基于MILP的BORON中间相遇分析
MILP-Based for Middle-Meeting Cryptanalysis of BORON
DOI: 10.12677/mos.2024.133234, PDF,    国家自然科学基金支持
作者: 付 豪, 刘 亚:上海理工大学光电信息与计算机工程学院,上海;赵逢禹:上海出版印刷高等专科学校信息与智能工程系,上海;曲 博:广东科技学院计算机学院,广东 东莞
关键词: 轻量级分组密码中间相遇攻击SPN结构混合整数线性规划BORONLightweight Block Cipher The Middle-Meeting Attack The SPN Structure Mixed Integer Linear Programming BORON
摘要: BORON是新设计的超轻量级分组密码,被广泛应用于资源受限的设备中保护数据安全,然而受计算和存储资源限制,设计者可能为了追求高的软硬件实现效率而适度降低安全性。为了保障它在实际系统中有足够安全强度,需要评估BORON抵抗各种密码分析方法的能力。本文分析了BORON抵抗中间相遇攻击的能力。具体来说,利用混合整数线性规划自动化搜索算法,找到多条5轮中间相遇差分链,在此基础上构造了9轮的中间相遇分析路径,基于该路径最后恢复9轮BORON的密钥。整个攻击需要的时间、数据和存储复杂度分别为295.84次9轮加密、242.00个选择明文和294.90个64比特块。此结果是对BORON安全性分析的重要补充。
Abstract: BORON is a recently designed ultra-lightweight block cipher that is widely used to protect data security in resource-constrained devices; however, due to computational and storage resource constraints, designers may moderately reduce the security in order to pursue high hardware and software implementation efficiency. In order to guarantee its sufficient security strength in real systems, it is necessary to evaluate the ability of BORON to resist various cryptanalysis methods. In this paper, we analyse the ability of BORON to resist the middle-meeting attacks. Specifically, multiple 5-round middle-meeting differential chains are found using mixed-integer linear programming automated search algorithms, the 5 rounds of middle-meeting differential distinguisher based on the 9 rounds of middle-meeting differential attack, the 9 rounds of middle-meeting differential cryptanalysis of the BORON-128 requires time, data, memory complexities of 295.84 9-round encryption times, 242.00 chosen plaintext and 294.90 64-bit blocks; The attack results providing an important supplement to the security analysis of BORON.
文章引用:付豪, 刘亚, 赵逢禹, 曲博. 基于MILP的BORON中间相遇分析[J]. 建模与仿真, 2024, 13(3): 2568-2578. https://doi.org/10.12677/mos.2024.133234

参考文献

[1] 杜小妮, 王香玉, 梁丽芳, 等. 轻量级分组密码Piccolo的量子密码分析[J]. 通信学报, 2023, 44(6): 175-182.
[2] 黄湘蜀, 王敏, 杜之波, 等. 针对轻量级分组密码算法PRESENT的随机差分故障攻击[J]. 成都信息工程大学学报, 2022, 37(1): 8-15. [Google Scholar] [CrossRef
[3] Borghoff, J., Canteaut, A., Güneysu, T., et al. (2012) Prince—A Low-Latency Block Cipher for Pervasive Computing Applications. Advances in CryptologyASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, 2-6 December 2012, 208-225. [Google Scholar] [CrossRef
[4] 孟娇, 李濛, 胡晓波, 等. 轻量级LBlock算法硬件实现与研究[J]. 电力信息与通信技术, 2023, 21(3): 47-52. [Google Scholar] [CrossRef
[5] Beierle, C., Leander, G., Moradi, A., et al. (2019) Craft: Lightweight Tweakable Block Cipher Withefficient Protection against DFA Attacks. IACRTransactions on Symmetric Cryptology, 2019, 5-45. [Google Scholar] [CrossRef
[6] Bansod, G., Pisharoty, N. and Patil, A. (2017) BORON: An Ultra-Lightweight and Low Power Encryption Design for Pervasive Computing. Frontiers of Information Technology & Electronic Engineering, 18, 317-331. [Google Scholar] [CrossRef
[7] Liang, H. and Wang, M. (2019) Cryptanalysis of the Lightweight Block Cipher BORON. Security and Communication Networks, 2019, 1-12. [Google Scholar] [CrossRef
[8] Li, Y., Liang, M., Lin, H., et al. (2020) Integral Attack on Reduced-Round BORON Based on Bit-Based Division Property. Journal of Physics: Conference Series, 1486, Article ID: 022016. [Google Scholar] [CrossRef
[9] Wu, X.N., Li, Y.X., Li, L.C., et al. (2022) Impossible Differential Cryptanalysis of BORON. Journal of Information Science & Engineering, 38, 805-819.
[10] Diffie, W. and Hellman, M.E. (1977) Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard. Computer, 10, 74-84. [Google Scholar] [CrossRef
[11] Li, R. and Jin, C. (2016) Meet-in-the-Middle Attacks on 10-Round AES-256. Designs, Codes and Cryptography, 80, 459-471. [Google Scholar] [CrossRef
[12] Sun, S., Hu, L., Wang, P., et al. (2014) Automatic Security Evaluation and (Related-Key) Differential Characteristic Search: Application to SIMON, PRESENT, LBlock, DES (L) and Other Bit-Oriented Block Ciphers. Advances in CryptologyASIACRYPT 2014: 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, 7-11 December 2014, 158-178. [Google Scholar] [CrossRef
[13] Sasaki, Y. and Todo, Y. (2017) New Algorithm for Modeling S-Box in MILP Based Differential and Division Trail Search. Innovative Security Solutions for Information Technology and Communications: 10th International Conference, SecITC 2017, Bucharest, 8-9 June 2017, 150-165. [Google Scholar] [CrossRef