Open Access
Open access

Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices

Publication typeBook Chapter
Publication date2024-07-15
scimago Q2
SJR0.352
CiteScore2.4
Impact factor
ISSN03029743, 16113349, 18612075, 18612083
Abstract
Block ciphers are often used as building blocks for one-way compression functions, which in turn, can be employed to construct hash functions. Two well-known important methods in the design of one-way compression function from block ciphers are the Davies-Meyer compression and the Myagushi-Preneel compression. To verify the security of such a construction, it is necessary to evaluate the robustness of the underlying block cipher against, e.g., the secret key, which is the so-called known-key model. In this paper, we evaluate the security of the lightweight block cipher GIFT-64 in the known-key setting, when used as a building block of hash functions. We significantly improve the known-key distinguisher to full GIFT-64. The distinguisher is composed of truncated differentials over 13 rounds and a meet-in-the-middle distinguisher over 15 rounds. We leverage a relationship between truncated differentials and multiple linear approximations cryptanalysis. It allows us to transfer searching for truncated differentials to constructing multiple linear approximations, resulting in the improved probability of truncated differentials. To collect the related linear approximations as many as possible, we use a relatively low-dimensional binary correlation matrix where the hamming weight of the linear mask for the internal state can reach 8. Employing this correlation matrix, we precisely calculate all linear approximations that satisfy the specific conditions. To obtain a full-round distinguisher, these approximations are pre-filtered by a meet-in-the-middle distinguisher via a new matching method called rotational recombination. We would like to highlight that our distinguisher can apply successfully to the full-round GIFT-64 with a time complexity of $$2^{60}$$ . Furthermore, we implement the attack successfully on a variant of GIFT-64, GIFT-64[ $$g_0^c$$ ], proposed at Eurocrypt 2022.
Found 

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
0
Share
Cite this
GOST |
Cite this
GOST Copy
SUN X. et al. Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices // Lecture Notes in Computer Science. 2024. pp. 20-40.
GOST all authors (up to 50) Copy
SUN X., Zhang W., Rodríguez R., Liu H. Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices // Lecture Notes in Computer Science. 2024. pp. 20-40.
RIS |
Cite this
RIS Copy
TY - GENERIC
DO - 10.1007/978-981-97-5025-2_2
UR - https://link.springer.com/10.1007/978-981-97-5025-2_2
TI - Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices
T2 - Lecture Notes in Computer Science
AU - SUN, Xiaomeng
AU - Zhang, Wenying
AU - Rodríguez, René
AU - Liu, Huimin
PY - 2024
DA - 2024/07/15
PB - Springer Nature
SP - 20-40
SN - 0302-9743
SN - 1611-3349
SN - 1861-2075
SN - 1861-2083
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@incollection{2024_SUN,
author = {Xiaomeng SUN and Wenying Zhang and René Rodríguez and Huimin Liu},
title = {Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices},
publisher = {Springer Nature},
year = {2024},
pages = {20--40},
month = {jul}
}