Cryptology ePrint Archive: Report 2015/040

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN

Zahra Ahmadian and Shahram Rasoolzadeh and Mahmoud Salmasizadeh and Mohammad Reza Aref

Abstract: A few work has ever been performed in cryptanalysis of block ciphers using cube attacks. This paper presents a new framework for an efficient key recovery attack on block ciphers based on cube technique. In this method, a cube tester is positioned at the middle of the cipher which is extended in two directions over the maximum possible upper and lower rounds, given that some subkey bits are guessed. It is shown that an automated algorithm for this dynamic cube attack on block ciphers can be realized. Furthermore, we show its effectiveness on two lightweight block ciphers KATAN and SIMON. Our results shows that this method can break 117 and 152 out of 254 rounds of KATAN-32 in non-full-codebook and full-codebook attack scenarios, respectively. In the case of SIMON32/64, we succeed to cryptanalyse 16 and 18 out of 32 rounds, by the same scenarios. Both results show that although this method does not outperform all the existing attacks on these two ciphers, it can absolutely compete with the well-established and mature methods of cryptanalysis of block ciphers, such as linear, differential and meet in the middle attack families.

Category / Keywords: secret-key cryptography / block ciphers, cryptanalysis, cube attack, SIMON, KATAN

Date: received 16 Jan 2015, last revised 10 Sep 2016

Contact author: zahraahmadian at yahoo com

Available format(s): PDF | BibTeX Citation

Version: 20160910:101158 (All versions of this report)

Short URL: ia.cr/2015/040

Discussion forum: Show discussion | Start new discussion


[ Cryptology ePrint archive ]