A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2022-05-25

AUTHORS

Ling Sun , Bart Preneel , Wei Wang , Meiqin Wang

ABSTRACT

GIFT-64 is a 64-bit block cipher with a 128-bit key that is more lightweight than PRESENT. This paper provides a detailed analysis of GIFT-64 against differential and linear attacks. Our work complements automatic search methods for the best differential and linear characteristics with a careful manual analysis. This hybrid approach leads to new insights. In the differential setting, we theoretically explain the existence of differential characteristics with two active S-boxes per round and derive some novel properties of these characteristics. Furthermore, we prove that all optimal differential characteristics of GIFT-64 covering more than seven rounds must activate two S-boxes per round. We can construct all optimal characteristics by hand. In parallel to the work in the differential setting, we conduct a similar analysis in the linear setting. However, unlike the clear view in differential setting, the optimal linear characteristics of GIFT-64 must have at least one round activating only one S-box. Moreover, with the assistance of automatic searching methods, we identify 24 GIFT-64 variants achieving better resistance against differential attack while maintaining a similar security level against a linear attack. Since the new variants strengthen GIFT-64 against statistical cryptanalysis, we claim that the number of rounds could be reduced from 28 to 26 for the variants. This observation enables us to create a cipher with lower energy consumption than GIFT-64. Similarly to the case in GIFT-64, we do not claim any related-key security for the round-reduced variant as this is not relevant for most applications. More... »

PAGES

115-144

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-031-07082-2_5

DOI

http://dx.doi.org/10.1007/978-3-031-07082-2_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1148218506


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/01", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Mathematical Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0104", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Statistics", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "School of Cyber Science and Technology, Shandong University, Qingdao, China", 
          "id": "http://www.grid.ac/institutes/grid.27255.37", 
          "name": [
            "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China", 
            "State Key Laboratory of Cryptology, P.O.Box 5159, 100878, Beijing, China", 
            "School of Cyber Science and Technology, Shandong University, Qingdao, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Sun", 
        "givenName": "Ling", 
        "id": "sg:person.012733555253.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012733555253.52"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Electrical Engineering-ESAT, KU Leuven and imec, Leuven, Belgium", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Department of Electrical Engineering-ESAT, KU Leuven and imec, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Preneel", 
        "givenName": "Bart", 
        "id": "sg:person.011115044357.39", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "School of Cyber Science and Technology, Shandong University, Qingdao, China", 
          "id": "http://www.grid.ac/institutes/grid.27255.37", 
          "name": [
            "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China", 
            "School of Cyber Science and Technology, Shandong University, Qingdao, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wang", 
        "givenName": "Wei", 
        "id": "sg:person.010474655641.25", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010474655641.25"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Quan Cheng Shandong Laboratory, Jinan, China", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China", 
            "School of Cyber Science and Technology, Shandong University, Qingdao, China", 
            "Quan Cheng Shandong Laboratory, Jinan, China"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wang", 
        "givenName": "Meiqin", 
        "id": "sg:person.015520456725.72", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015520456725.72"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2022-05-25", 
    "datePublishedReg": "2022-05-25", 
    "description": "GIFT-64 is a 64-bit block cipher with a 128-bit key that is more lightweight than PRESENT. This paper provides a detailed analysis of GIFT-64 against differential and linear attacks. Our work complements automatic search methods for the best differential and linear characteristics with a careful manual analysis. This hybrid approach leads to new insights. In the differential setting, we theoretically explain the existence of differential characteristics with two active S-boxes per round and derive some novel properties of these characteristics. Furthermore, we prove that all optimal differential characteristics of GIFT-64 covering more than seven rounds must activate two S-boxes per round. We can construct all optimal characteristics by hand. In parallel to the work in the differential setting, we conduct a similar analysis in the linear setting. However, unlike the clear view in differential setting, the optimal linear characteristics of GIFT-64 must have at least one round activating only one S-box. Moreover, with the assistance of automatic searching methods, we identify 24 GIFT-64 variants achieving better resistance against differential attack while maintaining a similar security level against a linear attack. Since the new variants strengthen GIFT-64 against statistical cryptanalysis, we claim that the number of rounds could be reduced from 28 to 26 for the variants. This observation enables us to create a cipher with lower energy consumption than GIFT-64. Similarly to the case in GIFT-64, we do not claim any related-key security for the round-reduced variant as this is not relevant for most applications.", 
    "editor": [
      {
        "familyName": "Dunkelman", 
        "givenName": "Orr", 
        "type": "Person"
      }, 
      {
        "familyName": "Dziembowski", 
        "givenName": "Stefan", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-031-07082-2_5", 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-031-07081-5", 
        "978-3-031-07082-2"
      ], 
      "name": "Advances in Cryptology \u2013 EUROCRYPT 2022", 
      "type": "Book"
    }, 
    "keywords": [
      "differential setting", 
      "statistical cryptanalysis", 
      "linear attack", 
      "linear characteristics", 
      "linear setting", 
      "careful manual analysis", 
      "automatic search method", 
      "search method", 
      "number of rounds", 
      "most applications", 
      "hybrid approach", 
      "active S-boxes", 
      "S-boxes", 
      "differential attacks", 
      "optimal characteristics", 
      "searching method", 
      "novel properties", 
      "similar security level", 
      "new variant", 
      "detailed analysis", 
      "existence", 
      "differential characteristics", 
      "similar analysis", 
      "cryptanalysis", 
      "block cipher", 
      "GIFT-64", 
      "cipher", 
      "properties", 
      "security level", 
      "work", 
      "approach", 
      "applications", 
      "analysis", 
      "number", 
      "characteristics", 
      "parallel", 
      "variants", 
      "clear view", 
      "observations", 
      "energy consumption", 
      "cases", 
      "low energy consumption", 
      "attacks", 
      "manual analysis", 
      "setting", 
      "view", 
      "new insights", 
      "rounds", 
      "key", 
      "insights", 
      "hand", 
      "security", 
      "present", 
      "consumption", 
      "levels", 
      "automatic searching method", 
      "resistance", 
      "related-key security", 
      "good resistance", 
      "assistance", 
      "method", 
      "great gift", 
      "gift", 
      "paper"
    ], 
    "name": "A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis", 
    "pagination": "115-144", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1148218506"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-031-07082-2_5"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-031-07082-2_5", 
      "https://app.dimensions.ai/details/publication/pub.1148218506"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-10-01T06:56", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20221001/entities/gbq_results/chapter/chapter_320.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-031-07082-2_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-031-07082-2_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-031-07082-2_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-031-07082-2_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-031-07082-2_5'


 

This table displays all metadata directly associated to this object as RDF triples.

158 TRIPLES      22 PREDICATES      88 URIs      81 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-031-07082-2_5 schema:about anzsrc-for:01
2 anzsrc-for:0104
3 schema:author Nec45bfba650a441f9c881b196e6dd94a
4 schema:datePublished 2022-05-25
5 schema:datePublishedReg 2022-05-25
6 schema:description GIFT-64 is a 64-bit block cipher with a 128-bit key that is more lightweight than PRESENT. This paper provides a detailed analysis of GIFT-64 against differential and linear attacks. Our work complements automatic search methods for the best differential and linear characteristics with a careful manual analysis. This hybrid approach leads to new insights. In the differential setting, we theoretically explain the existence of differential characteristics with two active S-boxes per round and derive some novel properties of these characteristics. Furthermore, we prove that all optimal differential characteristics of GIFT-64 covering more than seven rounds must activate two S-boxes per round. We can construct all optimal characteristics by hand. In parallel to the work in the differential setting, we conduct a similar analysis in the linear setting. However, unlike the clear view in differential setting, the optimal linear characteristics of GIFT-64 must have at least one round activating only one S-box. Moreover, with the assistance of automatic searching methods, we identify 24 GIFT-64 variants achieving better resistance against differential attack while maintaining a similar security level against a linear attack. Since the new variants strengthen GIFT-64 against statistical cryptanalysis, we claim that the number of rounds could be reduced from 28 to 26 for the variants. This observation enables us to create a cipher with lower energy consumption than GIFT-64. Similarly to the case in GIFT-64, we do not claim any related-key security for the round-reduced variant as this is not relevant for most applications.
7 schema:editor N61558aef99d04b658e826ba839a41ece
8 schema:genre chapter
9 schema:isAccessibleForFree false
10 schema:isPartOf N64927c0351ce405eb7fd4f049ec29cb6
11 schema:keywords GIFT-64
12 S-boxes
13 active S-boxes
14 analysis
15 applications
16 approach
17 assistance
18 attacks
19 automatic search method
20 automatic searching method
21 block cipher
22 careful manual analysis
23 cases
24 characteristics
25 cipher
26 clear view
27 consumption
28 cryptanalysis
29 detailed analysis
30 differential attacks
31 differential characteristics
32 differential setting
33 energy consumption
34 existence
35 gift
36 good resistance
37 great gift
38 hand
39 hybrid approach
40 insights
41 key
42 levels
43 linear attack
44 linear characteristics
45 linear setting
46 low energy consumption
47 manual analysis
48 method
49 most applications
50 new insights
51 new variant
52 novel properties
53 number
54 number of rounds
55 observations
56 optimal characteristics
57 paper
58 parallel
59 present
60 properties
61 related-key security
62 resistance
63 rounds
64 search method
65 searching method
66 security
67 security level
68 setting
69 similar analysis
70 similar security level
71 statistical cryptanalysis
72 variants
73 view
74 work
75 schema:name A Greater GIFT: Strengthening GIFT Against Statistical Cryptanalysis
76 schema:pagination 115-144
77 schema:productId N8970ed7ea93d4328b465390219428460
78 Nd70d402178c24352ae9a54a8704e9517
79 schema:publisher Nff77118ff71d487aa28e94b01d0059e6
80 schema:sameAs https://app.dimensions.ai/details/publication/pub.1148218506
81 https://doi.org/10.1007/978-3-031-07082-2_5
82 schema:sdDatePublished 2022-10-01T06:56
83 schema:sdLicense https://scigraph.springernature.com/explorer/license/
84 schema:sdPublisher N8e1833edf3b24673bba5f061933af479
85 schema:url https://doi.org/10.1007/978-3-031-07082-2_5
86 sgo:license sg:explorer/license/
87 sgo:sdDataset chapters
88 rdf:type schema:Chapter
89 N2a4df66f78e346eda3edf9573d184e18 rdf:first sg:person.010474655641.25
90 rdf:rest N7d447d33fb0d47599338054bbae50b2c
91 N30aa7e53154645029542daf28184fdef schema:familyName Dziembowski
92 schema:givenName Stefan
93 rdf:type schema:Person
94 N61558aef99d04b658e826ba839a41ece rdf:first N6d01ef9e0afe451faa01eb6aea73d8e4
95 rdf:rest Nf1098e5852a94d908f37309e8fb990e0
96 N64927c0351ce405eb7fd4f049ec29cb6 schema:isbn 978-3-031-07081-5
97 978-3-031-07082-2
98 schema:name Advances in Cryptology – EUROCRYPT 2022
99 rdf:type schema:Book
100 N6d01ef9e0afe451faa01eb6aea73d8e4 schema:familyName Dunkelman
101 schema:givenName Orr
102 rdf:type schema:Person
103 N7d447d33fb0d47599338054bbae50b2c rdf:first sg:person.015520456725.72
104 rdf:rest rdf:nil
105 N8970ed7ea93d4328b465390219428460 schema:name dimensions_id
106 schema:value pub.1148218506
107 rdf:type schema:PropertyValue
108 N8e1833edf3b24673bba5f061933af479 schema:name Springer Nature - SN SciGraph project
109 rdf:type schema:Organization
110 Na8dbf75930c346bbb67f5b99981df540 rdf:first sg:person.011115044357.39
111 rdf:rest N2a4df66f78e346eda3edf9573d184e18
112 Nd70d402178c24352ae9a54a8704e9517 schema:name doi
113 schema:value 10.1007/978-3-031-07082-2_5
114 rdf:type schema:PropertyValue
115 Nec45bfba650a441f9c881b196e6dd94a rdf:first sg:person.012733555253.52
116 rdf:rest Na8dbf75930c346bbb67f5b99981df540
117 Nf1098e5852a94d908f37309e8fb990e0 rdf:first N30aa7e53154645029542daf28184fdef
118 rdf:rest rdf:nil
119 Nff77118ff71d487aa28e94b01d0059e6 schema:name Springer Nature
120 rdf:type schema:Organisation
121 anzsrc-for:01 schema:inDefinedTermSet anzsrc-for:
122 schema:name Mathematical Sciences
123 rdf:type schema:DefinedTerm
124 anzsrc-for:0104 schema:inDefinedTermSet anzsrc-for:
125 schema:name Statistics
126 rdf:type schema:DefinedTerm
127 sg:person.010474655641.25 schema:affiliation grid-institutes:grid.27255.37
128 schema:familyName Wang
129 schema:givenName Wei
130 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010474655641.25
131 rdf:type schema:Person
132 sg:person.011115044357.39 schema:affiliation grid-institutes:None
133 schema:familyName Preneel
134 schema:givenName Bart
135 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011115044357.39
136 rdf:type schema:Person
137 sg:person.012733555253.52 schema:affiliation grid-institutes:grid.27255.37
138 schema:familyName Sun
139 schema:givenName Ling
140 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012733555253.52
141 rdf:type schema:Person
142 sg:person.015520456725.72 schema:affiliation grid-institutes:None
143 schema:familyName Wang
144 schema:givenName Meiqin
145 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015520456725.72
146 rdf:type schema:Person
147 grid-institutes:None schema:alternateName Department of Electrical Engineering-ESAT, KU Leuven and imec, Leuven, Belgium
148 Quan Cheng Shandong Laboratory, Jinan, China
149 schema:name Department of Electrical Engineering-ESAT, KU Leuven and imec, Leuven, Belgium
150 Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China
151 Quan Cheng Shandong Laboratory, Jinan, China
152 School of Cyber Science and Technology, Shandong University, Qingdao, China
153 rdf:type schema:Organization
154 grid-institutes:grid.27255.37 schema:alternateName School of Cyber Science and Technology, Shandong University, Qingdao, China
155 schema:name Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Jinan, China
156 School of Cyber Science and Technology, Shandong University, Qingdao, China
157 State Key Laboratory of Cryptology, P.O.Box 5159, 100878, Beijing, China
158 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...