轻量级分组密码ECLBC密码分析的进一步见解

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Bo Yu;Da Lin;Guoqiang Liu;Liyi Xiong;Bing Sun
{"title":"轻量级分组密码ECLBC密码分析的进一步见解","authors":"Bo Yu;Da Lin;Guoqiang Liu;Liyi Xiong;Bing Sun","doi":"10.1109/JIOT.2025.3566414","DOIUrl":null,"url":null,"abstract":"ECLBC is a family of lightweight block ciphers designed, especially for the Internet of Medical Things. The family contains two instances according to their block sizes, which are denoted by ECLBC-32 and ECLBC-64, respectively. ECLBC is based on substitution-permutation network structure with an involutive nonlinear layer as well as an involutive linear layer. In this article, we focus on the security of ECLBC against some attacks. Our strategy includes a direct approach and an indirect approach to make cryptanalysis of ECLBC. For differential, linear and integral attacks, we apply the attacks against SIMON to ECLBC by revealing the affine equivalent property between the two ciphers. The feasibility of such an indirect way relies on an important observation on the chosen linear layer of ECLBC, which results in a similar encryption procedure to SIMON. Thus, they have the same security against some cryptanalytic methods. We give a proof of the property in a mathematical manner and some better attacks than previous works by the designers are given. What’s more, to investigate the security of the new key schedules of ECLBC, we directly search for rotational-<sc>xor</small> distinguishers with different key schedules via an SAT-based method. Finally, we conclude a different result from previous works. This article implies that ECLBC and SIMON are in a tight connection in the design and security based on the affine equivalent property. We mention that the linear layer should be noticed and carefully designed to avoid a block cipher being equivalent to existed ciphers.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 14","pages":"27649-27659"},"PeriodicalIF":8.9000,"publicationDate":"2025-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Further Insights on the Cryptanalysis of Lightweight Block Cipher ECLBC\",\"authors\":\"Bo Yu;Da Lin;Guoqiang Liu;Liyi Xiong;Bing Sun\",\"doi\":\"10.1109/JIOT.2025.3566414\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"ECLBC is a family of lightweight block ciphers designed, especially for the Internet of Medical Things. The family contains two instances according to their block sizes, which are denoted by ECLBC-32 and ECLBC-64, respectively. ECLBC is based on substitution-permutation network structure with an involutive nonlinear layer as well as an involutive linear layer. In this article, we focus on the security of ECLBC against some attacks. Our strategy includes a direct approach and an indirect approach to make cryptanalysis of ECLBC. For differential, linear and integral attacks, we apply the attacks against SIMON to ECLBC by revealing the affine equivalent property between the two ciphers. The feasibility of such an indirect way relies on an important observation on the chosen linear layer of ECLBC, which results in a similar encryption procedure to SIMON. Thus, they have the same security against some cryptanalytic methods. We give a proof of the property in a mathematical manner and some better attacks than previous works by the designers are given. What’s more, to investigate the security of the new key schedules of ECLBC, we directly search for rotational-<sc>xor</small> distinguishers with different key schedules via an SAT-based method. Finally, we conclude a different result from previous works. This article implies that ECLBC and SIMON are in a tight connection in the design and security based on the affine equivalent property. We mention that the linear layer should be noticed and carefully designed to avoid a block cipher being equivalent to existed ciphers.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 14\",\"pages\":\"27649-27659\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-03-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10988586/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10988586/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

ECLBC是专为医疗物联网设计的轻量级分组密码系列。该家族根据其块大小包含两个实例,分别用ECLBC-32和ECLBC-64表示。ECLBC基于替换置换网络结构,具有对合非线性层和对合线性层。在本文中,我们将重点讨论ECLBC抵御某些攻击的安全性。我们的策略包括一种直接方法和一种间接方法来对ECLBC进行密码分析。对于微分、线性和积分攻击,我们通过揭示两个密码之间的仿射等价性质,将针对SIMON的攻击应用于ECLBC。这种间接方式的可行性依赖于对ECLBC所选择的线性层的重要观察,这导致了与SIMON相似的加密过程。因此,它们对某些密码分析方法具有相同的安全性。我们用数学方法证明了这一性质,并给出了一些比以往设计人员更好的攻击方法。此外,为了研究ECLBC新密钥调度的安全性,我们通过一种基于sat的方法直接搜索具有不同密钥调度的旋转异或区分符。最后,我们得出了一个不同于以往研究的结论。基于仿射等价的特性,本文认为ECLBC和SIMON在设计和安全性上有着紧密的联系。我们提到应该注意并仔细设计线性层,以避免分组密码等同于现有的密码。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Further Insights on the Cryptanalysis of Lightweight Block Cipher ECLBC
ECLBC is a family of lightweight block ciphers designed, especially for the Internet of Medical Things. The family contains two instances according to their block sizes, which are denoted by ECLBC-32 and ECLBC-64, respectively. ECLBC is based on substitution-permutation network structure with an involutive nonlinear layer as well as an involutive linear layer. In this article, we focus on the security of ECLBC against some attacks. Our strategy includes a direct approach and an indirect approach to make cryptanalysis of ECLBC. For differential, linear and integral attacks, we apply the attacks against SIMON to ECLBC by revealing the affine equivalent property between the two ciphers. The feasibility of such an indirect way relies on an important observation on the chosen linear layer of ECLBC, which results in a similar encryption procedure to SIMON. Thus, they have the same security against some cryptanalytic methods. We give a proof of the property in a mathematical manner and some better attacks than previous works by the designers are given. What’s more, to investigate the security of the new key schedules of ECLBC, we directly search for rotational-xor distinguishers with different key schedules via an SAT-based method. Finally, we conclude a different result from previous works. This article implies that ECLBC and SIMON are in a tight connection in the design and security based on the affine equivalent property. We mention that the linear layer should be noticed and carefully designed to avoid a block cipher being equivalent to existed ciphers.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信