飞镖攻击
计算机科学
分组密码
密码
密码分析
算法
算术
矩形
数学
理论计算机科学
差分密码分析
密码学
加密
计算机安全
几何学
作者
Dongyeong Kim,Dawoon Kwon,Jung-Hwan Song
标识
DOI:10.1587/transfun.2019eap1083
摘要
The boomerang connectivity table (BCT) was introduced by C. Cid et al. Using the BCT, for SPN block cipher, the dependency between sub-ciphers in boomerang structure can be computed more precisely. However, the existing method to generate BCT is difficult to be applied to the ARX-based cipher, because of the huge domain size. In this paper, we show a method to compute the dependency between sub-ciphers in boomerang structure for modular addition. Using bit relation in modular addition, we compute the dependency sequentially in bitwise. And using this method, we find boomerang characteristics and amplified boomerang characteristics for the ARX-based ciphers LEA and SPECK. For LEA-128, we find a reduced 15-round boomerang characteristic and reduced 16-round amplified boomerang characteristic which is two rounds longer than previous boomerang characteristic. Also for SPECK64/128, we find a reduced 13-round amplified boomerang characteristic which is one round longer than previous rectangle characteristic.
科研通智能强力驱动
Strongly Powered by AbleSci AI