Paper 2021/1179
Improved Attacks on GIFT-64
Ling Sun, Wei Wang, and Meiqin Wang
Abstract
One of the well-known superiorities of GIFT-64 over PRESENT lies in the correction of the strong linear hull effect. However, apart from the investigation of the 9-round linear hull effect in the design document, we find no linear attack result on GIFT-64. Although we do not doubt the security of GIFT-64 regarding the linear cryptanalysis, the actual resistance of the cipher to the linear attack should be evaluated since it promotes a comprehensive perception of the soundness of GIFT-64. Motivated by this observation, we implement an automatic search and find a 12-round linear distinguisher whose dominating trail is an optimal linear characteristic. Following that, the first 19-round linear attack is launched by utilising the newly identified distinguisher. On the other side, we notice that the previous differential attack of GIFT-64 covering 20 rounds claims the entire codebook. To reduce the data complexity of the 20-round attack, we apply the automatic method to exhaustively check 13-round differential trails with probabilities no less than
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. SAC 2021
- Keywords
- Linear cryptanalysisDifferential cryptanalysisGIFT-64
- Contact author(s)
-
lingsun @ sdu edu cn
weiwangsdu @ sdu edu cn
mqwang @ sdu edu cn - History
- 2021-09-14: received
- Short URL
- https://ia.cr/2021/1179
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/1179, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Improved Attacks on {GIFT}-64}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/1179}, year = {2021}, url = {https://eprint.iacr.org/2021/1179} }