Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128 View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2019-11-19

AUTHORS

Boxin Zhao , Xiaoyang Dong , Keting Jia , Willi Meier

ABSTRACT

Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al. at ToSC 2017 and BDT technique proposed by Wang and Peyrin at ToSC 2019, we find a new 11-round related-tweakey boomerang distinguisher of Deoxys-BC-384 with probability of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{-118.4}$$\end{document}, and give a related-tweakey rectangle attack on 13-round Deoxys-BC-384 with a data complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{125.2}$$\end{document} and time complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{186.7}$$\end{document}, and then apply it to analyze 13-round Deoxys-I-256-128 in this paper. This is the first time that an attack on 13-round Deoxys-I-256-128 is given, while the previous attack on this version only reaches 12 rounds. More... »

PAGES

139-159

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7

DOI

http://dx.doi.org/10.1007/978-3-030-35423-7_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1123221023


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/21", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "History and Archaeology", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/2101", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Archaeology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Cyber Science and Technology, Shandong University, Jinan, People\u2019s Republic of China", 
          "id": "http://www.grid.ac/institutes/grid.27255.37", 
          "name": [
            "Key Laboratory of Cryptologic Technology and Information Security (Shandong University), Ministry of Education, Jinan, People\u2019s Republic of China", 
            "School of Cyber Science and Technology, Shandong University, Jinan, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhao", 
        "givenName": "Boxin", 
        "id": "sg:person.011253365033.10", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011253365033.10"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Advanced Study, Tsinghua University, Beijing, People\u2019s Republic of China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Institute for Advanced Study, Tsinghua University, Beijing, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dong", 
        "givenName": "Xiaoyang", 
        "id": "sg:person.013311564675.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311564675.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua University, Beijing, People\u2019s Republic of China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Department of Computer Science and Technology, Tsinghua University, Beijing, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jia", 
        "givenName": "Keting", 
        "id": "sg:person.016423141745.48", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016423141745.48"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Institute ISE, Windisch, Aargau, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Institute ISE, Windisch, Aargau, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2019-11-19", 
    "datePublishedReg": "2019-11-19", 
    "description": "Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al. at ToSC 2017 and BDT technique proposed by Wang and Peyrin at ToSC 2019, we find a new 11-round related-tweakey boomerang distinguisher of Deoxys-BC-384 with probability of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{-118.4}$$\\end{document}, and give a related-tweakey rectangle attack on 13-round Deoxys-BC-384 with a data complexity of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{125.2}$$\\end{document} and time complexity of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{186.7}$$\\end{document}, and then apply it to analyze 13-round Deoxys-I-256-128 in this paper. This is the first time that an attack on 13-round Deoxys-I-256-128 is given, while the previous attack on this version only reaches 12 rounds.", 
    "editor": [
      {
        "familyName": "Hao", 
        "givenName": "Feng", 
        "type": "Person"
      }, 
      {
        "familyName": "Ruj", 
        "givenName": "Sushmita", 
        "type": "Person"
      }, 
      {
        "familyName": "Sen Gupta", 
        "givenName": "Sourav", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-35423-7_7", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-35422-0", 
        "978-3-030-35423-7"
      ], 
      "name": "Progress in Cryptology \u2013 INDOCRYPT 2019", 
      "type": "Book"
    }, 
    "keywords": [
      "previous attacks", 
      "deoxy", 
      "attacks", 
      "first time", 
      "candidates", 
      "rounds", 
      "rectangle attack", 
      "time", 
      "method", 
      "technique", 
      "et al", 
      "probability", 
      "version", 
      "new method", 
      "complexity", 
      "al", 
      "competition", 
      "Wang", 
      "tweakable block cipher", 
      "Deoxys-II", 
      "data complexity", 
      "time complexity", 
      "paper", 
      "Deoxys-BC", 
      "internal tweakable block cipher", 
      "block cipher", 
      "scheme", 
      "final portfolio", 
      "portfolio", 
      "CAESAR competition", 
      "Peyrin", 
      "boomerang distinguishers", 
      "distinguisher", 
      "cipher", 
      "Cid et al"
    ], 
    "name": "Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128", 
    "pagination": "139-159", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1123221023"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-35423-7_7"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-35423-7_7", 
      "https://app.dimensions.ai/details/publication/pub.1123221023"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-05-20T07:41", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_10.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-35423-7_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'


 

This table displays all metadata directly associated to this object as RDF triples.

135 TRIPLES      23 PREDICATES      60 URIs      53 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-35423-7_7 schema:about anzsrc-for:21
2 anzsrc-for:2101
3 schema:author N1d48b2bfade748829ccea8418b3745e7
4 schema:datePublished 2019-11-19
5 schema:datePublishedReg 2019-11-19
6 schema:description Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al. at ToSC 2017 and BDT technique proposed by Wang and Peyrin at ToSC 2019, we find a new 11-round related-tweakey boomerang distinguisher of Deoxys-BC-384 with probability of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{-118.4}$$\end{document}, and give a related-tweakey rectangle attack on 13-round Deoxys-BC-384 with a data complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{125.2}$$\end{document} and time complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{186.7}$$\end{document}, and then apply it to analyze 13-round Deoxys-I-256-128 in this paper. This is the first time that an attack on 13-round Deoxys-I-256-128 is given, while the previous attack on this version only reaches 12 rounds.
7 schema:editor Nd5c7a1e209894ee5aae58bce3a6b7787
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf N6a083071c8e64841b13e7347fc844e31
12 schema:keywords CAESAR competition
13 Cid et al
14 Deoxys-BC
15 Deoxys-II
16 Peyrin
17 Wang
18 al
19 attacks
20 block cipher
21 boomerang distinguishers
22 candidates
23 cipher
24 competition
25 complexity
26 data complexity
27 deoxy
28 distinguisher
29 et al
30 final portfolio
31 first time
32 internal tweakable block cipher
33 method
34 new method
35 paper
36 portfolio
37 previous attacks
38 probability
39 rectangle attack
40 rounds
41 scheme
42 technique
43 time
44 time complexity
45 tweakable block cipher
46 version
47 schema:name Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128
48 schema:pagination 139-159
49 schema:productId N379e8b9246184dc98ac29efb73b85a03
50 N41b17b654aee43b9975de7ed368f8b75
51 schema:publisher Nfc64add30ff44e9daa5c39bde02fa2be
52 schema:sameAs https://app.dimensions.ai/details/publication/pub.1123221023
53 https://doi.org/10.1007/978-3-030-35423-7_7
54 schema:sdDatePublished 2022-05-20T07:41
55 schema:sdLicense https://scigraph.springernature.com/explorer/license/
56 schema:sdPublisher N4706b02e90964153a46b0d786be7d58e
57 schema:url https://doi.org/10.1007/978-3-030-35423-7_7
58 sgo:license sg:explorer/license/
59 sgo:sdDataset chapters
60 rdf:type schema:Chapter
61 N0414e0b810824b838f36c27bfe293732 rdf:first N2701b4c3cf5b48a2a1a596f0267ac9c3
62 rdf:rest rdf:nil
63 N1d48b2bfade748829ccea8418b3745e7 rdf:first sg:person.011253365033.10
64 rdf:rest Nd7b8daad9d9946d99923b1242b306dde
65 N2701b4c3cf5b48a2a1a596f0267ac9c3 schema:familyName Sen Gupta
66 schema:givenName Sourav
67 rdf:type schema:Person
68 N379e8b9246184dc98ac29efb73b85a03 schema:name doi
69 schema:value 10.1007/978-3-030-35423-7_7
70 rdf:type schema:PropertyValue
71 N41b17b654aee43b9975de7ed368f8b75 schema:name dimensions_id
72 schema:value pub.1123221023
73 rdf:type schema:PropertyValue
74 N4706b02e90964153a46b0d786be7d58e schema:name Springer Nature - SN SciGraph project
75 rdf:type schema:Organization
76 N4b0b3354c1f446f2a7b6b02804be4d19 schema:familyName Hao
77 schema:givenName Feng
78 rdf:type schema:Person
79 N612a9e2864aa41b78e53f40634d54089 rdf:first sg:person.07653531142.18
80 rdf:rest rdf:nil
81 N6a083071c8e64841b13e7347fc844e31 schema:isbn 978-3-030-35422-0
82 978-3-030-35423-7
83 schema:name Progress in Cryptology – INDOCRYPT 2019
84 rdf:type schema:Book
85 N8700c4c7be944fe88be367bc830896c6 rdf:first Nee1cba9672af4eef8fb483573b18728e
86 rdf:rest N0414e0b810824b838f36c27bfe293732
87 Ncfcc3456d1464f3ba7eee28a08e29179 rdf:first sg:person.016423141745.48
88 rdf:rest N612a9e2864aa41b78e53f40634d54089
89 Nd5c7a1e209894ee5aae58bce3a6b7787 rdf:first N4b0b3354c1f446f2a7b6b02804be4d19
90 rdf:rest N8700c4c7be944fe88be367bc830896c6
91 Nd7b8daad9d9946d99923b1242b306dde rdf:first sg:person.013311564675.26
92 rdf:rest Ncfcc3456d1464f3ba7eee28a08e29179
93 Nee1cba9672af4eef8fb483573b18728e schema:familyName Ruj
94 schema:givenName Sushmita
95 rdf:type schema:Person
96 Nfc64add30ff44e9daa5c39bde02fa2be schema:name Springer Nature
97 rdf:type schema:Organisation
98 anzsrc-for:21 schema:inDefinedTermSet anzsrc-for:
99 schema:name History and Archaeology
100 rdf:type schema:DefinedTerm
101 anzsrc-for:2101 schema:inDefinedTermSet anzsrc-for:
102 schema:name Archaeology
103 rdf:type schema:DefinedTerm
104 sg:person.011253365033.10 schema:affiliation grid-institutes:grid.27255.37
105 schema:familyName Zhao
106 schema:givenName Boxin
107 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011253365033.10
108 rdf:type schema:Person
109 sg:person.013311564675.26 schema:affiliation grid-institutes:grid.12527.33
110 schema:familyName Dong
111 schema:givenName Xiaoyang
112 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311564675.26
113 rdf:type schema:Person
114 sg:person.016423141745.48 schema:affiliation grid-institutes:grid.12527.33
115 schema:familyName Jia
116 schema:givenName Keting
117 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016423141745.48
118 rdf:type schema:Person
119 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
120 schema:familyName Meier
121 schema:givenName Willi
122 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
123 rdf:type schema:Person
124 grid-institutes:grid.12527.33 schema:alternateName Department of Computer Science and Technology, Tsinghua University, Beijing, People’s Republic of China
125 Institute for Advanced Study, Tsinghua University, Beijing, People’s Republic of China
126 schema:name Department of Computer Science and Technology, Tsinghua University, Beijing, People’s Republic of China
127 Institute for Advanced Study, Tsinghua University, Beijing, People’s Republic of China
128 rdf:type schema:Organization
129 grid-institutes:grid.27255.37 schema:alternateName School of Cyber Science and Technology, Shandong University, Jinan, People’s Republic of China
130 schema:name Key Laboratory of Cryptologic Technology and Information Security (Shandong University), Ministry of Education, Jinan, People’s Republic of China
131 School of Cyber Science and Technology, Shandong University, Jinan, People’s Republic of China
132 rdf:type schema:Organization
133 grid-institutes:grid.410380.e schema:alternateName FHNW, Institute ISE, Windisch, Aargau, Switzerland
134 schema:name FHNW, Institute ISE, Windisch, Aargau, Switzerland
135 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...