Paper 2024/1908

Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY

Ling Song, College of Cyber Security, Jinan University, Guangzhou, China
Qinggan Fu, College of Cyber Security, Jinan University, Guangzhou, China
Qianqian Yang, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Yin Lv, College of Computer Science, South China Normal University, Guangzhou, China
Lei Hu, Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China
Abstract

Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the guess-and-filtering method. At CRYPTO 2023, Boura \etal first proposed a new key recovery technique - the differential meet-in-the-middle attack, which recovers the key in a meet-in-the-middle manner. Inspired by this technique, we incorporate the meet-in-the-middle technique into impossible cryptanalysis and propose a generic impossible differential meet-in-the-middle attack (\idma) framework. We apply \idma to block ciphers \skinny, \skinnye-v2, and \forkskinny and achieve remarkably efficient attacks. We improve the impossible differential attack on \skinny-$n$-$3n$ by 2 rounds in the single-tweakey setting and 1 round in the related-tweakey setting. For \skinnye-v2, the impossible differential attacks now can cover 2 more rounds in the related-tweakey setting and the first 23/24/25-round attacks in the single-tweakey model are given. For \forkskinny-$n$-$3n$, we improve the attacks by 2 rounds in the limited setting specified by the designers and 1 round in relaxed settings. These results confirm that the meet-in-the-middle technique can result in more efficient key recovery, reaching beyond what traditional methods can achieve on certain ciphers.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Impossible differential cryptanalysisMeet-in-the-middleKey recoverySKINNYForkSKINNY
Contact author(s)
songling qs @ gmail com
fuqinggan @ stu2018 jnu edu cn
yangqianqian @ iie ac cn
History
2024-11-25: approved
2024-11-24: received
See all versions
Short URL
https://ia.cr/2024/1908
License
No rights reserved
CC0

BibTeX

@misc{cryptoeprint:2024/1908,
      author = {Ling Song and Qinggan Fu and Qianqian Yang and Yin Lv and Lei Hu},
      title = {Generalized Impossible Differential Attacks on Block Ciphers: Application to {SKINNY} and {ForkSKINNY}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1908},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1908}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.