Paper 2022/1147
Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks
Abstract
Impossible differential (ID), zero-correlation (ZC), and integral attacks are a family of important attacks on block ciphers. For example, the impossible differential attack was the first cryptanalytic attack on 7 rounds of AES. Evaluating the security of block ciphers against these attacks is very important but also challenging: Finding these attacks usually implies a combinatorial optimization problem involving many parameters and constraints that is very hard to solve using manual approaches. Automated solvers, such as Constraint Programming (CP) solvers, can help the cryptanalyst to find suitable attacks. However, previous CP-based methods focus on finding only the ID, ZC, and integral distinguishers, often only in a limited search space. Notably, none can be extended to a unified optimization problem for finding full attacks, including efficient key-recovery steps.
In this paper, we present a new CP-based method to search for ID, ZC, and integral distinguishers and extend it to a unified constraint optimization problem for finding full ID, ZC, and integral attacks. To show the effectiveness and usefulness of our method, we applied it to several block ciphers, including SKINNY, CRAFT, SKINNYe-v2, and SKINNYee. For the ISO standard block cipher SKINNY, we significantly improve all existing ID, ZC, and integral attacks. In particular, we improve the integral attacks on SKINNY-
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- A major revision of an IACR publication in EUROCRYPT 2023
- DOI
- 10.1007/978-3-031-30634-1_5
- Keywords
- Impossible-differential attacksZero-correlation attacksIntegral attacksSKINNYSKINNYe-v2SKINNYeeCRAFTDeoxys-BCCP
- Contact author(s)
-
hsn hadipour @ gmail com
s sadeghi khu @ gmail com
maria eichlseder @ iaik tugraz at - History
- 2024-06-16: last of 8 revisions
- 2022-09-04: received
- See all versions
- Short URL
- https://ia.cr/2022/1147
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1147, author = {Hosein Hadipour and Sadegh Sadeghi and Maria Eichlseder}, title = {Finding the Impossible: Automated Search for Full Impossible-Differential, Zero-Correlation, and Integral Attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1147}, year = {2022}, doi = {10.1007/978-3-031-30634-1_5}, url = {https://eprint.iacr.org/2022/1147} }