{"title":"寻找差分特征聚类的并行SAT框架及其应用","authors":"Kosei Sakamoto , Ryoma Ito , Takanori Isobe","doi":"10.1016/j.jisa.2025.104203","DOIUrl":null,"url":null,"abstract":"<div><div>The most crucial but time-consuming task for differential cryptanalysis is to find a differential with a high probability. To tackle this task, we propose a new SAT-based automatic search framework developed to efficiently determine the differential with the highest probability under a specified condition. Conventional SAT-based methods have primarily aimed to accelerate the search for an optimal single differential characteristic or to evaluate the clustering effect for a specific input–output difference. However, methods tailored to the former purpose are often not optimized to evaluate the clustering effect. Meanwhile, methods developed for the latter purpose lack comprehensive search capabilities and, therefore, have difficulty identifying a differential with the highest probability. Our framework leverages a multi-threading technique to solve incremental SAT problems in parallel, offering the following advantages over previous methods: (1) speedy identification of the differential with the highest probability under the specified conditions; (2) efficient construction of the truncated differential with the highest probability from multiple obtained differentials; and (3) applicability to a wide class of symmetric-key primitives. To demonstrate the effectiveness of our framework, we apply it to various low-latency primitives, including block ciphers (<span>PRINCE</span> and <span>PRINCEv2</span>) and tweakable block ciphers (<span>QARMA</span> and <span>QARMAv2</span>). We have successfully determined the tight differential bounds for all variants of the target ciphers within a practical time, identifying the longest distinguisher for all the variants, excluding <span>QARMAv2</span> under the related-tweak setting. Besides, we have uncovered significant differences in the behavior of differential between <span>PRINCE</span> and <span>QARMA</span>, particularly concerning the clustering effect. Our findings shed light on the new structural properties of these important primitives. In the context of key recovery attacks, our framework allows the derivation of key-recovery-friendly truncated differentials for all variants of <span>QARMA</span>. Consequently, we report key recovery attacks based on (truncated) differential cryptanalysis on <span>QARMA</span> under the related-tweak setting for the first time. demonstrating that these key recovery attacks are competitive with existing attacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"94 ","pages":"Article 104203"},"PeriodicalIF":3.7000,"publicationDate":"2025-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Parallel SAT framework to find clustering of differential characteristics and its applications\",\"authors\":\"Kosei Sakamoto , Ryoma Ito , Takanori Isobe\",\"doi\":\"10.1016/j.jisa.2025.104203\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>The most crucial but time-consuming task for differential cryptanalysis is to find a differential with a high probability. To tackle this task, we propose a new SAT-based automatic search framework developed to efficiently determine the differential with the highest probability under a specified condition. Conventional SAT-based methods have primarily aimed to accelerate the search for an optimal single differential characteristic or to evaluate the clustering effect for a specific input–output difference. However, methods tailored to the former purpose are often not optimized to evaluate the clustering effect. Meanwhile, methods developed for the latter purpose lack comprehensive search capabilities and, therefore, have difficulty identifying a differential with the highest probability. Our framework leverages a multi-threading technique to solve incremental SAT problems in parallel, offering the following advantages over previous methods: (1) speedy identification of the differential with the highest probability under the specified conditions; (2) efficient construction of the truncated differential with the highest probability from multiple obtained differentials; and (3) applicability to a wide class of symmetric-key primitives. To demonstrate the effectiveness of our framework, we apply it to various low-latency primitives, including block ciphers (<span>PRINCE</span> and <span>PRINCEv2</span>) and tweakable block ciphers (<span>QARMA</span> and <span>QARMAv2</span>). We have successfully determined the tight differential bounds for all variants of the target ciphers within a practical time, identifying the longest distinguisher for all the variants, excluding <span>QARMAv2</span> under the related-tweak setting. Besides, we have uncovered significant differences in the behavior of differential between <span>PRINCE</span> and <span>QARMA</span>, particularly concerning the clustering effect. Our findings shed light on the new structural properties of these important primitives. In the context of key recovery attacks, our framework allows the derivation of key-recovery-friendly truncated differentials for all variants of <span>QARMA</span>. Consequently, we report key recovery attacks based on (truncated) differential cryptanalysis on <span>QARMA</span> under the related-tweak setting for the first time. demonstrating that these key recovery attacks are competitive with existing attacks.</div></div>\",\"PeriodicalId\":48638,\"journal\":{\"name\":\"Journal of Information Security and Applications\",\"volume\":\"94 \",\"pages\":\"Article 104203\"},\"PeriodicalIF\":3.7000,\"publicationDate\":\"2025-09-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Information Security and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2214212625002406\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212625002406","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Parallel SAT framework to find clustering of differential characteristics and its applications
The most crucial but time-consuming task for differential cryptanalysis is to find a differential with a high probability. To tackle this task, we propose a new SAT-based automatic search framework developed to efficiently determine the differential with the highest probability under a specified condition. Conventional SAT-based methods have primarily aimed to accelerate the search for an optimal single differential characteristic or to evaluate the clustering effect for a specific input–output difference. However, methods tailored to the former purpose are often not optimized to evaluate the clustering effect. Meanwhile, methods developed for the latter purpose lack comprehensive search capabilities and, therefore, have difficulty identifying a differential with the highest probability. Our framework leverages a multi-threading technique to solve incremental SAT problems in parallel, offering the following advantages over previous methods: (1) speedy identification of the differential with the highest probability under the specified conditions; (2) efficient construction of the truncated differential with the highest probability from multiple obtained differentials; and (3) applicability to a wide class of symmetric-key primitives. To demonstrate the effectiveness of our framework, we apply it to various low-latency primitives, including block ciphers (PRINCE and PRINCEv2) and tweakable block ciphers (QARMA and QARMAv2). We have successfully determined the tight differential bounds for all variants of the target ciphers within a practical time, identifying the longest distinguisher for all the variants, excluding QARMAv2 under the related-tweak setting. Besides, we have uncovered significant differences in the behavior of differential between PRINCE and QARMA, particularly concerning the clustering effect. Our findings shed light on the new structural properties of these important primitives. In the context of key recovery attacks, our framework allows the derivation of key-recovery-friendly truncated differentials for all variants of QARMA. Consequently, we report key recovery attacks based on (truncated) differential cryptanalysis on QARMA under the related-tweak setting for the first time. demonstrating that these key recovery attacks are competitive with existing attacks.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.