related-key setting, the <inline-formula> <tex-math>$\\textsf {DEEPAND}$ </tex-math></inline-formula> model is able to make a better 140-round boomerang distinguisher (for both the data and time complexity) in comparison to the previous boomerang attack by Isobe et al. in ACISP 2013. Furthermore, for enhanced applicability, we employ the <inline-formula> <tex-math>$\\textsf {DEEPAND}$ </tex-math></inline-formula> model on another multiple <inline-formula> <tex-math>$\\textsf {AND}$ </tex-math></inline-formula>-based cipher, <inline-formula> <tex-math>$\\textsf {KTANTAN}$ </tex-math></inline-formula>, in the related-key setting. Our analysis reveals practical differential distinguishers with low data and time complexities for all full-round <inline-formula> <tex-math>$\\textsf {KTANTAN}$ </tex-math></inline-formula> variants. In summary, <inline-formula> <tex-math>$\\textsf {DEEPAND}$ </tex-math></inline-formula> seems to capture the underlying correlation better when multiple <inline-formula> <tex-math>$\\textsf {AND}$ </tex-math></inline-formula> gates are at play and can be adapted to other classes of ciphers as well.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 9","pages":"7348-7366"},"PeriodicalIF":2.9000,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Theory","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11040085/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Automated cryptanalysis has taken center stage in the arena of cryptanalysis since the pioneering work by Mouha et al. which showcased the power of Mixed Integer Linear Programming ( $\textsf {MILP}$ ) in solving cryptanalysis problems that otherwise, required significant effort. Since the inception, research in this area has moved in primarily two directions. One is to model more and more classical cryptanalysis tools as optimization problems to leverage the ease provided by state-of-the-art solvers. The other direction is to improve existing models to make them more efficient and/or accurate. The current work is an attempt to contribute to the latter. In this work, a general model referred to as $\textsf {DEEPAND}$ has been devised to capture the correlation between $\textsf {AND}$ gates in $\textsf {NLFSR}$ -based lightweight block ciphers. $\textsf {DEEPAND}$ builds upon and generalizes the idea of joint propagation of differences through $\textsf {AND}$ gates captured using refined $\textsf {MILP}$ modeling of $\textsf {TinyJAMBU}$ by Saha et al. in FSE 2020. The proposed model has been applied to $\textsf {TinyJAMBU}$ , $\textsf {KATAN}$ , $\textsf {KTANTAN}$ and can detect correlations that were missed by earlier models. This leads to more accurate differential bounds for both the ciphers. In particular, a 384-round (full-round as per earlier specification) $\textsf {Type-IV}$ trail is found for $\textsf {TinyJAMBU}$ with 14-active $\textsf {AND}$ gates using the new model, while the refined model reported this figure to be 19. This also reaffirms the decision of the designers to increase the number of rounds from 384 to 640. Moreover, the model succeeds in searching a full round $\textsf {Type-IV}$ trail of $\textsf {TinyJAMBU}$ keyed permutation ${\mathcal {P}}_{1024}$ with probability $2^{-105} (\gg 2^{-128})$ . This reveals the non-random properties of ${\mathcal {P}}_{1024}$ thereby showing it to be non-ideal. Hence it cannot be expected to provide the same security levels as robust block ciphers. Further, the provable security of $\textsf {TinyJAMBU}$ $\textsf {AEAD}$ scheme should be carefully revisited. Similarly, for the variants of $\textsf {KATAN}$ , several previously reported trails are improved upon by employing the $\textsf {DEEPAND}$ model. Moreover, in the related-key setting, the $\textsf {DEEPAND}$ model is able to make a better 140-round boomerang distinguisher (for both the data and time complexity) in comparison to the previous boomerang attack by Isobe et al. in ACISP 2013. Furthermore, for enhanced applicability, we employ the $\textsf {DEEPAND}$ model on another multiple $\textsf {AND}$ -based cipher, $\textsf {KTANTAN}$ , in the related-key setting. Our analysis reveals practical differential distinguishers with low data and time complexities for all full-round $\textsf {KTANTAN}$ variants. In summary, $\textsf {DEEPAND}$ seems to capture the underlying correlation better when multiple $\textsf {AND}$ gates are at play and can be adapted to other classes of ciphers as well.
依赖于DEEPAND:基于nlfsr的轻量级密码TinyJAMBU, KATAN和KTANTAN的密码分析
自Mouha等人的开创性工作以来,自动密码分析已经占据了密码分析领域的中心舞台,该工作展示了混合整数线性规划($\textsf {MILP}$)在解决密码分析问题方面的强大功能,否则需要大量的努力。自成立以来,这一领域的研究主要朝着两个方向发展。一种是将越来越多的经典密码分析工具建模为优化问题,以利用最先进的解决方案提供的便利性。另一个方向是改进现有的模型,使它们更有效和/或更准确。目前的工作是试图为后者做出贡献。在这项工作中,设计了一个称为$\textsf {DEEPAND}$的通用模型,用于捕获基于$\textsf {NLFSR}$的轻量级分组密码中$\textsf {AND}$门之间的相关性。$\textsf {DEEPAND}$建立并推广了通过使用Saha等人在FSE 2020中对$\textsf {TinyJAMBU}$的精炼$\textsf {MILP}$建模捕获的$\textsf {and}$门来联合传播差异的思想。该模型已应用于$\textsf {TinyJAMBU}$, $\textsf {KATAN}$, $\textsf {KTANTAN}$,并可以检测早期模型遗漏的相关性。这导致了两个密码更精确的微分界。特别是,在使用新模型的$\textsf {TinyJAMBU}$中发现了384轮(根据早期规范的完整轮)$\textsf {Type-IV}$跟踪,其中有14个活动的$\textsf {AND}$门,而改进模型报告的这个数字为19。这也再次证实了设计者将轮次从384轮增加到640轮的决定。此外,该模型成功地以概率$2^{-105}(\gg 2^{-128})$的$\textsf {TinyJAMBU}$键化排列${\mathcal {P}}_{1024}$搜索到$\textsf {Type-IV}$轨迹。这揭示了${\mathcal {P}}_{1024}$的非随机属性,从而表明它是非理想的。因此,不能期望它提供与健壮的分组密码相同的安全级别。此外,$ $\textsf {TinyJAMBU}$ $\textsf {AEAD}$方案的可证明安全性应该仔细地重新审视。类似地,对于$\textsf {KATAN}$的变体,通过使用$\textsf {DEEPAND}$模型改进了前面报道的几个轨迹。此外,在相关键设置中,与Isobe等人在ACISP 2013中先前的回旋镖攻击相比,$\textsf {DEEPAND}$模型能够做出更好的140轮回旋镖区分(无论是数据复杂度还是时间复杂度)。此外,为了增强适用性,我们在相关密钥设置中对另一个基于多个$\textsf {AND}$的密码$\textsf {KTANTAN}$使用$\textsf {DEEPAND}$模型。我们的分析揭示了具有低数据复杂度和时间复杂度的实用差分区分器,适用于所有完整的$\textsf {KTANTAN}$变体。总之,当使用多个$\textsf {AND}$门时,$\textsf {DEEPAND}$似乎可以更好地捕获潜在的相关性,并且也可以适用于其他类型的密码。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory 工程技术-工程:电子与电气
CiteScore
5.70
自引率
20.00%
发文量
514
审稿时长
12 months
期刊介绍: The IEEE Transactions on Information Theory is a journal that publishes theoretical and experimental papers concerned with the transmission, processing, and utilization of information. The boundaries of acceptable subject matter are intentionally not sharply delimited. Rather, it is hoped that as the focus of research activity changes, a flexible policy will permit this Transactions to follow suit. Current appropriate topics are best reflected by recent Tables of Contents; they are summarized in the titles of editorial areas that appear on the inside front cover.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信