计算机科学
钥匙(锁)
分组密码
计算机安全
差速器(机械装置)
密码
算法
密码学
加密
工程类
航空航天工程
作者
Muzhou Li,L. Sun,Meiqin Wang
标识
DOI:10.1007/978-3-031-17433-9_9
摘要
AbstractOrthros is a low-latency keyed pseudo-random function designed by Banik et al. in FSE 2022. It adopts the parallel structure composed of two keyed permutations. Both branches take the same 128-bit input and their outputs are XORed to generate the final 128-bit output. Benefiting from this special structure, it’s security is hard to evaluate, especially for key recovery attacks. In its specification, the most effective distinguisher proposed is a 7-round integral one. However, it can only lead to key recovery attacks worse than exhaustive attack. Besides, there is no key recovery attack presented in the design document. Therefore, we are motivated to see whether a valid key recovery attack exists and how powerful it can be. In this paper, we aim to proceed differential and differential-linear key recovery attacks on Orthros. To deal with the special structure, we introduce two automated key recovery attack frameworks that work for such two-branch ciphers. With the help of them, we finally got a 7-round differential-linear key recovery attack and a 6-round differential one. Both attacks are the first key recovery attacks on this cipher. However, they are so far from threatening its full-round security.KeywordsDifferential-linearDifferentialAutomated key recovery attack
科研通智能强力驱动
Strongly Powered by AbleSci AI