2020
DOI: 10.46586/tosc.v2020.i4.147-172
|View full text |Cite
|
Sign up to set email alerts
|

Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers

Abstract: Limited birthday distinguishers (LBDs) are widely used tools for the cryptanalysis of cryptographic permutations. In this paper we propose LBDs on several variants of the sLiSCP permutation family that are building blocks of two round 2 candidates of the NIST lightweight standardization process: Spix and SpoC. We improve the number of steps with respect to the previously known best results, that used rebound attack. We improve the techniques used for solving the middle part, called inbound, and we relax the ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The following problem is very common in symmetric cryptanalysis. It appears for example in impossible differential attacks [5], but also in rebound distinguishers [14]. In the former case we use generic algorithms to solve the problem for a black-box E, and in the latter, a valid distinguisher for E is defined as an algorithm outputting the pairs faster than the generic one.…”
Section: Solving the Limited Birthday Problemmentioning
confidence: 99%
See 1 more Smart Citation
“…The following problem is very common in symmetric cryptanalysis. It appears for example in impossible differential attacks [5], but also in rebound distinguishers [14]. In the former case we use generic algorithms to solve the problem for a black-box E, and in the latter, a valid distinguisher for E is defined as an algorithm outputting the pairs faster than the generic one.…”
Section: Solving the Limited Birthday Problemmentioning
confidence: 99%
“…For example, the subproblem in lattice sieving of finding multiple close vectors to a target vector mentioned before can be seen as a special case. The limitedbirthday problem, which appears in symmetric cryptanalysis (e.g., impossible differential attacks [5] and rebound distinguishers [14]) is another example.…”
Section: Introductionmentioning
confidence: 99%
“…SPIX and one of the SpoC variants use similar sLiSCP-light- [256] permutations. Differential characteristics [214][215][216] and distinguishers [217] on sLiSCPlight [256], summarized in Section 3.2.26, are also applicable to SPIX.…”
Section: Spixmentioning
confidence: 99%
“…A key recovery attack on full SpoC-64 was presented that does not violate the security claims due to large data requirements. Hosoyamada et al [217] described limited-birthday distinguishers over 15 steps of sLiSCP-light that can be used to mount attacks on 15-step and 16-step variants of the permutations. These attacks on the permutation do not pose an immediate threat to the SpoC submission, as they do not take the mode into account.…”
Section: Spocmentioning
confidence: 99%
“…Note that both f and f ´1 are accessible, and the complexity of finding a solution will depend on the values of d in and d out . The algorithm proposed in [55] has been proven to match the lower bound complexity for the limited birthday problem in [68] for a black-box function and in [62] for a black-box permutation. We refer to [55] for an optimal algorithm and Theorem 1 for its time complexity.…”
Section: 23c Limited Birthday Distinguishermentioning
confidence: 99%