Self‐similarity cryptanalysis of the block cipher ITUbee. Issue 3 (1st May 2015)
- Record Type:
- Journal Article
- Title:
- Self‐similarity cryptanalysis of the block cipher ITUbee. Issue 3 (1st May 2015)
- Main Title:
- Self‐similarity cryptanalysis of the block cipher ITUbee
- Authors:
- Soleimany, Hadi
- Abstract:
- Abstract : Recent developments in the resource constrained devices have led to a renewed interest in designing light‐weight primitives with inventive and unconventional structures. Using round‐dependent constants instead of a strong key schedule is one of the most widely used trick against the self‐similarity cryptanalysis in recent cipher proposals. So far there has been little discussion about the effect of the round constants on the security of the ciphers. In this study, the authors identify several weaknesses in round‐reduced versions of the block cipher ITUbee, which was presented recently at LightSec 2013. These weaknesses allow to build relations between the round constants. The author's technique leads to several cryptanalysis in the weak‐key, related‐key and single‐key models and shows that the resistance of ITUbee against self‐similarity cryptanalysis is not independent of the values of round constants. They show that the round‐reduced cipher under a fraction of the keys is distinguishable from an ideal random permutation. Then they utilise a similar technique to show there exists a deterministic related‐key differential distinguisher for up to eight rounds of the cipher. This observation leads to the decrease of the security of 8‐round ITUbee in the single‐key model by one bit.
- Is Part Of:
- IET information security. Volume 9:Issue 3(2015)
- Journal:
- IET information security
- Issue:
- Volume 9:Issue 3(2015)
- Issue Display:
- Volume 9, Issue 3 (2015)
- Year:
- 2015
- Volume:
- 9
- Issue:
- 3
- Issue Sort Value:
- 2015-0009-0003-0000
- Page Start:
- 179
- Page End:
- 184
- Publication Date:
- 2015-05-01
- Subjects:
- cryptography
self‐similarity cryptanalysis -- block cipher -- ITUbee -- resource constrained devices -- light‐weight primitive designing -- round‐dependent constants -- security -- weak‐key model -- related‐key model -- single‐key model -- round‐reduced cipher -- deterministic related‐key differential distinguisher
Computer security -- Periodicals
Cryptography -- Periodicals
Computer networks -- Security measures -- Periodicals
Database security -- Periodicals
005.8 - Journal URLs:
- https://ietresearch.onlinelibrary.wiley.com/journal/17518717 ↗
http://digital-library.theiet.org/content/journals/iet-ifs ↗
http://www.ietdl.org/IET-IFS ↗
http://www.theiet.org/ ↗ - DOI:
- 10.1049/iet-ifs.2014.0131 ↗
- Languages:
- English
- ISSNs:
- 1751-8709
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 4363.252660
British Library DSC - BLDSS-3PM
British Library HMNTS - ELD Digital store - Ingest File:
- 16479.xml