Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
Gradient Cryptanalysis of Block Cipher CHAM 64/128. / Ryabko, Boris; Soskov, Alexander; Fionov, Andrey.
2019 16th International Symposium "Problems of Redundancy in Information and Control Systems", REDUNDANCY 2019. Institute of Electrical and Electronics Engineers Inc., 2019. p. 211-215 9003315 (2019 16th International Symposium "Problems of Redundancy in Information and Control Systems", REDUNDANCY 2019).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › Research › peer-review
}
TY - GEN
T1 - Gradient Cryptanalysis of Block Cipher CHAM 64/128
AU - Ryabko, Boris
AU - Soskov, Alexander
AU - Fionov, Andrey
PY - 2019/10
Y1 - 2019/10
N2 - We1 provide the results of cryptanalysis of the lightweight block cipher CHAM 64/128 carried out by means of a so-called gradient statistical attack. The experiments show that after 23 rounds the secret key can be determined with probability 0.01 under the length of the input sample 231 bytes and complexity 237 round function evaluations. Theoretical extrapolation of the suggested attack shows that the key can be completely determined with probability 0.01 after 57 rounds. The recommended number of rounds for CHAM 64/128 is 80. According to the cipher designers, the most successful attack has been a related-key boomerang attack which is effective on 56 rounds.
AB - We1 provide the results of cryptanalysis of the lightweight block cipher CHAM 64/128 carried out by means of a so-called gradient statistical attack. The experiments show that after 23 rounds the secret key can be determined with probability 0.01 under the length of the input sample 231 bytes and complexity 237 round function evaluations. Theoretical extrapolation of the suggested attack shows that the key can be completely determined with probability 0.01 after 57 rounds. The recommended number of rounds for CHAM 64/128 is 80. According to the cipher designers, the most successful attack has been a related-key boomerang attack which is effective on 56 rounds.
KW - block ciphers
KW - cryptanalysis
KW - Lightweight ciphers
KW - statistical attack
UR - http://www.scopus.com/inward/record.url?scp=85081584783&partnerID=8YFLogxK
U2 - 10.1109/REDUNDANCY48165.2019.9003315
DO - 10.1109/REDUNDANCY48165.2019.9003315
M3 - Conference contribution
AN - SCOPUS:85081584783
T3 - 2019 16th International Symposium "Problems of Redundancy in Information and Control Systems", REDUNDANCY 2019
SP - 211
EP - 215
BT - 2019 16th International Symposium "Problems of Redundancy in Information and Control Systems", REDUNDANCY 2019
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 16th International Symposium "Problems of Redundancy in Information and Control Systems", REDUNDANCY 2019
Y2 - 21 October 2019 through 25 October 2019
ER -
ID: 25330836