In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible...In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are among the most powerful attacks, and the key problems for these two attacks are discovering more and longer impossible differentials(IDs) and zero-correlation linear hulls(ZCLHs). However, finding new IDs and ZCLHs for ARX ciphers has been a manual work for a long time, which has been an obstacle in improving these two attacks. This paper proposes an automatic search method to improve the efficiency of finding new IDs and ZCLHs for ARX ciphers. In order to prove the efficiency of this new tool, we take HIGHT, LEA, SPECK three typical ARX algorithms as examples to explore their longer and new impossible differentials and zero-correlation linear hulls. To the best of our knowledge, this is the first application of automatic search method for ARX ciphers on finding new IDs and ZCLHs. For HIGHT, we find more 17 round IDs and multiple 17 round ZCLHs. This is the first discovery of 17 round ZCLHs for HIGHT. For LEA, we find extra four 10 round IDs and several 9 round ZCLHs. In the specification of LEA, the designers just identified three 10 round IDs and one 7round ZCLH. For SPECK, we find thousands of 6 round IDs and forty-four 6 round ZCLHs. Neither IDs nor ZCLHs of SPECK has been proposed before. The successful application of our new tool shows great potential in improving the impossible differential cryptanalysis and zero-correlation linear cryptanalysis on ARX ciphers..展开更多
At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlat...At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlation distin-guishers.As a result,for the first time,the authors construct 14-round and 16-round zero-correlation linear distinguishers for SKINNY-n-2n and SKINNY-n-3n,respectively,which are both two rounds longer than Anekele et al.'s.Based on these distinguishers,the paper presents related-tweakey zero-correlation linear attacks on 21-round SKINNY-n-2n and 25-round SKINNY-n-3n,respectively.展开更多
In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software ...In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software platforms. In this paper, we mainly present zero-correlation linear cryptanalysis on various versions of SIMON. Firstly, by using miss- in-the-middle approach, we construct zero-correlation linear distinguishers of SIMON, and zero-correlation linear attacks are presented based oi1 careful analysis of key recovery phase. Secondly, multidimensional zero-correlation linear attacks are used to reduce the data complexity. Our zero-correlation linear attacks perform better than impossible differential attacks proposed by Abed et al. in ePrint Report 2013/568. Finally, we also use the divide-and-conquer technique to improve the results of linear cryptanalysis proposed by Javad et al. in ePrint Report 2013/663.展开更多
Cellular vehicle-to-everything(C-V2X) communications is regarded as a promising and feasible solution for 5G-enabled vehicular communications and networking. In this paper, we investigate the pilot design and channel ...Cellular vehicle-to-everything(C-V2X) communications is regarded as a promising and feasible solution for 5G-enabled vehicular communications and networking. In this paper, we investigate the pilot design and channel estimation problem in MIMO-OFDM-based C-V2X systems with severe co-channel interference due to spectrum reusing among different V2X communication links. By using zero-correlation zone(ZCZ) sequences, we provide an interference-free pilot design scheme and a corresponding time-domain(TD) correlation-based channel estimation(TD-CCE) method. We employ the ZCZ sequences from the same family set to be designed as the TD pilot symbols and guarantee the pilot sequeneces for neighboring V2X communication links are code-division multiplexing(CDM). The co-channel pilot interference of the deisgned pilot symbols can be effectively eliminated by exploiting the provided TD-CCE method. Simulation results indicate that the accuracy of channel estimation can be effectively improved by the proposed scheme, whose performance is close to that of the non-interference situation.展开更多
基金supported by the National Natural Science Foundation of China under Grant No. 61572516, 61402523, 61202491, 61272041 and 61272488
文摘In lightweight cryptographic primitives, round functions with only simple operations XOR, modular addition and rotation are widely used nowadays. This kind of ciphers is called ARX ciphers. For ARX ciphers, impossible differential cryptanalysis and zero-correlation linear cryptanalysis are among the most powerful attacks, and the key problems for these two attacks are discovering more and longer impossible differentials(IDs) and zero-correlation linear hulls(ZCLHs). However, finding new IDs and ZCLHs for ARX ciphers has been a manual work for a long time, which has been an obstacle in improving these two attacks. This paper proposes an automatic search method to improve the efficiency of finding new IDs and ZCLHs for ARX ciphers. In order to prove the efficiency of this new tool, we take HIGHT, LEA, SPECK three typical ARX algorithms as examples to explore their longer and new impossible differentials and zero-correlation linear hulls. To the best of our knowledge, this is the first application of automatic search method for ARX ciphers on finding new IDs and ZCLHs. For HIGHT, we find more 17 round IDs and multiple 17 round ZCLHs. This is the first discovery of 17 round ZCLHs for HIGHT. For LEA, we find extra four 10 round IDs and several 9 round ZCLHs. In the specification of LEA, the designers just identified three 10 round IDs and one 7round ZCLH. For SPECK, we find thousands of 6 round IDs and forty-four 6 round ZCLHs. Neither IDs nor ZCLHs of SPECK has been proposed before. The successful application of our new tool shows great potential in improving the impossible differential cryptanalysis and zero-correlation linear cryptanalysis on ARX ciphers..
基金sponsored by the Natural Science Foundation of Henan(No.222300420100)the Foundation of Key Laboratory of National Defense Science and Technology,China(61421030107).
文摘At ToSC 2019,Ankele et al.proposed a novel idea for constructing zero-correlation linear distinguishers in a related-tweakey model.This paper further clarifies this principle and gives a search model for zero-correlation distin-guishers.As a result,for the first time,the authors construct 14-round and 16-round zero-correlation linear distinguishers for SKINNY-n-2n and SKINNY-n-3n,respectively,which are both two rounds longer than Anekele et al.'s.Based on these distinguishers,the paper presents related-tweakey zero-correlation linear attacks on 21-round SKINNY-n-2n and 25-round SKINNY-n-3n,respectively.
基金This work was supported by the National Basic Research 973 Program of China under Grant No. 2013CB338002 and the National Natural Science Foundation of China under Grant Nos. 61272476, 61202420, and 61232009.
文摘In June 2013, the U.S. National Security Agency proposed two families of lightweight block ciphers, called SIMON and SPECK respectively. These ciphers are designed to perform excellently on both hardware and software platforms. In this paper, we mainly present zero-correlation linear cryptanalysis on various versions of SIMON. Firstly, by using miss- in-the-middle approach, we construct zero-correlation linear distinguishers of SIMON, and zero-correlation linear attacks are presented based oi1 careful analysis of key recovery phase. Secondly, multidimensional zero-correlation linear attacks are used to reduce the data complexity. Our zero-correlation linear attacks perform better than impossible differential attacks proposed by Abed et al. in ePrint Report 2013/568. Finally, we also use the divide-and-conquer technique to improve the results of linear cryptanalysis proposed by Javad et al. in ePrint Report 2013/663.
文摘Cellular vehicle-to-everything(C-V2X) communications is regarded as a promising and feasible solution for 5G-enabled vehicular communications and networking. In this paper, we investigate the pilot design and channel estimation problem in MIMO-OFDM-based C-V2X systems with severe co-channel interference due to spectrum reusing among different V2X communication links. By using zero-correlation zone(ZCZ) sequences, we provide an interference-free pilot design scheme and a corresponding time-domain(TD) correlation-based channel estimation(TD-CCE) method. We employ the ZCZ sequences from the same family set to be designed as the TD pilot symbols and guarantee the pilot sequeneces for neighboring V2X communication links are code-division multiplexing(CDM). The co-channel pilot interference of the deisgned pilot symbols can be effectively eliminated by exploiting the provided TD-CCE method. Simulation results indicate that the accuracy of channel estimation can be effectively improved by the proposed scheme, whose performance is close to that of the non-interference situation.