Paper 2021/661
Linear Cryptanalyses of Three AEADs with GIFT-128 as Underlying Primitives
Ling Sun, Wei Wang, and Meiqin Wang
Abstract
This paper considers the linear cryptanalyses of Authenticated Encryptions with Associated Data (AEADs) GIFT-COFB, SUNDAE-GIFT, and HyENA. All of these proposals take GIFT-128 as underlying primitives. The automatic search with the Boolean satisfiability problem (SAT) method is implemented to search for linear approximations that match the attack settings concerning these primitives. With the newly identified approximations, we launch key-recovery attacks on GIFT-COFB, SUNDAE-GIFT, and HyENA when the underlying primitives are replaced with 16-round, 17-round, and 16-round versions of GIFT-128. The resistance of GIFT-128 against linear cryptanalysis is also evaluated. We present a 24-round key-recovery attack on GIFT-128 with a newly obtained 19-round linear approximation. We note that the attack results in this paper are far from threatening the security of GIFT-COFB, SUNDAE-GIFT, HyENA, and GIFT-128.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. IACR-ToSC 2021 (Issue 2)
- Keywords
- Linear cryptanalysisGIFT-128GIFT-COFBSUNDAE-GIFTHyENA
- Contact author(s)
-
lingsun @ sdu edu cn
weiwangsdu @ sdu edu cn
mqwang @ sdu edu cn - History
- 2021-05-25: received
- Short URL
- https://ia.cr/2021/661
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2021/661, author = {Ling Sun and Wei Wang and Meiqin Wang}, title = {Linear Cryptanalyses of Three {AEADs} with {GIFT}-128 as Underlying Primitives}, howpublished = {Cryptology {ePrint} Archive, Paper 2021/661}, year = {2021}, url = {https://eprint.iacr.org/2021/661} }