Paper 2016/209

Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA

Ling Song, Zhangjie Huang, and Qianqian Yang

Abstract

In this paper, we focus on the automatic differential cryptanalysis of ARX block ciphers with respect to XOR-difference, and develop Mouha et al.'s framework for finding differential characteristics by adding a new method to construct long characteristics from short ones. The new method reduces the searching time a lot and makes it possible to search differential characteristics for ARX block ciphers with large word sizes such as $n=48,64$. What's more, we take the differential effect into consideration and find that the differential probability increases by a factor of $1.4\sim 8$ for SPECK and about $2^{10}$ for LEA when multiple characteristics are counted in. The efficiency of our method is demonstrated by improved attacks of SPECK and LEA, which attack 1, 1, 4 and 6 more rounds of SPECK48, SPECK64, SPECK96 and SPECK128, respectively, and 2 more rounds of LEA than previous works.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Minor revision. ACISP 2016
DOI
10.1007/978-3-319-40367-0_24
Keywords
Differential cryptanalysisautomatic searchARXSPECKLEA
Contact author(s)
songling @ iie ac cn
History
2017-07-04: last of 3 revisions
2016-02-29: received
See all versions
Short URL
https://ia.cr/2016/209
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/209,
      author = {Ling Song and Zhangjie Huang and Qianqian Yang},
      title = {Automatic Differential Analysis of {ARX} Block Ciphers with Application to {SPECK} and {LEA}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/209},
      year = {2016},
      doi = {10.1007/978-3-319-40367-0_24},
      url = {https://eprint.iacr.org/2016/209}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.