×

Key recovery attacks on reduced-round Joltik-BC in the single-key setting. (English) Zbl 1458.94262

Summary: Joltik-BC is a tweakable block cipher used in the CAESAR candidate Joltik. In this paper, we propose meet-in-the-middle attacks on Joltik-BC in the single-key setting. Our attacks are constructed utilizing the freedom of the tweak and differential enumeration technique. As a result, we get an attack on 8-round Joltik-BC-64-64 with a data complexity of \(2^{53.5}\), a memory complexity of \(2^{53}\) and a time complexity of \(2^{53.6}\). We also present an attack on 10-round Joltik-BC-128-64 with a data complexity of \(2^{56.1}\), a memory complexity of \(2^{123.5}\) and a time complexity of \(2^{126.5}\). As far as we know, these are the best single-key attacks on Joltik-BC.

MSC:

94A60 Cryptography

Software:

tweakey
PDFBibTeX XMLCite
Full Text: DOI

References:

[1] Demirci, H.; Selçuk, A. A., A meet-in-the-middle attack on 8-round AES, (FSE 2008 (2008), Springer), 116-126 · Zbl 1154.68391
[2] Derbez, P.; Fouque, P. A.; Jean, J., Improved key recovery attacks on reduced-round AES in the single-key setting, (EUROCRYPT 2013 (2013), Springer), 371-387 · Zbl 1306.94044
[3] Dobraunig, C.; Eichlseder, M.; Mendel, F., Square attack on 7-round Kiasu-BC, (ACNS 2016 (2016), Springer), 500-517 · Zbl 1348.94042
[4] Dunkelman, O.; Keller, N.; Shamir, A., Improved single-key attacks on 8-round AES-192 and AES-256, (ASIACRYPT 2010 (2010), Springer), 158-176 · Zbl 1253.94045
[5] Jean, J.; Nikolic, I.; Peyrin, T., Tweaks and Keys for Block Ciphers: The TWEAKEY Framework (2014), Cryptology Report 2014/831 · Zbl 1317.94113
[6] Jean, J.; Nikolic, I.; Peyrin, T., Tweaks and keys for block ciphers: the TWEAKEY framework, (ASIACRYPT 2014, Part II (2014), Springer), 274-288 · Zbl 1317.94113
[7] Jean, J.; Nikolic, I.; Peyrin, T., Joltik v1.3, submission to the CAESAR competition (2015)
[8] Tolba, M.; Abdelkhalek, A.; Youssef, A. M., A meet in the middle attack on reduced-round Kiasu-BC, IEICE Trans., 99-A, 10, 1888-1890 (2016)
[9] Zong, R.; Dong, X.; Wang, X., MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its Applications to QARMA, Joltik-BC (2018), Cryptology Report 2018/142
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.