Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128 View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2019-11-19

AUTHORS

Boxin Zhao , Xiaoyang Dong , Keting Jia , Willi Meier

ABSTRACT

Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al. at ToSC 2017 and BDT technique proposed by Wang and Peyrin at ToSC 2019, we find a new 11-round related-tweakey boomerang distinguisher of Deoxys-BC-384 with probability of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{-118.4}$$\end{document}, and give a related-tweakey rectangle attack on 13-round Deoxys-BC-384 with a data complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{125.2}$$\end{document} and time complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{186.7}$$\end{document}, and then apply it to analyze 13-round Deoxys-I-256-128 in this paper. This is the first time that an attack on 13-round Deoxys-I-256-128 is given, while the previous attack on this version only reaches 12 rounds. More... »

PAGES

139-159

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7

DOI

http://dx.doi.org/10.1007/978-3-030-35423-7_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1123221023


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/21", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "History and Archaeology", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/2101", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Archaeology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Cyber Science and Technology, Shandong University, Jinan, People\u2019s Republic of China", 
          "id": "http://www.grid.ac/institutes/grid.27255.37", 
          "name": [
            "Key Laboratory of Cryptologic Technology and Information Security (Shandong University), Ministry of Education, Jinan, People\u2019s Republic of China", 
            "School of Cyber Science and Technology, Shandong University, Jinan, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zhao", 
        "givenName": "Boxin", 
        "id": "sg:person.011253365033.10", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011253365033.10"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Advanced Study, Tsinghua University, Beijing, People\u2019s Republic of China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Institute for Advanced Study, Tsinghua University, Beijing, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dong", 
        "givenName": "Xiaoyang", 
        "id": "sg:person.013311564675.26", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311564675.26"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Technology, Tsinghua University, Beijing, People\u2019s Republic of China", 
          "id": "http://www.grid.ac/institutes/grid.12527.33", 
          "name": [
            "Department of Computer Science and Technology, Tsinghua University, Beijing, People\u2019s Republic of China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Jia", 
        "givenName": "Keting", 
        "id": "sg:person.016423141745.48", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016423141745.48"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "FHNW, Institute ISE, Windisch, Aargau, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "FHNW, Institute ISE, Windisch, Aargau, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2019-11-19", 
    "datePublishedReg": "2019-11-19", 
    "description": "Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al. at ToSC 2017 and BDT technique proposed by Wang and Peyrin at ToSC 2019, we find a new 11-round related-tweakey boomerang distinguisher of Deoxys-BC-384 with probability of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{-118.4}$$\\end{document}, and give a related-tweakey rectangle attack on 13-round Deoxys-BC-384 with a data complexity of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{125.2}$$\\end{document} and time complexity of \\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{186.7}$$\\end{document}, and then apply it to analyze 13-round Deoxys-I-256-128 in this paper. This is the first time that an attack on 13-round Deoxys-I-256-128 is given, while the previous attack on this version only reaches 12 rounds.", 
    "editor": [
      {
        "familyName": "Hao", 
        "givenName": "Feng", 
        "type": "Person"
      }, 
      {
        "familyName": "Ruj", 
        "givenName": "Sushmita", 
        "type": "Person"
      }, 
      {
        "familyName": "Sen Gupta", 
        "givenName": "Sourav", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-030-35423-7_7", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-030-35422-0", 
        "978-3-030-35423-7"
      ], 
      "name": "Progress in Cryptology \u2013 INDOCRYPT 2019", 
      "type": "Book"
    }, 
    "keywords": [
      "previous attacks", 
      "deoxy", 
      "attacks", 
      "first time", 
      "candidates", 
      "rounds", 
      "rectangle attack", 
      "time", 
      "method", 
      "technique", 
      "et al", 
      "probability", 
      "version", 
      "new method", 
      "complexity", 
      "competition", 
      "al", 
      "Wang", 
      "Deoxys-BC-384", 
      "internal tweakable block cipher", 
      "tweakable block cipher", 
      "Peyrin", 
      "data complexity", 
      "time complexity", 
      "paper", 
      "Deoxys-BC", 
      "block cipher", 
      "scheme", 
      "final portfolio", 
      "portfolio", 
      "CAESAR competition", 
      "Cid et al", 
      "boomerang distinguishers", 
      "distinguisher", 
      "cipher", 
      "core internal tweakable block cipher", 
      "encryption schemes Deoxys", 
      "schemes Deoxys", 
      "Deoxys-II", 
      "round candidate", 
      "ToSC 2017", 
      "BDT technique", 
      "ToSC 2019", 
      "related-tweakey boomerang distinguisher", 
      "related-tweakey rectangle attack", 
      "BC-384", 
      "Tweakey Rectangle Attacks", 
      "Round Deoxys-BC-384"
    ], 
    "name": "Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128", 
    "pagination": "139-159", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1123221023"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-030-35423-7_7"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-030-35423-7_7", 
      "https://app.dimensions.ai/details/publication/pub.1123221023"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:10", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_168.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-030-35423-7_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-35423-7_7'


 

This table displays all metadata directly associated to this object as RDF triples.

148 TRIPLES      23 PREDICATES      73 URIs      66 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-030-35423-7_7 schema:about anzsrc-for:21
2 anzsrc-for:2101
3 schema:author N80315768c7744a69b176fa3e34b483bd
4 schema:datePublished 2019-11-19
5 schema:datePublishedReg 2019-11-19
6 schema:description Deoxys-BC is the core internal tweakable block cipher of the authenticated encryption schemes Deoxys-I and Deoxys-II. Deoxys-II is one of the six schemes in the final portfolio of the CAESAR competition, while Deoxys-I is a 3rd round candidate. By well studying the new method proposed by Cid et al. at ToSC 2017 and BDT technique proposed by Wang and Peyrin at ToSC 2019, we find a new 11-round related-tweakey boomerang distinguisher of Deoxys-BC-384 with probability of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{-118.4}$$\end{document}, and give a related-tweakey rectangle attack on 13-round Deoxys-BC-384 with a data complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{125.2}$$\end{document} and time complexity of \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{186.7}$$\end{document}, and then apply it to analyze 13-round Deoxys-I-256-128 in this paper. This is the first time that an attack on 13-round Deoxys-I-256-128 is given, while the previous attack on this version only reaches 12 rounds.
7 schema:editor N92d006cfe7004b2682fb7d5ac1c061a3
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree false
11 schema:isPartOf Ndd23ef6fe75c4f17bd9b9bdab71f3a2b
12 schema:keywords BC-384
13 BDT technique
14 CAESAR competition
15 Cid et al
16 Deoxys-BC
17 Deoxys-BC-384
18 Deoxys-II
19 Peyrin
20 Round Deoxys-BC-384
21 ToSC 2017
22 ToSC 2019
23 Tweakey Rectangle Attacks
24 Wang
25 al
26 attacks
27 block cipher
28 boomerang distinguishers
29 candidates
30 cipher
31 competition
32 complexity
33 core internal tweakable block cipher
34 data complexity
35 deoxy
36 distinguisher
37 encryption schemes Deoxys
38 et al
39 final portfolio
40 first time
41 internal tweakable block cipher
42 method
43 new method
44 paper
45 portfolio
46 previous attacks
47 probability
48 rectangle attack
49 related-tweakey boomerang distinguisher
50 related-tweakey rectangle attack
51 round candidate
52 rounds
53 scheme
54 schemes Deoxys
55 technique
56 time
57 time complexity
58 tweakable block cipher
59 version
60 schema:name Improved Related-Tweakey Rectangle Attacks on Reduced-Round Deoxys-BC-384 and Deoxys-I-256-128
61 schema:pagination 139-159
62 schema:productId N1a19f287832b4464936e8963f6b548fe
63 Nba236cb27ec94a8c9da015ba5b6c4ca2
64 schema:publisher Nfa031543251f409f910a16d05f83b23f
65 schema:sameAs https://app.dimensions.ai/details/publication/pub.1123221023
66 https://doi.org/10.1007/978-3-030-35423-7_7
67 schema:sdDatePublished 2022-01-01T19:10
68 schema:sdLicense https://scigraph.springernature.com/explorer/license/
69 schema:sdPublisher N45e5ecbc86c2486f81b072eb646ee30f
70 schema:url https://doi.org/10.1007/978-3-030-35423-7_7
71 sgo:license sg:explorer/license/
72 sgo:sdDataset chapters
73 rdf:type schema:Chapter
74 N1a19f287832b4464936e8963f6b548fe schema:name dimensions_id
75 schema:value pub.1123221023
76 rdf:type schema:PropertyValue
77 N3e7d62cc43e9422ea699300e38ee8a09 rdf:first sg:person.016423141745.48
78 rdf:rest N76764f7d0cac4cffbbe3d66f61d15ec6
79 N3f781a098b1b4b7ca0c147badf1bb454 schema:familyName Hao
80 schema:givenName Feng
81 rdf:type schema:Person
82 N45e5ecbc86c2486f81b072eb646ee30f schema:name Springer Nature - SN SciGraph project
83 rdf:type schema:Organization
84 N46c290d18438490dab9caa74d7c78125 rdf:first Nba4af17786334c7a8295100d8f1b8ef2
85 rdf:rest N4c6d64c2c72b47babcfcefc1990db1ac
86 N4c6d64c2c72b47babcfcefc1990db1ac rdf:first N501c7f961d604066badcfc69a330e164
87 rdf:rest rdf:nil
88 N501c7f961d604066badcfc69a330e164 schema:familyName Sen Gupta
89 schema:givenName Sourav
90 rdf:type schema:Person
91 N75e3392d06424a90bd188f6da072d49e rdf:first sg:person.013311564675.26
92 rdf:rest N3e7d62cc43e9422ea699300e38ee8a09
93 N76764f7d0cac4cffbbe3d66f61d15ec6 rdf:first sg:person.07653531142.18
94 rdf:rest rdf:nil
95 N80315768c7744a69b176fa3e34b483bd rdf:first sg:person.011253365033.10
96 rdf:rest N75e3392d06424a90bd188f6da072d49e
97 N92d006cfe7004b2682fb7d5ac1c061a3 rdf:first N3f781a098b1b4b7ca0c147badf1bb454
98 rdf:rest N46c290d18438490dab9caa74d7c78125
99 Nba236cb27ec94a8c9da015ba5b6c4ca2 schema:name doi
100 schema:value 10.1007/978-3-030-35423-7_7
101 rdf:type schema:PropertyValue
102 Nba4af17786334c7a8295100d8f1b8ef2 schema:familyName Ruj
103 schema:givenName Sushmita
104 rdf:type schema:Person
105 Ndd23ef6fe75c4f17bd9b9bdab71f3a2b schema:isbn 978-3-030-35422-0
106 978-3-030-35423-7
107 schema:name Progress in Cryptology – INDOCRYPT 2019
108 rdf:type schema:Book
109 Nfa031543251f409f910a16d05f83b23f schema:name Springer Nature
110 rdf:type schema:Organisation
111 anzsrc-for:21 schema:inDefinedTermSet anzsrc-for:
112 schema:name History and Archaeology
113 rdf:type schema:DefinedTerm
114 anzsrc-for:2101 schema:inDefinedTermSet anzsrc-for:
115 schema:name Archaeology
116 rdf:type schema:DefinedTerm
117 sg:person.011253365033.10 schema:affiliation grid-institutes:grid.27255.37
118 schema:familyName Zhao
119 schema:givenName Boxin
120 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011253365033.10
121 rdf:type schema:Person
122 sg:person.013311564675.26 schema:affiliation grid-institutes:grid.12527.33
123 schema:familyName Dong
124 schema:givenName Xiaoyang
125 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311564675.26
126 rdf:type schema:Person
127 sg:person.016423141745.48 schema:affiliation grid-institutes:grid.12527.33
128 schema:familyName Jia
129 schema:givenName Keting
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016423141745.48
131 rdf:type schema:Person
132 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
133 schema:familyName Meier
134 schema:givenName Willi
135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
136 rdf:type schema:Person
137 grid-institutes:grid.12527.33 schema:alternateName Department of Computer Science and Technology, Tsinghua University, Beijing, People’s Republic of China
138 Institute for Advanced Study, Tsinghua University, Beijing, People’s Republic of China
139 schema:name Department of Computer Science and Technology, Tsinghua University, Beijing, People’s Republic of China
140 Institute for Advanced Study, Tsinghua University, Beijing, People’s Republic of China
141 rdf:type schema:Organization
142 grid-institutes:grid.27255.37 schema:alternateName School of Cyber Science and Technology, Shandong University, Jinan, People’s Republic of China
143 schema:name Key Laboratory of Cryptologic Technology and Information Security (Shandong University), Ministry of Education, Jinan, People’s Republic of China
144 School of Cyber Science and Technology, Shandong University, Jinan, People’s Republic of China
145 rdf:type schema:Organization
146 grid-institutes:grid.410380.e schema:alternateName FHNW, Institute ISE, Windisch, Aargau, Switzerland
147 schema:name FHNW, Institute ISE, Windisch, Aargau, Switzerland
148 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...