Algebraic methods in analyzing lightweight cryptographic symmetric primitives

نویسندگان

  • Master-Thesis von Michael Walter
  • Michael Walter
  • Johannes A. Buchmann
  • Stanislav Bulygin
  • Johannes Buchmann
چکیده

In this work we analyze two lightweight cryptographic primitives, the hash function SPONGENT and the block cipher EPCBC, using algebraic methods. Regarding SPONGENT, we are able to improve on previously known results by finding two semi-free-start collisions for round-reduced SPONGENT-88 with 6 rounds, and prove that no semifree-start collisions exist for SPONGENT-128 with 6 rounds. For EPCBC we are able to demonstrate practical attacks for both versions, EPCBC-48 and EPCBC-96, for up to 3 rounds. For EPCBC-48 we demonstrate weaknesses and find a theoretical attack up to round 8, which is 25% of the full cipher. We obtaine similar results for EPCBC-96 up to round 5 and identified a significant class of weak keys for 6 rounds. Furthermore, we introduce a novel method of optimizing guessing strategies using Mixed Integer Linear Programming and demonstrate its application to the two primitives under investigation, which leads to our results.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Process algebraic modeling of authentication protocols for analysis of parallel multi-session executions

Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...

متن کامل

Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives

Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks,...

متن کامل

The Design Space of Lightweight Cryptography

For constrained devices, standard cryptographic algorithms can be too big, too slow or too energy-consuming. The area of lightweight cryptography studies new algorithms to overcome these problems. In this paper, we will focus on symmetric-key encryption, authentication and hashing. Instead of providing a full overview of this area of research, we will highlight three interesting topics. Firstly...

متن کامل

The Role of Energy in the Lightweight Cryptographic Profile

NIST’s Lightweight Cryptography Project ties selected crypto­ graphic algorithms to a profile, which captures the physical, performance and security characteristics of the target devices that run these algorithms. This contribution investigates the role of energy in the profile. For many of the important application domains of Lightweight Cryptography, the opera­ tion is intermittent, rather th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012