Paper 2014/699

Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)

Christina Boura, María Naya-Plasencia, and Valentin Suder

Abstract

Impossible differential cryptanalysis has shown to be a very powerful form of cryptanalysis against block ciphers. These attacks, even if extensively used, remain not fully understood because of their high technicality. Indeed, numerous are the applications where mistakes have been discovered or where the attacks lack optimality. This paper aims in a first step at formalizing and improving this type of attacks and in a second step at applying our work to block ciphers based on the Feistel construction. In this context, we derive generic complexity analysis formulas for mounting such attacks and develop new ideas for optimizing impossible differential cryptanalysis. These ideas include for example the testing of parts of the internal state for reducing the number of involved key bits. We also develop in a more general way the concept of using multiple differential paths, an idea introduced before in a more restrained context. These advances lead to the improvement of previous attacks against well known ciphers such as CLEFIA-128 and Camellia, while also to new attacks against 23-round LBlock and all members of the Simon family.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
A major revision of an IACR publication in ASIACRYPT 2014
Keywords
block ciphersimpossible differential attacksCLEFIACamelliaLBlockSimon.
Contact author(s)
valentin suder @ inria fr
History
2014-09-09: revised
2014-09-05: received
See all versions
Short URL
https://ia.cr/2014/699
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/699,
      author = {Christina Boura and María Naya-Plasencia and Valentin Suder},
      title = {Scrutinizing and Improving Impossible Differential Attacks: Applications to CLEFIA, Camellia, LBlock and Simon (Full Version)},
      howpublished = {Cryptology ePrint Archive, Paper 2014/699},
      year = {2014},
      note = {\url{https://eprint.iacr.org/2014/699}},
      url = {https://eprint.iacr.org/2014/699}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.