Publication:
On the resistance of new lightweight block ciphers against differential cryptanalysis

dc.citedby4
dc.contributor.authorChan Y.Y.en_US
dc.contributor.authorKhor C.-Y.en_US
dc.contributor.authorKhoo B.T.en_US
dc.contributor.authorTeh J.S.en_US
dc.contributor.authorTeng W.J.en_US
dc.contributor.authorJamil N.en_US
dc.contributor.authorid58114489900en_US
dc.contributor.authorid58114490000en_US
dc.contributor.authorid58176633100en_US
dc.contributor.authorid56579944200en_US
dc.contributor.authorid57193064876en_US
dc.contributor.authorid36682671900en_US
dc.date.accessioned2024-10-14T03:19:10Z
dc.date.available2024-10-14T03:19:10Z
dc.date.issued2023
dc.description.abstractMany recently proposed lightweight block ciphers lack security evaluation against generic cryptanalytic attacks such as differential cryptanalysis. In this paper, we contribute towards security evaluation efforts by investigating four lightweight Feistel-based block ciphers including SLIM, LBC-IoT, SCENERY, and LCB. SLIM claims resistance to differential cryptanalysis since, using a heuristic technique, its designers could only find a 7-round differential trail. Despite having no analysis of security against attacks such as differential cryptanalysis, the designers of LBC-IoT and LCB claimed that their ciphers are secure. Meanwhile, the designers of SCENERY claim that the best 11-round differential trail for the cipher has a probability of 2?66. To substantiate these claims, we propose attacks on all four ciphers based on differential cryptanalysis. We presented practical key recovery attacks on SLIM which can retrieve the final round key for up to 14 rounds with a time complexity of 232. LBC-IoT was found to be weaker against differential cryptanalysis despite sharing many similarities with SLIM, whereby a key recovery attack of up to 19 rounds is possible with time complexity 231. For SCENERY, we found a differential trail of up to 12 rounds with probability 2?60, which was used as the distinguisher for a 13-round key recovery attack. We also discovered that LCB's design lacks nonlinearity, allowing us to easily derive deterministic differential trails regardless of the number of rounds. This flaw allowed us to perform a trivial distinguishing attack using a single known ciphertext. By using a different S-box to address this flaw, LCB is now more resilient to differential cryptanalysis than SLIM and LBC-IoT when using the same number of rounds. Our paper presents new independent cryptanalysis results for these ciphers. � 2023en_US
dc.description.natureFinalen_US
dc.identifier.ArtNoe15257
dc.identifier.doi10.1016/j.heliyon.2023.e15257
dc.identifier.issue4
dc.identifier.scopus2-s2.0-85152108960
dc.identifier.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85152108960&doi=10.1016%2fj.heliyon.2023.e15257&partnerID=40&md5=992216b08f07bd1b0600475a8393b567
dc.identifier.urihttps://irepository.uniten.edu.my/handle/123456789/34341
dc.identifier.volume9
dc.publisherElsevier Ltden_US
dc.relation.ispartofAll Open Access
dc.relation.ispartofGold Open Access
dc.relation.ispartofGreen Open Access
dc.sourceScopus
dc.sourcetitleHeliyon
dc.subjectDifferential cryptanalysis
dc.subjectLBC-IoT
dc.subjectLCB
dc.subjectLightweight block cipher
dc.subjectSCENERY
dc.subjectSLIM
dc.subjectSMT
dc.titleOn the resistance of new lightweight block ciphers against differential cryptanalysisen_US
dc.typeArticleen_US
dspace.entity.typePublication
Files
Collections