Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. On the Key Schedule of Lightweight Block Ciphers
 
conference paper

On the Key Schedule of Lightweight Block Ciphers

Huang, Jialin  
•
Vaudenay, Serge  
•
Lai, Xuejia
Meier, W
•
Mukhopadhyay, D
2014
Progress In Cryptology - Indocrypt 2014
15th International Conference on Cryptology in India (INDOCRYPT)

Key schedules in lightweight block ciphers are often highly simplified, which causes weakness that can be exploited in many attacks. Today it remains an open problem on how to use limited operations to guarantee enough diffusion of key bits in lightweight key schedules. Also, there are few tools special for detecting weakness in the key schedule. In 2013 Huang et al. pointed out that insufficient actual key information (AKI) in computation chains is responsible for many attacks especially the meet-in-the-middle (MITM) attacks. Motivated by this fact, in this paper we develop an efficient (with polynomial time complexity) and effective tool to search the computation chains which involve insufficient AKI for iterated key schedules of lightweight ciphers. The effectiveness of this tool is shown by an application on TWINE-80. Then, we formulate the cause of key bits leakage phenomenon, where the knowledge of subkey bits is leaked or overlapped by other subkey bits in the same computation chain. Based on the interaction of diffusion performed by the key schedule and by the round function, a necessary condition is thus given on how to avoid key bits leakage. Therefore, our work sheds light on the design of lightweight key schedules by guiding how to quickly rule out unreasonable key schedules and maximize the security under limited diffusion.

  • Files
  • Details
  • Metrics
Type
conference paper
DOI
10.1007/978-3-319-13039-2_8
Web of Science ID

WOS:000345012200010

Author(s)
Huang, Jialin  
Vaudenay, Serge  
Lai, Xuejia
Editors
Meier, W
•
Mukhopadhyay, D
Date Issued

2014

Publisher

Springer-Verlag Berlin

Publisher place

Berlin

Published in
Progress In Cryptology - Indocrypt 2014
ISBN of the book

978-3-319-13039-2

978-3-319-13038-5

Total of pages

19

Series title/Series vol.

Lecture Notes in Computer Science

Volume

8885

Start page

124

End page

142

Subjects

Automatic tool

•

Meet-In-The-Middle

•

PRESENT

•

TWINE

•

Actual key information

Editorial or Peer reviewed

REVIEWED

Written at

EPFL

EPFL units
LASEC  
Event nameEvent placeEvent date
15th International Conference on Cryptology in India (INDOCRYPT)

New Delhi, INDIA

DEC 14-17, 2014

Available on Infoscience
December 30, 2014
Use this identifier to reference this record
https://infoscience.epfl.ch/handle/20.500.14299/109541
Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés