Paper 2024/1908
Generalized Impossible Differential Attacks on Block Ciphers: Application to SKINNY and ForkSKINNY
Abstract
Impossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the guess-and-filtering method. At CRYPTO 2023, Boura \etal first proposed a new key recovery technique - the differential meet-in-the-middle attack, which recovers the key in a meet-in-the-middle manner. Inspired by this technique, we incorporate the meet-in-the-middle technique into impossible cryptanalysis and propose a generic impossible differential meet-in-the-middle attack (\idma) framework. We apply \idma to block ciphers \skinny, \skinnye-v2, and \forkskinny and achieve remarkably efficient attacks. We improve the impossible differential attack on \skinny-
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Impossible differential cryptanalysisMeet-in-the-middleKey recoverySKINNYForkSKINNY
- Contact author(s)
-
songling qs @ gmail com
fuqinggan @ stu2018 jnu edu cn
yangqianqian @ iie ac cn - History
- 2024-11-25: approved
- 2024-11-24: received
- See all versions
- Short URL
- https://ia.cr/2024/1908
- License
-
CC0
BibTeX
@misc{cryptoeprint:2024/1908, author = {Ling Song and Qinggan Fu and Qianqian Yang and Yin Lv and Lei Hu}, title = {Generalized Impossible Differential Attacks on Block Ciphers: Application to {SKINNY} and {ForkSKINNY}}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1908}, year = {2024}, url = {https://eprint.iacr.org/2024/1908} }