{"title":"Revisiting boomerang attacks on lightweight ARX and AND-RX ciphers with applications to KATAN, SIMON and CHAM","authors":"Li Yu , Je Sen Teh","doi":"10.1016/j.jisa.2024.103950","DOIUrl":null,"url":null,"abstract":"<div><div>In this paper, we investigate the security of lightweight block ciphers, focusing on those that utilize the <span>ADD</span>-Rotate-XOR (ARX) and <span>AND</span>-Rotate-XOR (<span>AND</span>-RX) design paradigms. More specifically, we examine their resilience against boomerang-style attacks. First, we propose an automated search strategy that leverages the boomerang connectivity table (<span>BCT</span>) for <span>AND</span> operations (<span><math><mrow><mo>∧</mo><mi>B</mi><mi>C</mi><mi>T</mi></mrow></math></span>) to conduct a complete search for boomerang and rectangle distinguishers for <span>AND</span>-RX ciphers. The proposed search strategy automatically considers all possible <span><math><mrow><mo>∧</mo><mi>B</mi><mi>C</mi><mi>T</mi></mrow></math></span> switches in the middle of the boomerang to optimize distinguishing probability. The correctness of the search strategy was verified experimentally. We were able to find the best boomerang and rectangle distinguishers to date in the single-key model for lightweight block ciphers <span>KATAN</span>32/48/64 and <span>SIMON</span>32/48. Next, we investigated <span>BCT</span> properties of ARX ciphers and discovered that a truncated boomerang switch could be formulated for the lightweight ARX cipher, <span>CHAM</span>. We were able to find the best single-key and related-key rectangle distinguishers to date for <span>CHAM</span>. Our findings provide more accurate security margins of these lightweight ciphers against boomerang-style attacks.</div></div>","PeriodicalId":48638,"journal":{"name":"Journal of Information Security and Applications","volume":"89 ","pages":"Article 103950"},"PeriodicalIF":3.8000,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Security and Applications","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2214212624002527","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we investigate the security of lightweight block ciphers, focusing on those that utilize the ADD-Rotate-XOR (ARX) and AND-Rotate-XOR (AND-RX) design paradigms. More specifically, we examine their resilience against boomerang-style attacks. First, we propose an automated search strategy that leverages the boomerang connectivity table (BCT) for AND operations () to conduct a complete search for boomerang and rectangle distinguishers for AND-RX ciphers. The proposed search strategy automatically considers all possible switches in the middle of the boomerang to optimize distinguishing probability. The correctness of the search strategy was verified experimentally. We were able to find the best boomerang and rectangle distinguishers to date in the single-key model for lightweight block ciphers KATAN32/48/64 and SIMON32/48. Next, we investigated BCT properties of ARX ciphers and discovered that a truncated boomerang switch could be formulated for the lightweight ARX cipher, CHAM. We were able to find the best single-key and related-key rectangle distinguishers to date for CHAM. Our findings provide more accurate security margins of these lightweight ciphers against boomerang-style attacks.
期刊介绍:
Journal of Information Security and Applications (JISA) focuses on the original research and practice-driven applications with relevance to information security and applications. JISA provides a common linkage between a vibrant scientific and research community and industry professionals by offering a clear view on modern problems and challenges in information security, as well as identifying promising scientific and "best-practice" solutions. JISA issues offer a balance between original research work and innovative industrial approaches by internationally renowned information security experts and researchers.