Cargando…
Cube attacks on round-reduced TinyJAMBU
Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National In...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8964795/ https://www.ncbi.nlm.nih.gov/pubmed/35351928 http://dx.doi.org/10.1038/s41598-022-09004-3 |
_version_ | 1784678298070024192 |
---|---|
author | Teng, Wil Liam Salam, Iftekhar Yau, Wei-Chuen Pieprzyk, Josef Phan, Raphaël C.-W. |
author_facet | Teng, Wil Liam Salam, Iftekhar Yau, Wei-Chuen Pieprzyk, Josef Phan, Raphaël C.-W. |
author_sort | Teng, Wil Liam |
collection | PubMed |
description | Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1–DA5 and two key recovery attacks KRA1–KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3–DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers. |
format | Online Article Text |
id | pubmed-8964795 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-89647952022-03-30 Cube attacks on round-reduced TinyJAMBU Teng, Wil Liam Salam, Iftekhar Yau, Wei-Chuen Pieprzyk, Josef Phan, Raphaël C.-W. Sci Rep Article Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1–DA5 and two key recovery attacks KRA1–KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3–DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers. Nature Publishing Group UK 2022-03-29 /pmc/articles/PMC8964795/ /pubmed/35351928 http://dx.doi.org/10.1038/s41598-022-09004-3 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Teng, Wil Liam Salam, Iftekhar Yau, Wei-Chuen Pieprzyk, Josef Phan, Raphaël C.-W. Cube attacks on round-reduced TinyJAMBU |
title | Cube attacks on round-reduced TinyJAMBU |
title_full | Cube attacks on round-reduced TinyJAMBU |
title_fullStr | Cube attacks on round-reduced TinyJAMBU |
title_full_unstemmed | Cube attacks on round-reduced TinyJAMBU |
title_short | Cube attacks on round-reduced TinyJAMBU |
title_sort | cube attacks on round-reduced tinyjambu |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8964795/ https://www.ncbi.nlm.nih.gov/pubmed/35351928 http://dx.doi.org/10.1038/s41598-022-09004-3 |
work_keys_str_mv | AT tengwilliam cubeattacksonroundreducedtinyjambu AT salamiftekhar cubeattacksonroundreducedtinyjambu AT yauweichuen cubeattacksonroundreducedtinyjambu AT pieprzykjosef cubeattacksonroundreducedtinyjambu AT phanraphaelcw cubeattacksonroundreducedtinyjambu |