You are looking at a specific version 20180820:182322 of this paper. See the latest version.

Paper 2018/763

Block Cipher Invariants as Eigenvectors of Correlation Matrices

Tim Beyne

Abstract

A new approach to invariant subspaces and nonlinear invariants is developed. This results in both theoretical insights and practical attacks on block ciphers. It is shown that, with minor modifications to some of the round constants, Midori-64 has a nonlinear invariant with $2^{96}$ corresponding weak keys. Furthermore, this invariant corresponds to a linear hull with maximal correlation. By combining the new invariant with integral cryptanalysis, a practical key-recovery attack on 10 rounds of unmodified Midori-64 is obtained. The attack works for $2^{96}$ weak keys and irrespective of the choice of round constants. The data complexity is $1.25 \cdot 2^{21}$ chosen plaintexts and the computational cost is dominated by $2^{56}$ block cipher calls. Finally, it is shown that similar techniques lead to a practical key-recovery attack on MANTIS-4. The full key is recovered using 640 chosen plaintexts and the attack requires about $2^{56}$ block cipher calls.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published by the IACR in ASIACRYPT 2018
Keywords
invariant subspace attacknonlinear invariant attacklinear cryptanalysisintegral crypanalysiscorrelation matricesMidori-64MANTIS
Contact author(s)
tim beyne @ student kuleuven be
History
2019-11-18: revised
2018-08-20: received
See all versions
Short URL
https://ia.cr/2018/763
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.