Security of Related-Key Differential Attacks on TWINE, Revisited
In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evalu...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Communications and Computer Sciences, 2020/01/01, Vol.E103.A(1), pp.212-214 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 214 |
---|---|
container_issue | 1 |
container_start_page | 212 |
container_title | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
container_volume | E103.A |
creator | SAKAMOTO, Kosei MINEMATSU, Kazuhiko SHIBATA, Nao SHIGERI, Maki KUBO, Hiroyasu FUNABIKI, Yuki ISOBE, Takanori |
description | In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evaluation of TWINE with a 128-bit key in the related-key setting, which was infeasible due to the high computation cost in the original proposal. |
doi_str_mv | 10.1587/transfun.2019CIL0004 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2331866808</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2331866808</sourcerecordid><originalsourceid>FETCH-LOGICAL-c470t-797fabbd7a0783db3a8845ab430263db480858bdab3f579c7862a08220e2bf353</originalsourceid><addsrcrecordid>eNpNkE1Lw0AQhhdRsFb_gYeAV1NnP5Ld3Cy1arEo1IrHZZLsampN6u5G6L83Ult7mhl4nnfgJeScwoAmSl4Fh7W3bT1gQLPRZAoA4oD0qBRJTDmXh6QHGU1jlYA6JifeLwCoYlT0yPWzKVpXhXXU2GhmlhhMGT-YdXRTWWucqUOFy2gYAhYfPmrqaP46eRxfduh35asOPiVHFpfenP3NPnm5Hc9H9_H06W4yGk7jQkgIscykxTwvJYJUvMw5KiUSzAUHlna3UKASlZeYc5vIrJAqZQiKMTAstzzhfXKxyV255qs1PuhF07q6e6kZ51SlaZfQUWJDFa7x3hmrV676RLfWFPRvV3rbld7rqtNmG23hA76ZnYQuVMXS_EtjClwPNd0ueyE7uHhHp03NfwCIGnqX</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2331866808</pqid></control><display><type>article</type><title>Security of Related-Key Differential Attacks on TWINE, Revisited</title><source>J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese</source><creator>SAKAMOTO, Kosei ; MINEMATSU, Kazuhiko ; SHIBATA, Nao ; SHIGERI, Maki ; KUBO, Hiroyasu ; FUNABIKI, Yuki ; ISOBE, Takanori</creator><creatorcontrib>SAKAMOTO, Kosei ; MINEMATSU, Kazuhiko ; SHIBATA, Nao ; SHIGERI, Maki ; KUBO, Hiroyasu ; FUNABIKI, Yuki ; ISOBE, Takanori</creatorcontrib><description>In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evaluation of TWINE with a 128-bit key in the related-key setting, which was infeasible due to the high computation cost in the original proposal.</description><identifier>ISSN: 0916-8508</identifier><identifier>EISSN: 1745-1337</identifier><identifier>DOI: 10.1587/transfun.2019CIL0004</identifier><language>eng</language><publisher>Tokyo: The Institute of Electronics, Information and Communication Engineers</publisher><subject>active sbox ; block cipher ; Encryption ; MILP ; related-key security ; Search algorithms ; Security</subject><ispartof>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, Vol.E103.A(1), pp.212-214</ispartof><rights>2020 The Institute of Electronics, Information and Communication Engineers</rights><rights>Copyright Japan Science and Technology Agency 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c470t-797fabbd7a0783db3a8845ab430263db480858bdab3f579c7862a08220e2bf353</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1876,27903,27904</link.rule.ids></links><search><creatorcontrib>SAKAMOTO, Kosei</creatorcontrib><creatorcontrib>MINEMATSU, Kazuhiko</creatorcontrib><creatorcontrib>SHIBATA, Nao</creatorcontrib><creatorcontrib>SHIGERI, Maki</creatorcontrib><creatorcontrib>KUBO, Hiroyasu</creatorcontrib><creatorcontrib>FUNABIKI, Yuki</creatorcontrib><creatorcontrib>ISOBE, Takanori</creatorcontrib><title>Security of Related-Key Differential Attacks on TWINE, Revisited</title><title>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</title><addtitle>IEICE Trans. Fundamentals</addtitle><description>In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evaluation of TWINE with a 128-bit key in the related-key setting, which was infeasible due to the high computation cost in the original proposal.</description><subject>active sbox</subject><subject>block cipher</subject><subject>Encryption</subject><subject>MILP</subject><subject>related-key security</subject><subject>Search algorithms</subject><subject>Security</subject><issn>0916-8508</issn><issn>1745-1337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><recordid>eNpNkE1Lw0AQhhdRsFb_gYeAV1NnP5Ld3Cy1arEo1IrHZZLsampN6u5G6L83Ult7mhl4nnfgJeScwoAmSl4Fh7W3bT1gQLPRZAoA4oD0qBRJTDmXh6QHGU1jlYA6JifeLwCoYlT0yPWzKVpXhXXU2GhmlhhMGT-YdXRTWWucqUOFy2gYAhYfPmrqaP46eRxfduh35asOPiVHFpfenP3NPnm5Hc9H9_H06W4yGk7jQkgIscykxTwvJYJUvMw5KiUSzAUHlna3UKASlZeYc5vIrJAqZQiKMTAstzzhfXKxyV255qs1PuhF07q6e6kZ51SlaZfQUWJDFa7x3hmrV676RLfWFPRvV3rbld7rqtNmG23hA76ZnYQuVMXS_EtjClwPNd0ueyE7uHhHp03NfwCIGnqX</recordid><startdate>20200101</startdate><enddate>20200101</enddate><creator>SAKAMOTO, Kosei</creator><creator>MINEMATSU, Kazuhiko</creator><creator>SHIBATA, Nao</creator><creator>SHIGERI, Maki</creator><creator>KUBO, Hiroyasu</creator><creator>FUNABIKI, Yuki</creator><creator>ISOBE, Takanori</creator><general>The Institute of Electronics, Information and Communication Engineers</general><general>Japan Science and Technology Agency</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20200101</creationdate><title>Security of Related-Key Differential Attacks on TWINE, Revisited</title><author>SAKAMOTO, Kosei ; MINEMATSU, Kazuhiko ; SHIBATA, Nao ; SHIGERI, Maki ; KUBO, Hiroyasu ; FUNABIKI, Yuki ; ISOBE, Takanori</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c470t-797fabbd7a0783db3a8845ab430263db480858bdab3f579c7862a08220e2bf353</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>active sbox</topic><topic>block cipher</topic><topic>Encryption</topic><topic>MILP</topic><topic>related-key security</topic><topic>Search algorithms</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>SAKAMOTO, Kosei</creatorcontrib><creatorcontrib>MINEMATSU, Kazuhiko</creatorcontrib><creatorcontrib>SHIBATA, Nao</creatorcontrib><creatorcontrib>SHIGERI, Maki</creatorcontrib><creatorcontrib>KUBO, Hiroyasu</creatorcontrib><creatorcontrib>FUNABIKI, Yuki</creatorcontrib><creatorcontrib>ISOBE, Takanori</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>SAKAMOTO, Kosei</au><au>MINEMATSU, Kazuhiko</au><au>SHIBATA, Nao</au><au>SHIGERI, Maki</au><au>KUBO, Hiroyasu</au><au>FUNABIKI, Yuki</au><au>ISOBE, Takanori</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Security of Related-Key Differential Attacks on TWINE, Revisited</atitle><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle><addtitle>IEICE Trans. Fundamentals</addtitle><date>2020-01-01</date><risdate>2020</risdate><volume>E103.A</volume><issue>1</issue><spage>212</spage><epage>214</epage><pages>212-214</pages><issn>0916-8508</issn><eissn>1745-1337</eissn><abstract>In this paper, we revisit related-key security of TWINE block cipher with 80-bit and 128-bit keys. Using an MILP-aided automatic search algorithm, we point out the previous evaluation of TWINE with a 80-bit key is wrong, and give a corrected evaluation result. Besides, we show a first security evaluation of TWINE with a 128-bit key in the related-key setting, which was infeasible due to the high computation cost in the original proposal.</abstract><cop>Tokyo</cop><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transfun.2019CIL0004</doi><tpages>3</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0916-8508 |
ispartof | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2020/01/01, Vol.E103.A(1), pp.212-214 |
issn | 0916-8508 1745-1337 |
language | eng |
recordid | cdi_proquest_journals_2331866808 |
source | J-STAGE (Japan Science & Technology Information Aggregator, Electronic) Freely Available Titles - Japanese |
subjects | active sbox block cipher Encryption MILP related-key security Search algorithms Security |
title | Security of Related-Key Differential Attacks on TWINE, Revisited |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-23T06%3A41%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Security%20of%20Related-Key%20Differential%20Attacks%20on%20TWINE,%20Revisited&rft.jtitle=IEICE%20Transactions%20on%20Fundamentals%20of%20Electronics,%20Communications%20and%20Computer%20Sciences&rft.au=SAKAMOTO,%20Kosei&rft.date=2020-01-01&rft.volume=E103.A&rft.issue=1&rft.spage=212&rft.epage=214&rft.pages=212-214&rft.issn=0916-8508&rft.eissn=1745-1337&rft_id=info:doi/10.1587/transfun.2019CIL0004&rft_dat=%3Cproquest_cross%3E2331866808%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2331866808&rft_id=info:pmid/&rfr_iscdi=true |