DIFFERENTIAL CRYPTANALYSIS OF THE LIGHTWEIGHT BLOCK CIPHER CYPRESS-256
Keywords:lightweight cryptography, block cipher, differential cryptanalysis, differential characteristic, difference distribution table, differential probability.
AbstractThis paper presents the results of differential cryptanalysis of the lightweight block cipher Cypress-256. The method for searching multi-round differential characteristic of the block cipher Cypress-256 is proposed. The searching assumes 1) building a big set of one-round differential characteristics and search for possible combinations of one-round characteristics into multi-round ones; 2) extending one-round differential characteristics with the probability up to certain threshold into multi-round characteristics. The following experiments show that the most probable one-round differential characteristics have input differences with 4-6 active bits which are distributed between different words. Besides that, high-probable one-round differential characteristics, which output differences have a small Hamming weight, cannot be extended to build high-probable multi-round differential characteristics. Due to application of the method assuming extension of one-round differential characteristics into multi-round ones, the differential characteristic up to 6 rounds was built, so 10-round block cipher Cypress-256 is resistant to differential cryptanalysis according to the requirements of practical criterion.
R. Oliynykov et al., “A new encryption standard of Ukraine: The Kalyna block cipher,” IACR Cryptology ePrint Archive, 2015, 650.
Pub, NIST FIPS. “197: Advanced encryption standard (AES),” Federal Information Processing Standards Publication, 197.441: 0311, 2001.
I. Gorbenko, A. Kuznetsov, M. Lutsenko and D. Ivanenko, “The research of modern stream ciphers,” Proceedings of the 2017 4th IEEE International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), 2017, pp. 207-210.
O. Kuznetsov, M. Lutsenko and D. Ivanenko, “Strumok stream cipher: Specification and basic properties,” Proceedings of the 2016 Third IEEE International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T), Kharkov, 2016, pp. 59-62.
N. Mouha, “The design space of lightweight cryptography,” Proceedings of the NIST Lightweight Cryptography Workshop, 2015, pp. 1-19.
A. Kuznetsov, Y. Gorbenko, A. Andrushkevych and I. Belozersev, “Analysis of block symmetric algorithms from international standard of lightweight cryptography ISO/IEC 29192-2,” Proceedings of the 2017 4th IEEE International Scientific-Practical Conference Problems of Infocommunications. Science and Technology (PIC S&T), Kharkov, 2017, pp. 203-206.
Lightweight Cryptography. Project Overview [Online]. Available at: https://csrc.nist.gov/projects/lightweight-cryptography
A. Andrushkevych, Y. Gorbenko, O. Kuznetsov, R. Oliynykov, M. Rodinko, “A prospective lightweight block cipher for green IT engineering,” in: Kharchenko V., Kondratenko Y., Kacprzyk J. (eds) Green IT Engineering: Social, Business and Industrial Applications. Studies in Systems, Decision and Control, Springer, Cham, vol 171, 2019, pp. 95-112. DOI: 10.1007/978-3-030-00253-4_5
R. Beaulieu et al., “The SIMON and SPECK lightweight block ciphers,” Proceedings of the 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), 2015, pp. 1-6.
D. J. Wheeler and R. M. Needham, “TEA, a Tiny Encryption Algorithm,” Proceedings of the International Workshop on Fast Software Encryption, Springer, Heidelberg, 1995, pp. 363–366.
D. Hong, et al., “LEA: A 128-bit block cipher for fast encryption on common processors,” Proceedings of the International Workshop on Information Security Applications, Springer, Cham, 2013, pp. 3-27.
A. Kuznetsov, R. Serhiienko, D. Prokopovych-Tkachenko, and Yu. Tarasenko, “Evaluation of algebraic immunity of modern block ciphers,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018, pp. 288-293.
M. Rodinko, R. Oliynykov, Yu. Gorbenko, “Optimization of the high nonlinear S-boxes generation method,” Tatra Mountains Mathematical Publications, vol. 70, no. 1, pp. 93-105, 2017.
M. Rodinko, R. Oliynykov and R. Eliseev, “Search for one-round differential characteristics of lighweight block cipher Cypress-256,” Proceedings of the 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT), 2018, pp. 312-315.
A. Biryukov, V. Velichkov, “Automatic search for differential trails in ARX ciphers,” CT-RSA, vol. 8366, pp. 227-250, 2014.
X. Lai, J. L. Massey and S. Murphy, “Markov ciphers and differential cryptanalysis,” Proceedings of the Workshop on the Theory and Application of of Cryptographic Techniques, Springer, Berlin, Heidelberg, 1991, pp. 17-38.
N. Mouha,, and B. Preneel, “Towards finding optimal differential characteristics for ARX: Application to Salsa20,” Cryptology ePrint Archive, Report 2013/328, 2013.
D. Dinu et al., “SPARX: A family of ARX-based lightweight block ciphers provably secure against linear and differential attacks,” Proceedings of the ASIACRYPT'16, pp. 1-21, 2016.
J. P. Aumasson et al., “New features of Latin dances: analysis of Salsa ChaCha and Rumba,” Lecture Notes in Computer Science, vol. 5086, 2008, pp. 470-488.
H. Lipmaa, J. Wallén, and P. Dumas, “On the additive differential probability of exclusive-or,” in: Roy, B.K., Meier, W. (eds.) Proceedings of the International Workshop on Fast Software Encryption, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, vol. 3017, 2004, pp. 317-331.
H. Lipmaa and S. Moriai, “Efficient algorithms for computing differential properties of addition,” Proceedings of the International Workshop on Fast Software Encryption, Springer, Berlin, Heidelberg, 2001, pp. 336-350.
B. Liu, L. Li, R. Wu, M. Xie and Q. P. Li, “Loong: A family of involutional lightweight block cipher based on SPN structure,” IEEE Access, vol. 7, pp. 136023-136035, 2019.
D. Sehrawat, N. S. Gill and M. Devi, “Comparative analysis of lightweight block ciphers in IoT-enabled smart environment,” Proceedings of the 2019 6th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 2019, pp. 915-920.
I. Khairullin and V. Bobrov, “On cryptographic properties of some lightweight algorithms and its application to the construction of S-boxes,” Proceedings of the 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), Saint Petersburg and Moscow, Russia, 2019, pp. 1807-1810.
E. Marsola do Nascimento and J. A. Moreira Xexeo, “A flexible authenticated lightweight cipher using Even-Mansour construction,” Proceedings of the 2017 IEEE International Conference on Communications (ICC), Paris, 2017, pp. 1-6.
R. S. Mahantesh and S. Mohapatra, “Design of secured block ciphers PRESENT and HIGHT algorithms and its FPGA implementation,” Proceedings of the 2018 Second International Conference on Intelligent Computing and Control Systems (ICICCS), Madurai, India, 2018, pp. 1113-1118.
S. Kotel, F. Sbiaa, M. Zeghid, M. Machhout, A. Baganne and R. Tourki, “Performance evaluation and design considerations of lightweight block cipher for low-cost embedded devices,” Proceedings of the 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, 2016, pp. 1-7.
O. Kara and M. F. Esgin, “On analysis of lightweight stream ciphers with Keyed update,” IEEE Transactions on Computers, vol. 68, issue 1, pp. 99-110, Jan. 2019.
M. Yoshikawa, Y. Nozaki and K. Asahi, “Vulnerability evaluation accelerator for lightweight ciphers,” Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, 2016, pp. 377-381.
M. A. Philip and Vaithiyanathan, “A survey on lightweight ciphers for IoT devices,” Proceedings of the 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy), Kollam, 2017, pp. 1-4.
C. A. Lara-Niño, M. Morales-Sandoval and A. Díaz-Pérez, “An evaluation of AES and present ciphers for lightweight cryptography on smartphones,” Proceedings of the 2016 International Conference on Electronics, Communications and Computers (CONIELECOMP), Cholula, 2016, pp. 87-93.
B. J. Mohd and T. Hayajneh, “Lightweight block ciphers for IoT: Energy optimization and survivability techniques,” IEEE Access, vol. 6, pp. 35966-35978, 2018.
C. Zhao, Y. Yan and W. Li, “An efficient ASIC Implementation of QARMA lightweight algorithm,” Proceedings of the 2019 IEEE 13th International Conference on ASIC (ASICON), Chongqing, China, 2019, pp. 1-4.
C. A. Lara-Nino, M. Morales-Sandoval and A. Diaz-Perez, “Novel FPGA-based low-cost hardware architecture for the PRESENT block cipher,” Proceedings of the 2016 Euromicro Conference on Digital System Design (DSD), Limassol, 2016, pp. 646-650.
K. Runovski, H.-J. Schmeisser, “On the convergence of fourier means and interpolation means,” Journal of Computational Analysis and Applications, vol. 6, issue 3, pp. 211-227, 2004.
B. P. Tkach, & L. B. Urmancheva, “Numerical-analytic method for finding solutions of systems with distributed parameters and integral condition,” Nonlinear Oscillations, vol. 12, issue 1, pp. 113-122, 2009. doi:10.1007/s11072-009-0064-6
R.K. Chornei, V.M. Hans Daduna, P.S. Knopov, P. “Controlled Markov fields with finite state space on graphs,” Stochastic Models, vol. 21, issue 4, pp. 847-874, 2005. doi:10.1080/15326340500294520
L. Dalmasso, F. Bruguier, P. Benoit and L. Torres, “Evaluation of SPN-based lightweight crypto-ciphers,” IEEE Access, vol. 7, pp. 10559-10567, 2019.
I. K. Dutta, B. Ghosh and M. Bayoumi, “Lightweight cryptography for Internet of insecure things: A survey,” Proceedings of the 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2019, pp. 0475-0481.
A. Heuser, S. Picek, S. Guilley and N. Mentens, “Lightweight ciphers and their side-channel resilience,” IEEE Transactions on Computers, pp. 1-20, 2020.
N. A. Gunathilake, W. J. Buchanan and R. Asif, “Next generation lightweight cryptography for smart IoT devices: Implementation, challenges and applications,” Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 2019, pp. 707-710.
How to Cite
LicenseInternational Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:
• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.