基于MILP的11轮INLEC的中间相遇分析
MILP-Based for Meet-in-the-Middle Attack of 11-Round INLEC
DOI: 10.12677/mos.2025.144311, PDF,   
作者: 曾衡顺, 刘 亚*:上海理工大学光电信息与计算机工程学院,上海;赵逢禹:上海出版印刷高等专科学校信息与智能工程系,上海;刘先蓓:安徽财经大学统计与应用数学学院,安徽 蚌埠;曲 博:港专学院网络空间科技学院,香港
关键词: INLEC中间相遇分析混合整数线性规划轻量级分组密码INLEC Meet-in-the-Middle Attack Mixed Integer Linear Programming Lightweight Block Cipher
摘要: INLEC是专为物联网环境设计的新的轻量级分组密码算法,为了保障它在物联网环境中的安全性,就必须研究其安全强度。本文提出了基于MILP的11轮INLEC的中间相遇分析。首先基于INLEC算法,建立了混合整数线性规划的搜索模型,找到若干条5轮INLEC中间相遇区分器;其次,根据分析过程中猜测密钥位数最少原则,选取1条中间相遇区分器,并往前扩展2轮,往后扩展4轮,构造出11轮INLEC中间相遇分析路径;最后基于该路径恢复出完全的密钥。整个分析过程的时间复杂度为2115.17次加密,数据复杂度为261个选择明文,存储复杂度为281个64比特块。该结果为首个INLEC第三方安全性分析成果。
Abstract: INLEC is a lightweight block cipher for resource-constrained Internet of Things environments. Thus, it is essential to evaluate its security boundary further. Our research proposes a meet-in-the-middle attack on 11-round INLEC based on the MILP automated search algorithm. First, by studying the structure of INLEC, we construct an automated search model of INLEC based on Mixed Integer Linear Programming to find five-round meet-in-the-middle distinguishers of INLEC. Then, we exploit the redundancy of INLEC’s key schedule and select one good distinguisher according to the fewest guessed subkeys in the key recovery phase. Add one round and four rounds on the top and bottom of this distinguisher to construct a 11-round meet-in-the-middle attack path. Finally, we recover the master key with a time complexity of 2115.17 encryptions, a data complexity of 261 chosen plaintexts, and a memory complexity of 281 64-bit blocks. This work represents the first third-party security analysis result for INLEC.
文章引用:曾衡顺, 刘亚, 赵逢禹, 刘先蓓, 曲博. 基于MILP的11轮INLEC的中间相遇分析[J]. 建模与仿真, 2025, 14(4): 579-592. https://doi.org/10.12677/mos.2025.144311

参考文献

[1] Beierle, C., Leander, G., Moradi, A. and Rasoolzadeh, S. (2019) CRAFT: Lightweight Tweakable Block Cipher with Efficient Protection against DFA Attacks. IACR Transactions on Symmetric Cryptology, 1, 5-45. [Google Scholar] [CrossRef
[2] Wu, W. and Zhang, L. (2011) Lblock: A Lightweight Block Cipher. In: Lecture Notes in Computer Science, Springer, 327-344. [Google Scholar] [CrossRef
[3] Bansod, G., Pisharoty, N. and Patil, A. (2016) PICO: An Ultra Lightweight and Low Power Encryption Design for Ubiquitous Computing. Defence Science Journal, 66, Article 259. [Google Scholar] [CrossRef
[4] 贾珂婷, 董晓阳, 魏淙洺, 等. 分组密码算法FESH [J]. 密码学报, 2019, 6(6): 713-726.
[5] 冯秀涛, 曾祥勇, 张凡, 等. 轻量级分组密码算法FBC [J]. 密码学报, 2019, 6(6): 768-785.
[6] Mouha, N., Wang, Q., Gu, D. and Preneel, B. (2012) Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming. In: Lecture Notes in Computer Science, Springer, 57-76. [Google Scholar] [CrossRef
[7] Feng, J., Li, L., Yan, L. and Deng, C. (2024) INLEC: An Involutive and Low Energy Lightweight Block Cipher for Internet of Things. Pervasive and Mobile Computing, 105, Article 101991. [Google Scholar] [CrossRef
[8] Diffie, W. and Hellman, M.E. (1977) Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, 10, 74-84. [Google Scholar] [CrossRef
[9] Joan, D. and Vincent, R. (2002) The Design of Rijndael: AES-the Advanced Encryption Standard. In: Information Security and Cryptography, Springer, 126.
[10] Banik, S., Bogdanov, A., Isobe, T., Shibutani, K., Hiwatari, H., Akishita, T., et al. (2015) Midori: A Block Cipher for Low Energy. In: Lecture Notes in Computer Science, Springer, 411-436. [Google Scholar] [CrossRef