About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Book chapter · Conference paper

Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

From

Royal Holloway University of London1

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Department of Applied Mathematics and Computer Science, Technical University of Denmark3

Resistance against differential cryptanalysis is an important design criteria for any modern block cipher and most designs rely on finding some upper bound on probability of single differential characteristics. However, already at EUROCRYPT’91, Lai et al. comprehended that differential cryptanalysis rather uses differentials instead of single characteristics.

In this paper, we consider exactly the gap between these two approaches and investigate this gap in the context of recent lightweight cryptographic primitives. This shows that for many recent designs like Midori, Skinny or Sparx one has to be careful as bounds from counting the number of active S-boxes only give an inaccurate evaluation of the best differential distinguishers.

For several designs we found new differential distinguishers and show how this gap evolves. We found an 8-round differential distinguisher for Skinny-64 with a probability of, while the best single characteristic only suggests a probability of. Our approach is integrated into publicly available tools and can easily be used when developing new cryptographic primitives.

Moreover, as differential cryptanalysis is critically dependent on the distribution over the keys for the probability of differentials, we provide experiments for some of these new differentials found, in order to confirm that our estimates for the probability are correct. While for Skinny-64 the distribution over the keys follows a Poisson distribution, as one would expect, we noticed that Speck-64 follows a bimodal distribution, and the distribution of Midori-64 suggests a large class of weak keys.

Language: English
Publisher: Springer
Year: 2019
Pages: 163-190
Proceedings: 25th International Conference on Selected Areas in Cryptography
Series: Lecture Notes in Computer Science (including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Journal subtitle: 25th International Conference, Calgary, Ab, Canada, August 15–17, 2018, Revised Selected Papers
ISBN: 3030109690 , 3030109704 , 9783030109691 and 9783030109707
ISSN: 16113349 and 03029743
Types: Book chapter and Conference paper
DOI: 10.1007/978-3-030-10970-7_8
ORCIDs: 0000-0001-8751-9099 , Kölbl, Stefan , 0000-0001-5761-8694 and 0000-0002-4906-0544

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis