Analysis of ARX encryption schemes resistance to the integral attack and impracticable differentials attack

IF 0.2 Q4 ENGINEERING, ELECTRICAL & ELECTRONIC
V. Ruzhentsev, O. Fediushyn, S. Kokhan
{"title":"Analysis of ARX encryption schemes resistance to the integral attack and impracticable differentials attack","authors":"V. Ruzhentsev, O. Fediushyn, S. Kokhan","doi":"10.30837/rt.2021.4.207.06","DOIUrl":null,"url":null,"abstract":"Common ARX (Addition-Rotation-XOR) encryption algorithms are analyzed. These algorithms are Chacha, Speckey, Simon, Chaskey, Sparkle. These algorithms use three basic operations: modular addition, XOR addition, and rotation. 16-bit reduced models of these algorithms are developed, methods of analysis are selected and developed, and the analysis of the resistance of these algorithms to the most effective attacks (integral attack and attack of impossible differentials) for this class of algorithms is performed. According to the selected indicator – the number of elementary operations that is necessary to obtain parameters of random substitution and the absence of impossible differentials and integrals – the most effective ARX algorithms are determined. These are Speckey, which operates on two 8-bit subblocks and requires 36 elementary operations, and Chaskey, which operates on four 4-bit subblocks and requires 72 elementary operations. If we assume that one 8-bit operation is equivalent to two 4-bit operations, then these schemes are equal in terms of the chosen indicator. The worst performers were the 8-bit Simon scheme and the 4-bit ChaCha scheme, which require almost twice as many operations as the best schemes. A conclusion was also made about the importance of using not one, but several XOR operations of key addition for the overall cryptographic strength of ARX algorithms.","PeriodicalId":41675,"journal":{"name":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","volume":"5 2","pages":""},"PeriodicalIF":0.2000,"publicationDate":"2021-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.30837/rt.2021.4.207.06","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Common ARX (Addition-Rotation-XOR) encryption algorithms are analyzed. These algorithms are Chacha, Speckey, Simon, Chaskey, Sparkle. These algorithms use three basic operations: modular addition, XOR addition, and rotation. 16-bit reduced models of these algorithms are developed, methods of analysis are selected and developed, and the analysis of the resistance of these algorithms to the most effective attacks (integral attack and attack of impossible differentials) for this class of algorithms is performed. According to the selected indicator – the number of elementary operations that is necessary to obtain parameters of random substitution and the absence of impossible differentials and integrals – the most effective ARX algorithms are determined. These are Speckey, which operates on two 8-bit subblocks and requires 36 elementary operations, and Chaskey, which operates on four 4-bit subblocks and requires 72 elementary operations. If we assume that one 8-bit operation is equivalent to two 4-bit operations, then these schemes are equal in terms of the chosen indicator. The worst performers were the 8-bit Simon scheme and the 4-bit ChaCha scheme, which require almost twice as many operations as the best schemes. A conclusion was also made about the importance of using not one, but several XOR operations of key addition for the overall cryptographic strength of ARX algorithms.
ARX加密方案抗积分攻击和不可行的微分攻击的分析
分析了常用的ARX (Addition-Rotation-XOR)加密算法。这些算法是Chacha Speckey Simon Chaskey Sparkle。这些算法使用三种基本运算:模加法、异或加法和旋转。开发了这些算法的16位简化模型,选择和开发了分析方法,并分析了这些算法对这类算法最有效的攻击(积分攻击和不可能微分攻击)的抵抗力。根据所选择的指标-获得随机替换参数所需的初等运算次数和不存在不可能的微分和积分-确定最有效的ARX算法。Speckey在两个8位子块上运行,需要36个基本运算;Chaskey在四个4位子块上运行,需要72个基本运算。如果我们假设一个8位操作相当于两个4位操作,那么这些方案在选择的指标方面是相等的。性能最差的是8位的Simon方案和4位的ChaCha方案,它们需要的操作几乎是最佳方案的两倍。还得出结论,对于ARX算法的整体加密强度,使用不是一个,而是多个密钥相加的异或操作的重要性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia
Visnyk NTUU KPI Seriia-Radiotekhnika Radioaparatobuduvannia ENGINEERING, ELECTRICAL & ELECTRONIC-
自引率
33.30%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信