Analysis of AES, SKINNY, and Others with Constraint Programming

Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show that a simple application of the CP approach proposed by Gerault et al. leads to the solution of the...

Full description

Bibliographic Details
Main Authors: Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2017-03-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
AES
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/595
id doaj-d8028eb26a5544bd999bee7740ca3a44
record_format Article
spelling doaj-d8028eb26a5544bd999bee7740ca3a442021-03-02T05:00:29ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2017-03-0128130610.13154/tosc.v2017.i1.281-306595Analysis of AES, SKINNY, and Others with Constraint ProgrammingSiwei Sun0David Gerault1Pascal Lafourcade2Qianqian Yang3Yosuke Todo4Kexin Qiao5Lei Hu6State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Data Assurance and Communication Security Research Center, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of SciencesLIMOS, University Clermont AuvergneLIMOS, University Clermont AuvergneState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Data Assurance and Communication Security Research Center, Chinese Academy of SciencesNTT Secure Platform LaboratoriesState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Data Assurance and Communication Security Research Center, Chinese Academy of SciencesState Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences; Data Assurance and Communication Security Research Center, Chinese Academy of Sciences; School of Cyber Security, University of Chinese Academy of SciencesSearch for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show that a simple application of the CP approach proposed by Gerault et al. leads to the solution of the open problem of determining the exact lower bound of the number of active S-boxes for 6-round AES-128 in the related-key model. Subsequently, we show that the same approach can be applied in searching for integral distinguishers, impossible differentials, zero-correlation linear approximations, in both the single-key and related-(twea)key model. We implement the method using the open source constraint solver Choco and apply it to the block ciphers PRESENT, SKINNY, and HIGHT (ARX construction). As a result, we find 16 related-tweakey impossible differentials for 12-round SKINNY-64-128 based on which we construct an 18-round attack on SKINNY-64-128 (one target version for the crypto competition https://sites.google.com/site/skinnycipher announced at ASK 2016). Moreover, we show that in some cases, when equipped with proper strategies (ordering heuristic, restart and dynamic branching strategy), the CP approach can be very efficient. Therefore, we suggest that the constraint programming technique should become a convenient tool at hand of the symmetric-key cryptanalysts.https://tosc.iacr.org/index.php/ToSC/article/view/595Differential CryptanalysisIntegral CryptanalysisConstraint ProgrammingAESSKINNY
collection DOAJ
language English
format Article
sources DOAJ
author Siwei Sun
David Gerault
Pascal Lafourcade
Qianqian Yang
Yosuke Todo
Kexin Qiao
Lei Hu
spellingShingle Siwei Sun
David Gerault
Pascal Lafourcade
Qianqian Yang
Yosuke Todo
Kexin Qiao
Lei Hu
Analysis of AES, SKINNY, and Others with Constraint Programming
IACR Transactions on Symmetric Cryptology
Differential Cryptanalysis
Integral Cryptanalysis
Constraint Programming
AES
SKINNY
author_facet Siwei Sun
David Gerault
Pascal Lafourcade
Qianqian Yang
Yosuke Todo
Kexin Qiao
Lei Hu
author_sort Siwei Sun
title Analysis of AES, SKINNY, and Others with Constraint Programming
title_short Analysis of AES, SKINNY, and Others with Constraint Programming
title_full Analysis of AES, SKINNY, and Others with Constraint Programming
title_fullStr Analysis of AES, SKINNY, and Others with Constraint Programming
title_full_unstemmed Analysis of AES, SKINNY, and Others with Constraint Programming
title_sort analysis of aes, skinny, and others with constraint programming
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2017-03-01
description Search for different types of distinguishers are common tasks in symmetrickey cryptanalysis. In this work, we employ the constraint programming (CP) technique to tackle such problems. First, we show that a simple application of the CP approach proposed by Gerault et al. leads to the solution of the open problem of determining the exact lower bound of the number of active S-boxes for 6-round AES-128 in the related-key model. Subsequently, we show that the same approach can be applied in searching for integral distinguishers, impossible differentials, zero-correlation linear approximations, in both the single-key and related-(twea)key model. We implement the method using the open source constraint solver Choco and apply it to the block ciphers PRESENT, SKINNY, and HIGHT (ARX construction). As a result, we find 16 related-tweakey impossible differentials for 12-round SKINNY-64-128 based on which we construct an 18-round attack on SKINNY-64-128 (one target version for the crypto competition https://sites.google.com/site/skinnycipher announced at ASK 2016). Moreover, we show that in some cases, when equipped with proper strategies (ordering heuristic, restart and dynamic branching strategy), the CP approach can be very efficient. Therefore, we suggest that the constraint programming technique should become a convenient tool at hand of the symmetric-key cryptanalysts.
topic Differential Cryptanalysis
Integral Cryptanalysis
Constraint Programming
AES
SKINNY
url https://tosc.iacr.org/index.php/ToSC/article/view/595
work_keys_str_mv AT siweisun analysisofaesskinnyandotherswithconstraintprogramming
AT davidgerault analysisofaesskinnyandotherswithconstraintprogramming
AT pascallafourcade analysisofaesskinnyandotherswithconstraintprogramming
AT qianqianyang analysisofaesskinnyandotherswithconstraintprogramming
AT yosuketodo analysisofaesskinnyandotherswithconstraintprogramming
AT kexinqiao analysisofaesskinnyandotherswithconstraintprogramming
AT leihu analysisofaesskinnyandotherswithconstraintprogramming
_version_ 1724242852738760704