Cargando…

Cube attacks on round-reduced TinyJAMBU

Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National In...

Descripción completa

Detalles Bibliográficos
Autores principales: Teng, Wil Liam, Salam, Iftekhar, Yau, Wei-Chuen, Pieprzyk, Josef, Phan, Raphaël C.-W.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8964795/
https://www.ncbi.nlm.nih.gov/pubmed/35351928
http://dx.doi.org/10.1038/s41598-022-09004-3
_version_ 1784678298070024192
author Teng, Wil Liam
Salam, Iftekhar
Yau, Wei-Chuen
Pieprzyk, Josef
Phan, Raphaël C.-W.
author_facet Teng, Wil Liam
Salam, Iftekhar
Yau, Wei-Chuen
Pieprzyk, Josef
Phan, Raphaël C.-W.
author_sort Teng, Wil Liam
collection PubMed
description Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1–DA5 and two key recovery attacks KRA1–KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3–DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers.
format Online
Article
Text
id pubmed-8964795
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-89647952022-03-30 Cube attacks on round-reduced TinyJAMBU Teng, Wil Liam Salam, Iftekhar Yau, Wei-Chuen Pieprzyk, Josef Phan, Raphaël C.-W. Sci Rep Article Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1–DA5 and two key recovery attacks KRA1–KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3–DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers. Nature Publishing Group UK 2022-03-29 /pmc/articles/PMC8964795/ /pubmed/35351928 http://dx.doi.org/10.1038/s41598-022-09004-3 Text en © The Author(s) 2022 https://creativecommons.org/licenses/by/4.0/Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Article
Teng, Wil Liam
Salam, Iftekhar
Yau, Wei-Chuen
Pieprzyk, Josef
Phan, Raphaël C.-W.
Cube attacks on round-reduced TinyJAMBU
title Cube attacks on round-reduced TinyJAMBU
title_full Cube attacks on round-reduced TinyJAMBU
title_fullStr Cube attacks on round-reduced TinyJAMBU
title_full_unstemmed Cube attacks on round-reduced TinyJAMBU
title_short Cube attacks on round-reduced TinyJAMBU
title_sort cube attacks on round-reduced tinyjambu
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8964795/
https://www.ncbi.nlm.nih.gov/pubmed/35351928
http://dx.doi.org/10.1038/s41598-022-09004-3
work_keys_str_mv AT tengwilliam cubeattacksonroundreducedtinyjambu
AT salamiftekhar cubeattacksonroundreducedtinyjambu
AT yauweichuen cubeattacksonroundreducedtinyjambu
AT pieprzykjosef cubeattacksonroundreducedtinyjambu
AT phanraphaelcw cubeattacksonroundreducedtinyjambu