Open Access
,
pages 20-40
Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices
Publication type: Book Chapter
Publication date: 2024-07-15
scimago Q2
SJR: 0.352
CiteScore: 2.4
Impact factor: —
ISSN: 03029743, 16113349, 18612075, 18612083
Abstract
Block ciphers are often used as building blocks for one-way compression functions, which in turn, can be employed to construct hash functions. Two well-known important methods in the design of one-way compression function from block ciphers are the Davies-Meyer compression and the Myagushi-Preneel compression. To verify the security of such a construction, it is necessary to evaluate the robustness of the underlying block cipher against, e.g., the secret key, which is the so-called known-key model. In this paper, we evaluate the security of the lightweight block cipher GIFT-64 in the known-key setting, when used as a building block of hash functions. We significantly improve the known-key distinguisher to full GIFT-64. The distinguisher is composed of truncated differentials over 13 rounds and a meet-in-the-middle distinguisher over 15 rounds. We leverage a relationship between truncated differentials and multiple linear approximations cryptanalysis. It allows us to transfer searching for truncated differentials to constructing multiple linear approximations, resulting in the improved probability of truncated differentials. To collect the related linear approximations as many as possible, we use a relatively low-dimensional binary correlation matrix where the hamming weight of the linear mask for the internal state can reach 8. Employing this correlation matrix, we precisely calculate all linear approximations that satisfy the specific conditions. To obtain a full-round distinguisher, these approximations are pre-filtered by a meet-in-the-middle distinguisher via a new matching method called rotational recombination. We would like to highlight that our distinguisher can apply successfully to the full-round GIFT-64 with a time complexity of
$$2^{60}$$
. Furthermore, we implement the attack successfully on a variant of GIFT-64, GIFT-64[
$$g_0^c$$
], proposed at Eurocrypt 2022.
Found
Nothing found, try to update filter.
Are you a researcher?
Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
0
Total citations:
0
Cite this
GOST |
RIS |
BibTex
Cite this
GOST
Copy
SUN X. et al. Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices // Lecture Notes in Computer Science. 2024. pp. 20-40.
GOST all authors (up to 50)
Copy
SUN X., Zhang W., Rodríguez R., Liu H. Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices // Lecture Notes in Computer Science. 2024. pp. 20-40.
Cite this
RIS
Copy
TY - GENERIC
DO - 10.1007/978-981-97-5025-2_2
UR - https://link.springer.com/10.1007/978-981-97-5025-2_2
TI - Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices
T2 - Lecture Notes in Computer Science
AU - SUN, Xiaomeng
AU - Zhang, Wenying
AU - Rodríguez, René
AU - Liu, Huimin
PY - 2024
DA - 2024/07/15
PB - Springer Nature
SP - 20-40
SN - 0302-9743
SN - 1611-3349
SN - 1861-2075
SN - 1861-2083
ER -
Cite this
BibTex (up to 50 authors)
Copy
@incollection{2024_SUN,
author = {Xiaomeng SUN and Wenying Zhang and René Rodríguez and Huimin Liu},
title = {Known-Key Attack on GIFT-64 and GIFT-64[$$g_0^c$$] Based on Correlation Matrices},
publisher = {Springer Nature},
year = {2024},
pages = {20--40},
month = {jul}
}