Algebraic methods in analyzing lightweight cryptographic symmetric primitives
نویسندگان
چکیده
In this work we analyze two lightweight cryptographic primitives, the hash function SPONGENT and the block cipher EPCBC, using algebraic methods. Regarding SPONGENT, we are able to improve on previously known results by finding two semi-free-start collisions for round-reduced SPONGENT-88 with 6 rounds, and prove that no semifree-start collisions exist for SPONGENT-128 with 6 rounds. For EPCBC we are able to demonstrate practical attacks for both versions, EPCBC-48 and EPCBC-96, for up to 3 rounds. For EPCBC-48 we demonstrate weaknesses and find a theoretical attack up to round 8, which is 25% of the full cipher. We obtaine similar results for EPCBC-96 up to round 5 and identified a significant class of weak keys for 6 rounds. Furthermore, we introduce a novel method of optimizing guessing strategies using Mixed Integer Linear Programming and demonstrate its application to the two primitives under investigation, which leads to our results.
منابع مشابه
Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives
Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...
متن کاملProcess algebraic modeling of authentication protocols for analysis of parallel multi-session executions
Many security protocols have the aim of authenticating one agent acting as initiator to another agent acting as responder and vice versa. Sometimes, the authentication fails because of executing several parallel sessions of a protocol, and because an agent may play both the initiator and responder role in parallel sessions. We take advantage of the notion of transition systems to specify authen...
متن کاملStatistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives
Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks,...
متن کاملThe Design Space of Lightweight Cryptography
For constrained devices, standard cryptographic algorithms can be too big, too slow or too energy-consuming. The area of lightweight cryptography studies new algorithms to overcome these problems. In this paper, we will focus on symmetric-key encryption, authentication and hashing. Instead of providing a full overview of this area of research, we will highlight three interesting topics. Firstly...
متن کاملThe Role of Energy in the Lightweight Cryptographic Profile
NIST’s Lightweight Cryptography Project ties selected crypto graphic algorithms to a profile, which captures the physical, performance and security characteristics of the target devices that run these algorithms. This contribution investigates the role of energy in the profile. For many of the important application domains of Lightweight Cryptography, the opera tion is intermittent, rather th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012