Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2020-02-13

AUTHORS

Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang

ABSTRACT

This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2331\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{331}$$\end{document} to 2294\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{294}$$\end{document}. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} and a data complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 291.58\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{91.58}$$\end{document}, while the best previous attack on GIFT-64 only reaches 23 rounds at most. More... »

PAGES

1103-1126

References to SciGraph publications

  • 2017-04-20. Impossible Differential Cryptanalysis of Reduced-Round SKINNY in PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2017
  • 2011. The Software Performance of Authenticated-Encryption Modes in FAST SOFTWARE ENCRYPTION
  • 2014. Tweaks and Keys for Block Ciphers: The TWEAKEY Framework in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2014
  • 2019-05-30. Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect in INFORMATION SECURITY AND PRIVACY
  • 2020-02-18. Improved Differential Attacks on GIFT-64 in INFORMATION AND COMMUNICATIONS SECURITY
  • 2005. Related-Key Boomerang and Rectangle Attacks in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2005
  • 2002. The Design of Rijndael, AES — The Advanced Encryption Standard in NONE
  • 1991. Differential Cryptanalysis of DES-like Cryptosystems in ADVANCES IN CRYPTOLOGY-CRYPT0’ 90
  • 2009. Related-Key Cryptanalysis of the Full AES-192 and AES-256 in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2009
  • 2017-04-01. New Impossible Differential Search Tool from Design and Cryptanalysis Aspects in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2017
  • 2015-12-30. Midori: A Block Cipher for Low Energy in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2015
  • 2001-04-15. The Rectangle Attack — Rectangling the Serpent in ADVANCES IN CRYPTOLOGY — EUROCRYPT 2001
  • 2018-10-27. Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints in ADVANCES IN CRYPTOLOGY – ASIACRYPT 2018
  • 2002-07-12. New Results on Boomerang and Rectangle Attacks in FAST SOFTWARE ENCRYPTION
  • 2018-03-31. Boomerang Connectivity Table: A New Cryptanalysis Tool in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2018
  • 2017-06-26. Related-Key Impossible-Differential Attack on Reduced-Round Skinny in APPLIED CRYPTOGRAPHY AND NETWORK SECURITY
  • 2011. Pushing the Limits: A Very Compact and a Threshold Implementation of AES in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2011
  • 2019-02-03. MILP-Based Differential Attack on Round-Reduced GIFT in TOPICS IN CRYPTOLOGY – CT-RSA 2019
  • 2016-07-21. The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS in ADVANCES IN CRYPTOLOGY – CRYPTO 2016
  • 2007-09-14. On Probability of Success in Linear and Differential Cryptanalysis in JOURNAL OF CRYPTOLOGY
  • 2005. A Related-Key Rectangle Attack on the Full KASUMI in ADVANCES IN CRYPTOLOGY - ASIACRYPT 2005
  • 2018-07-26. Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT in ADVANCES IN INFORMATION AND COMPUTER SECURITY
  • 2001. Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent in FAST SOFTWARE ENCRYPTION
  • Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/s10623-020-00730-1

    DOI

    http://dx.doi.org/10.1007/s10623-020-00730-1

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1124858493


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0802", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Computation Theory and Mathematics", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China", 
              "id": "http://www.grid.ac/institutes/grid.27255.37", 
              "name": [
                "Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Zhao", 
            "givenName": "Boxin", 
            "id": "sg:person.011253365033.10", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011253365033.10"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Institute for Advanced Study, Tsinghua University, 100084, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.12527.33", 
              "name": [
                "Institute for Advanced Study, Tsinghua University, 100084, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Dong", 
            "givenName": "Xiaoyang", 
            "id": "sg:person.013311564675.26", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311564675.26"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "FHNW, Institute ISE, Windisch, Aargau, Switzerland", 
              "id": "http://www.grid.ac/institutes/grid.410380.e", 
              "name": [
                "FHNW, Institute ISE, Windisch, Aargau, Switzerland"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Meier", 
            "givenName": "Willi", 
            "id": "sg:person.07653531142.18", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China", 
              "id": "http://www.grid.ac/institutes/grid.12527.33", 
              "name": [
                "Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Jia", 
            "givenName": "Keting", 
            "id": "sg:person.016423141745.48", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016423141745.48"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "Shanghai Key Lab of Trustworthy Computing, East China Normal University, 200062, Shanghai, China", 
              "id": "http://www.grid.ac/institutes/grid.22069.3f", 
              "name": [
                "Shanghai Key Lab of Trustworthy Computing, East China Normal University, 200062, Shanghai, China"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Wang", 
            "givenName": "Gaoli", 
            "id": "sg:person.010531741377.94", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010531741377.94"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-642-20465-4_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1007026772", 
              "https://doi.org/10.1007/978-3-642-20465-4_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11426639_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1037593715", 
              "https://doi.org/10.1007/11426639_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-97916-8_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1105830004", 
              "https://doi.org/10.1007/978-3-319-97916-8_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-38424-3_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1051497750", 
              "https://doi.org/10.1007/3-540-38424-3_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-04722-4", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1052093804", 
              "https://doi.org/10.1007/978-3-662-04722-4"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45661-9_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006931455", 
              "https://doi.org/10.1007/3-540-45661-9_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-03329-3_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1107870557", 
              "https://doi.org/10.1007/978-3-030-03329-3_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-21548-4_30", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1117484701", 
              "https://doi.org/10.1007/978-3-030-21548-4_30"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-56617-7_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1084744044", 
              "https://doi.org/10.1007/978-3-319-56617-7_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44706-7_6", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027439548", 
              "https://doi.org/10.1007/3-540-44706-7_6"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-41579-2_26", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1124916105", 
              "https://doi.org/10.1007/978-3-030-41579-2_26"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44987-6_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029279784", 
              "https://doi.org/10.1007/3-540-44987-6_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00145-007-9013-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015282820", 
              "https://doi.org/10.1007/s00145-007-9013-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-45608-8_15", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003371226", 
              "https://doi.org/10.1007/978-3-662-45608-8_15"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-61204-1_11", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086152860", 
              "https://doi.org/10.1007/978-3-319-61204-1_11"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-10366-7_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012721517", 
              "https://doi.org/10.1007/978-3-642-10366-7_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-57339-7_7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1086875210", 
              "https://doi.org/10.1007/978-3-319-57339-7_7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-48800-3_17", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1045485665", 
              "https://doi.org/10.1007/978-3-662-48800-3_17"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-319-78375-8_22", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1101874792", 
              "https://doi.org/10.1007/978-3-319-78375-8_22"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-21702-9_18", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1005478912", 
              "https://doi.org/10.1007/978-3-642-21702-9_18"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-662-53008-5_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1035213574", 
              "https://doi.org/10.1007/978-3-662-53008-5_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-030-12612-4_19", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1111894772", 
              "https://doi.org/10.1007/978-3-030-12612-4_19"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/11593447_24", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1039680589", 
              "https://doi.org/10.1007/11593447_24"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2020-02-13", 
        "datePublishedReg": "2020-02-13", 
        "description": "This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2331\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{331}$$\\end{document} to 2294\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{294}$$\\end{document}. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2123\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{123}$$\\end{document} and a data complexity of 2123\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{123}$$\\end{document} chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 291.58\\documentclass[12pt]{minimal}\n\t\t\t\t\\usepackage{amsmath}\n\t\t\t\t\\usepackage{wasysym}\n\t\t\t\t\\usepackage{amsfonts}\n\t\t\t\t\\usepackage{amssymb}\n\t\t\t\t\\usepackage{amsbsy}\n\t\t\t\t\\usepackage{mathrsfs}\n\t\t\t\t\\usepackage{upgreek}\n\t\t\t\t\\setlength{\\oddsidemargin}{-69pt}\n\t\t\t\t\\begin{document}$$2^{91.58}$$\\end{document}, while the best previous attack on GIFT-64 only reaches 23 rounds at most.", 
        "genre": "article", 
        "id": "sg:pub.10.1007/s10623-020-00730-1", 
        "inLanguage": "en", 
        "isAccessibleForFree": false, 
        "isFundedItemOf": [
          {
            "id": "sg:grant.8946042", 
            "type": "MonetaryGrant"
          }
        ], 
        "isPartOf": [
          {
            "id": "sg:journal.1136552", 
            "issn": [
              "0925-1022", 
              "1573-7586"
            ], 
            "name": "Designs, Codes and Cryptography", 
            "publisher": "Springer Nature", 
            "type": "Periodical"
          }, 
          {
            "issueNumber": "6", 
            "type": "PublicationIssue"
          }, 
          {
            "type": "PublicationVolume", 
            "volumeNumber": "88"
          }
        ], 
        "keywords": [
          "time complexity", 
          "data complexity", 
          "complexity", 
          "best previous attack", 
          "new model", 
          "SKINNY-128", 
          "block cipher", 
          "model", 
          "key schedule", 
          "basic modules", 
          "proof", 
          "cipher", 
          "related-key rectangle attack", 
          "GIFT-64", 
          "rectangle attack", 
          "schedule", 
          "applications", 
          "proof of work", 
          "work", 
          "cases", 
          "module", 
          "NIST", 
          "attacks", 
          "plaintext", 
          "previous attacks", 
          "SKINNY", 
          "candidates", 
          "addition", 
          "rounds", 
          "project", 
          "M1", 
          "related-key rectangle attack", 
          "standardization project", 
          "gift", 
          "paper", 
          "new generalized key-recovery model", 
          "generalized key-recovery model", 
          "key-recovery model", 
          "linear key schedule", 
          "important block ciphers", 
          "Lightweight Cryptography (LWC) standardization project", 
          "Cryptography (LWC) standardization project", 
          "related-tweakey rectangle attack", 
          "candidate LWC SKINNY AEAD M1", 
          "LWC SKINNY AEAD M1", 
          "SKINNY AEAD M1", 
          "AEAD M1"
        ], 
        "name": "Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT", 
        "pagination": "1103-1126", 
        "productId": [
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1124858493"
            ]
          }, 
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/s10623-020-00730-1"
            ]
          }
        ], 
        "sameAs": [
          "https://doi.org/10.1007/s10623-020-00730-1", 
          "https://app.dimensions.ai/details/publication/pub.1124858493"
        ], 
        "sdDataset": "articles", 
        "sdDatePublished": "2022-01-01T18:54", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/article/article_837.jsonl", 
        "type": "ScholarlyArticle", 
        "url": "https://doi.org/10.1007/s10623-020-00730-1"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s10623-020-00730-1'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s10623-020-00730-1'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s10623-020-00730-1'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s10623-020-00730-1'


     

    This table displays all metadata directly associated to this object as RDF triples.

    237 TRIPLES      22 PREDICATES      94 URIs      63 LITERALS      6 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/s10623-020-00730-1 schema:about anzsrc-for:08
    2 anzsrc-for:0802
    3 schema:author Ne07efc635b7343f58c8fb03399ac2470
    4 schema:citation sg:pub.10.1007/11426639_30
    5 sg:pub.10.1007/11593447_24
    6 sg:pub.10.1007/3-540-38424-3_1
    7 sg:pub.10.1007/3-540-44706-7_6
    8 sg:pub.10.1007/3-540-44987-6_21
    9 sg:pub.10.1007/3-540-45661-9_1
    10 sg:pub.10.1007/978-3-030-03329-3_1
    11 sg:pub.10.1007/978-3-030-12612-4_19
    12 sg:pub.10.1007/978-3-030-21548-4_30
    13 sg:pub.10.1007/978-3-030-41579-2_26
    14 sg:pub.10.1007/978-3-319-56617-7_7
    15 sg:pub.10.1007/978-3-319-57339-7_7
    16 sg:pub.10.1007/978-3-319-61204-1_11
    17 sg:pub.10.1007/978-3-319-78375-8_22
    18 sg:pub.10.1007/978-3-319-97916-8_15
    19 sg:pub.10.1007/978-3-642-10366-7_1
    20 sg:pub.10.1007/978-3-642-20465-4_6
    21 sg:pub.10.1007/978-3-642-21702-9_18
    22 sg:pub.10.1007/978-3-662-04722-4
    23 sg:pub.10.1007/978-3-662-45608-8_15
    24 sg:pub.10.1007/978-3-662-48800-3_17
    25 sg:pub.10.1007/978-3-662-53008-5_5
    26 sg:pub.10.1007/s00145-007-9013-7
    27 schema:datePublished 2020-02-13
    28 schema:datePublishedReg 2020-02-13
    29 schema:description This paper gives a new generalized key-recovery model of related-key rectangle attacks on block ciphers with linear key schedules. The model is quite optimized and applicable to various block ciphers with linear key schedule. As a proof of work, we apply the new model to two very important block ciphers, i.e. SKINNY and GIFT, which are basic modules of many candidates of the Lightweight Cryptography (LWC) standardization project by NIST. For SKINNY, we reduce the complexity of the best previous 27-round related-tweakey rectangle attack on SKINNY-128-384 from 2331\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{331}$$\end{document} to 2294\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{294}$$\end{document}. In addition, the first 28-round related-tweakey rectangle attack on SKINNY-128-384 is given, which gains one more round than before. For the candidate LWC SKINNY AEAD M1, we conduct a 24-round related-tweakey rectangle attack with a time complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} and a data complexity of 2123\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{123}$$\end{document} chosen plaintexts. For the case of GIFT-64, we give the first 24-round related-key rectangle attack with a time complexity 291.58\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$2^{91.58}$$\end{document}, while the best previous attack on GIFT-64 only reaches 23 rounds at most.
    30 schema:genre article
    31 schema:inLanguage en
    32 schema:isAccessibleForFree false
    33 schema:isPartOf N8fe7cdfd0dd44afc828fe59270df02a1
    34 Na15389bc978743c1a6af94bc27a12bc5
    35 sg:journal.1136552
    36 schema:keywords AEAD M1
    37 Cryptography (LWC) standardization project
    38 GIFT-64
    39 LWC SKINNY AEAD M1
    40 Lightweight Cryptography (LWC) standardization project
    41 M1
    42 NIST
    43 SKINNY
    44 SKINNY AEAD M1
    45 SKINNY-128
    46 addition
    47 applications
    48 attacks
    49 basic modules
    50 best previous attack
    51 block cipher
    52 candidate LWC SKINNY AEAD M1
    53 candidates
    54 cases
    55 cipher
    56 complexity
    57 data complexity
    58 generalized key-recovery model
    59 gift
    60 important block ciphers
    61 key schedule
    62 key-recovery model
    63 linear key schedule
    64 model
    65 module
    66 new generalized key-recovery model
    67 new model
    68 paper
    69 plaintext
    70 previous attacks
    71 project
    72 proof
    73 proof of work
    74 rectangle attack
    75 related-key rectangle attack
    76 related-tweakey rectangle attack
    77 rounds
    78 schedule
    79 standardization project
    80 time complexity
    81 work
    82 schema:name Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
    83 schema:pagination 1103-1126
    84 schema:productId N0440c56913ce47c9b585fb8ae517fddd
    85 N392b64c36fd94fc0a4c3d0e24765d8e9
    86 schema:sameAs https://app.dimensions.ai/details/publication/pub.1124858493
    87 https://doi.org/10.1007/s10623-020-00730-1
    88 schema:sdDatePublished 2022-01-01T18:54
    89 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    90 schema:sdPublisher N6f2ec330e1aa41be83929e9b0d7ca9be
    91 schema:url https://doi.org/10.1007/s10623-020-00730-1
    92 sgo:license sg:explorer/license/
    93 sgo:sdDataset articles
    94 rdf:type schema:ScholarlyArticle
    95 N0440c56913ce47c9b585fb8ae517fddd schema:name doi
    96 schema:value 10.1007/s10623-020-00730-1
    97 rdf:type schema:PropertyValue
    98 N045a5c4b53d0422181a8015b0de63893 rdf:first sg:person.07653531142.18
    99 rdf:rest N321f1ac7f1a54a5c989628c3a2a112da
    100 N1d83bb73e3c4425b8320901d32eff089 rdf:first sg:person.010531741377.94
    101 rdf:rest rdf:nil
    102 N321f1ac7f1a54a5c989628c3a2a112da rdf:first sg:person.016423141745.48
    103 rdf:rest N1d83bb73e3c4425b8320901d32eff089
    104 N392b64c36fd94fc0a4c3d0e24765d8e9 schema:name dimensions_id
    105 schema:value pub.1124858493
    106 rdf:type schema:PropertyValue
    107 N6f2ec330e1aa41be83929e9b0d7ca9be schema:name Springer Nature - SN SciGraph project
    108 rdf:type schema:Organization
    109 N8fe7cdfd0dd44afc828fe59270df02a1 schema:issueNumber 6
    110 rdf:type schema:PublicationIssue
    111 Na15389bc978743c1a6af94bc27a12bc5 schema:volumeNumber 88
    112 rdf:type schema:PublicationVolume
    113 Nb46dd3937f1544b88ce4edf061bc51e6 rdf:first sg:person.013311564675.26
    114 rdf:rest N045a5c4b53d0422181a8015b0de63893
    115 Ne07efc635b7343f58c8fb03399ac2470 rdf:first sg:person.011253365033.10
    116 rdf:rest Nb46dd3937f1544b88ce4edf061bc51e6
    117 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    118 schema:name Information and Computing Sciences
    119 rdf:type schema:DefinedTerm
    120 anzsrc-for:0802 schema:inDefinedTermSet anzsrc-for:
    121 schema:name Computation Theory and Mathematics
    122 rdf:type schema:DefinedTerm
    123 sg:grant.8946042 http://pending.schema.org/fundedItem sg:pub.10.1007/s10623-020-00730-1
    124 rdf:type schema:MonetaryGrant
    125 sg:journal.1136552 schema:issn 0925-1022
    126 1573-7586
    127 schema:name Designs, Codes and Cryptography
    128 schema:publisher Springer Nature
    129 rdf:type schema:Periodical
    130 sg:person.010531741377.94 schema:affiliation grid-institutes:grid.22069.3f
    131 schema:familyName Wang
    132 schema:givenName Gaoli
    133 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010531741377.94
    134 rdf:type schema:Person
    135 sg:person.011253365033.10 schema:affiliation grid-institutes:grid.27255.37
    136 schema:familyName Zhao
    137 schema:givenName Boxin
    138 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011253365033.10
    139 rdf:type schema:Person
    140 sg:person.013311564675.26 schema:affiliation grid-institutes:grid.12527.33
    141 schema:familyName Dong
    142 schema:givenName Xiaoyang
    143 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013311564675.26
    144 rdf:type schema:Person
    145 sg:person.016423141745.48 schema:affiliation grid-institutes:grid.12527.33
    146 schema:familyName Jia
    147 schema:givenName Keting
    148 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016423141745.48
    149 rdf:type schema:Person
    150 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
    151 schema:familyName Meier
    152 schema:givenName Willi
    153 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
    154 rdf:type schema:Person
    155 sg:pub.10.1007/11426639_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037593715
    156 https://doi.org/10.1007/11426639_30
    157 rdf:type schema:CreativeWork
    158 sg:pub.10.1007/11593447_24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039680589
    159 https://doi.org/10.1007/11593447_24
    160 rdf:type schema:CreativeWork
    161 sg:pub.10.1007/3-540-38424-3_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1051497750
    162 https://doi.org/10.1007/3-540-38424-3_1
    163 rdf:type schema:CreativeWork
    164 sg:pub.10.1007/3-540-44706-7_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027439548
    165 https://doi.org/10.1007/3-540-44706-7_6
    166 rdf:type schema:CreativeWork
    167 sg:pub.10.1007/3-540-44987-6_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029279784
    168 https://doi.org/10.1007/3-540-44987-6_21
    169 rdf:type schema:CreativeWork
    170 sg:pub.10.1007/3-540-45661-9_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006931455
    171 https://doi.org/10.1007/3-540-45661-9_1
    172 rdf:type schema:CreativeWork
    173 sg:pub.10.1007/978-3-030-03329-3_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1107870557
    174 https://doi.org/10.1007/978-3-030-03329-3_1
    175 rdf:type schema:CreativeWork
    176 sg:pub.10.1007/978-3-030-12612-4_19 schema:sameAs https://app.dimensions.ai/details/publication/pub.1111894772
    177 https://doi.org/10.1007/978-3-030-12612-4_19
    178 rdf:type schema:CreativeWork
    179 sg:pub.10.1007/978-3-030-21548-4_30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1117484701
    180 https://doi.org/10.1007/978-3-030-21548-4_30
    181 rdf:type schema:CreativeWork
    182 sg:pub.10.1007/978-3-030-41579-2_26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1124916105
    183 https://doi.org/10.1007/978-3-030-41579-2_26
    184 rdf:type schema:CreativeWork
    185 sg:pub.10.1007/978-3-319-56617-7_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084744044
    186 https://doi.org/10.1007/978-3-319-56617-7_7
    187 rdf:type schema:CreativeWork
    188 sg:pub.10.1007/978-3-319-57339-7_7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086875210
    189 https://doi.org/10.1007/978-3-319-57339-7_7
    190 rdf:type schema:CreativeWork
    191 sg:pub.10.1007/978-3-319-61204-1_11 schema:sameAs https://app.dimensions.ai/details/publication/pub.1086152860
    192 https://doi.org/10.1007/978-3-319-61204-1_11
    193 rdf:type schema:CreativeWork
    194 sg:pub.10.1007/978-3-319-78375-8_22 schema:sameAs https://app.dimensions.ai/details/publication/pub.1101874792
    195 https://doi.org/10.1007/978-3-319-78375-8_22
    196 rdf:type schema:CreativeWork
    197 sg:pub.10.1007/978-3-319-97916-8_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1105830004
    198 https://doi.org/10.1007/978-3-319-97916-8_15
    199 rdf:type schema:CreativeWork
    200 sg:pub.10.1007/978-3-642-10366-7_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012721517
    201 https://doi.org/10.1007/978-3-642-10366-7_1
    202 rdf:type schema:CreativeWork
    203 sg:pub.10.1007/978-3-642-20465-4_6 schema:sameAs https://app.dimensions.ai/details/publication/pub.1007026772
    204 https://doi.org/10.1007/978-3-642-20465-4_6
    205 rdf:type schema:CreativeWork
    206 sg:pub.10.1007/978-3-642-21702-9_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005478912
    207 https://doi.org/10.1007/978-3-642-21702-9_18
    208 rdf:type schema:CreativeWork
    209 sg:pub.10.1007/978-3-662-04722-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052093804
    210 https://doi.org/10.1007/978-3-662-04722-4
    211 rdf:type schema:CreativeWork
    212 sg:pub.10.1007/978-3-662-45608-8_15 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003371226
    213 https://doi.org/10.1007/978-3-662-45608-8_15
    214 rdf:type schema:CreativeWork
    215 sg:pub.10.1007/978-3-662-48800-3_17 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045485665
    216 https://doi.org/10.1007/978-3-662-48800-3_17
    217 rdf:type schema:CreativeWork
    218 sg:pub.10.1007/978-3-662-53008-5_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1035213574
    219 https://doi.org/10.1007/978-3-662-53008-5_5
    220 rdf:type schema:CreativeWork
    221 sg:pub.10.1007/s00145-007-9013-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015282820
    222 https://doi.org/10.1007/s00145-007-9013-7
    223 rdf:type schema:CreativeWork
    224 grid-institutes:grid.12527.33 schema:alternateName Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China
    225 Institute for Advanced Study, Tsinghua University, 100084, Beijing, China
    226 schema:name Department of Computer Science and Technology, Tsinghua University, 100084, Beijing, China
    227 Institute for Advanced Study, Tsinghua University, 100084, Beijing, China
    228 rdf:type schema:Organization
    229 grid-institutes:grid.22069.3f schema:alternateName Shanghai Key Lab of Trustworthy Computing, East China Normal University, 200062, Shanghai, China
    230 schema:name Shanghai Key Lab of Trustworthy Computing, East China Normal University, 200062, Shanghai, China
    231 rdf:type schema:Organization
    232 grid-institutes:grid.27255.37 schema:alternateName Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China
    233 schema:name Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, 250100, Jinan, China
    234 rdf:type schema:Organization
    235 grid-institutes:grid.410380.e schema:alternateName FHNW, Institute ISE, Windisch, Aargau, Switzerland
    236 schema:name FHNW, Institute ISE, Windisch, Aargau, Switzerland
    237 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...