ZHENG Yafei, WU Wenling. Security of Khudra Against Meet-in-the-Middle-Type Cryptanalysis[J]. Chinese Journal of Electronics, 2019, 28(3): 482-488. doi: 10.1049/cje.2019.03.008
Citation: ZHENG Yafei, WU Wenling. Security of Khudra Against Meet-in-the-Middle-Type Cryptanalysis[J]. Chinese Journal of Electronics, 2019, 28(3): 482-488. doi: 10.1049/cje.2019.03.008

Security of Khudra Against Meet-in-the-Middle-Type Cryptanalysis

doi: 10.1049/cje.2019.03.008
Funds:  This work is supported by the National Natural Science Foundation of China (No. 61672509), and the National Cryptography Development Foundation of China (No. MMJJ20170101).
  • Received Date: 2016-10-26
  • Publish Date: 2019-05-10
  • Khudra is a lightweight block cipher proposed in SPACE 2014. The cipher is designed for Field programmable gate array (FPGA) based platforms. In this paper, we introduce the first biclique attack on full Khudra in the single key setting, with time complexity of 278.3 encryptions. The time complexity can be further reduced if the post-whitening key is omitted. Furthermore, based on the bicliques constructed, Meet-in-the-middle(MITM) attack is applied to 15-round Khudra, and the best result of Khudra in terms of attacked rounds against MITM attack is achieved.
  • loading
  • A. Bogdanov, et al., "PRESENT:An ultra-lightweight block cipher", Proc. of CHES 2007. Vienna, Austria, Vol.4727, pp.450-466, 2007.
    C. De Cannière, et al., "KATAN and KTANTAN-A family of Small and Efficient hardware-oriented block ciphers", Proc. of CHES 2009. Lausanne, Switzerlard, Vol.5747, pp.272-288, 2009.
    W. Wu and L. Zhang, "LBlock:A lightweight block cipher", Proc.of ACNS, Nerja, Spain, Vol.6715, pp.327-344, 2011.
    R. Beaulieu, et al., "The SIMON and SPECK lightweight block ciphers", Proc. of ACM, Seaffle, Washingfon, USA, pp.3-20, 2015.
    S. Kolay and D. Mukhopadhyay, "Khudra:A new lightweight block cipher for FPGAs", Proc. of SPACE, Pune, India, Vol.8804, pp.126-145, 2014.
    K. Nyberg, "Generalized feistel networks", ASIACRYPT 1996, LNCS, Vol.1163, pp.91-104, 1996.
    L. Zhang and W. Wu, "Improved differential and linear active S-boxes search techniques for Feistel Type Ciphers", Chinese Journal of Electronics, Vol.24, No.2, pp.343-348, 2015.
    Y. Wang, W. Wu, L. Zhang, "Diffusion and security evaluation of feistel-PG", Chinese Journal of Electronics, Vol.26, No.4, pp.734-739, 2017.
    X. Ma and K. Qiao, "Related-key rectangle attack on roundreduced Khudra block cipher", Proc. of Network and System Security, New York USA, pp.331-344, 2015.
    Q. Yang, et al., "Related-key impossible differential analysis of Full Khudra", Proc. of IWSEC, Tokyo, Japan, pp.135-146, 2016
    M. Tolba,et al., "Meet-in-the-Middle attacks on roundreduced Khudra", Proc. of SPACE, Jaipur, India pp.127-138, 2015.
    M. Özen, M. Çban and F. Karakoç, "A guess-and-determine attack on reduced-round khudra and weak keys of full cipher", Cryptology ePrint Archive, Report 2015/1163(2015). http://eprint.iacr.org/.
    W. Diffie and M.E. Hellman, "Special feature exhaustive cryptanalysis of the NBS data encryption standard", IEEE Computer, Vol.10, No.6, pp.74-84, 1977.
    Sazaki Y, "Meet-in-the-Middle preimage attacks on AES hashing modes and an application to Whirlpool", Proc. of FSE, Lyngby, Denmark, pp.378-396, 2011.
    W. Zhang and X. Liu, "An related-key Meet-in-themiddle algebraic attack on the NLFSR based block cipher KTANTAN32", Aota Electrouica Sinica, Vol.40, No.10, pp.2097-2100, 2012.(in Chinese)
    A. Bogdanov, D. Khovratovich and C. Rechberger, "Biclique Cryptanalysis of the Full AES", Proc. of ASIACYPT, Secul, South Korea, pp.344-371, 2011.
    T. Isobe and K. Shibutani, "Security analysis of the lightweight block ciphers XTEA, LED and Piccolo", Proc. of Information Security and Privacy, Wollongong, Arstralia, Vol.7372, pp.71-86, 2012.
    Y. Wang and W. Wu, "Meet-in-the-Middle attack on TWINE block cipher", Journal of Software, Vol.26, No.10, pp.2684-2695, 2015.
  • 加载中


    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (156) PDF downloads(202) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint