{"title":"轻量级分组密码ECLBC密码分析的进一步见解","authors":"Bo Yu;Da Lin;Guoqiang Liu;Liyi Xiong;Bing Sun","doi":"10.1109/JIOT.2025.3566414","DOIUrl":null,"url":null,"abstract":"ECLBC is a family of lightweight block ciphers designed, especially for the Internet of Medical Things. The family contains two instances according to their block sizes, which are denoted by ECLBC-32 and ECLBC-64, respectively. ECLBC is based on substitution-permutation network structure with an involutive nonlinear layer as well as an involutive linear layer. In this article, we focus on the security of ECLBC against some attacks. Our strategy includes a direct approach and an indirect approach to make cryptanalysis of ECLBC. For differential, linear and integral attacks, we apply the attacks against SIMON to ECLBC by revealing the affine equivalent property between the two ciphers. The feasibility of such an indirect way relies on an important observation on the chosen linear layer of ECLBC, which results in a similar encryption procedure to SIMON. Thus, they have the same security against some cryptanalytic methods. We give a proof of the property in a mathematical manner and some better attacks than previous works by the designers are given. What’s more, to investigate the security of the new key schedules of ECLBC, we directly search for rotational-<sc>xor</small> distinguishers with different key schedules via an SAT-based method. Finally, we conclude a different result from previous works. This article implies that ECLBC and SIMON are in a tight connection in the design and security based on the affine equivalent property. We mention that the linear layer should be noticed and carefully designed to avoid a block cipher being equivalent to existed ciphers.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 14","pages":"27649-27659"},"PeriodicalIF":8.9000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Further Insights on the Cryptanalysis of Lightweight Block Cipher ECLBC\",\"authors\":\"Bo Yu;Da Lin;Guoqiang Liu;Liyi Xiong;Bing Sun\",\"doi\":\"10.1109/JIOT.2025.3566414\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ECLBC is a family of lightweight block ciphers designed, especially for the Internet of Medical Things. The family contains two instances according to their block sizes, which are denoted by ECLBC-32 and ECLBC-64, respectively. ECLBC is based on substitution-permutation network structure with an involutive nonlinear layer as well as an involutive linear layer. In this article, we focus on the security of ECLBC against some attacks. Our strategy includes a direct approach and an indirect approach to make cryptanalysis of ECLBC. For differential, linear and integral attacks, we apply the attacks against SIMON to ECLBC by revealing the affine equivalent property between the two ciphers. The feasibility of such an indirect way relies on an important observation on the chosen linear layer of ECLBC, which results in a similar encryption procedure to SIMON. Thus, they have the same security against some cryptanalytic methods. We give a proof of the property in a mathematical manner and some better attacks than previous works by the designers are given. What’s more, to investigate the security of the new key schedules of ECLBC, we directly search for rotational-<sc>xor</small> distinguishers with different key schedules via an SAT-based method. Finally, we conclude a different result from previous works. This article implies that ECLBC and SIMON are in a tight connection in the design and security based on the affine equivalent property. We mention that the linear layer should be noticed and carefully designed to avoid a block cipher being equivalent to existed ciphers.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 14\",\"pages\":\"27649-27659\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10988586/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10988586/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Further Insights on the Cryptanalysis of Lightweight Block Cipher ECLBC
ECLBC is a family of lightweight block ciphers designed, especially for the Internet of Medical Things. The family contains two instances according to their block sizes, which are denoted by ECLBC-32 and ECLBC-64, respectively. ECLBC is based on substitution-permutation network structure with an involutive nonlinear layer as well as an involutive linear layer. In this article, we focus on the security of ECLBC against some attacks. Our strategy includes a direct approach and an indirect approach to make cryptanalysis of ECLBC. For differential, linear and integral attacks, we apply the attacks against SIMON to ECLBC by revealing the affine equivalent property between the two ciphers. The feasibility of such an indirect way relies on an important observation on the chosen linear layer of ECLBC, which results in a similar encryption procedure to SIMON. Thus, they have the same security against some cryptanalytic methods. We give a proof of the property in a mathematical manner and some better attacks than previous works by the designers are given. What’s more, to investigate the security of the new key schedules of ECLBC, we directly search for rotational-xor distinguishers with different key schedules via an SAT-based method. Finally, we conclude a different result from previous works. This article implies that ECLBC and SIMON are in a tight connection in the design and security based on the affine equivalent property. We mention that the linear layer should be noticed and carefully designed to avoid a block cipher being equivalent to existed ciphers.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.