[go: up one dir, main page]

What a lovely hat

Is it made out of tin foil?

Paper 2024/1743

The Window Heuristic: Automating Differential Trail Search in ARX Ciphers with Partial Linearization Trade-offs

Emanuele Bellini, Technology Innovation Institute
David GERAULT, Technology Innovation Institute
Juan Grados, Technology Innovation Institute
Thomas Peyrin, Nanyang Technological University
Abstract

The search for optimal differential trails for ARX ciphers is known to be difficult and scale poorly as the word size (and the branching through the carries of modular additions) increases.To overcome this problem, one may approximate the modular addition with the XOR operation, a process called linearization. The immediate drawback of this approach is that many valid and good trails are discarded. In this work, we explore different partial linearization trade-offs to model the modular addition through the \emph{window heuristic}, which restricts carry propagation to windows of $w_s$ consecutive positions. This strategy enables the exploration of full linearization ($w_s = 0$), normal modelling ($w_s = n$), and all the different trade-offs between completeness and speed in between. We give the corresponding SAT and MILP model and their parallel versions, and apply them to \chachacore, \speckfamily, \leafamily, and \hightfamily. Our method greatly outperforms all previous modeling of modular addition. In particular, we find the first differential path for 4 rounds of \chachacore with a probability greater than $2^{-256}$, and a corresponding 6 rounds boomerang distinguisher. This indicates that purely differential-based attacks have the potential to become competitive with differential-linear attacks, currently, the best-known attacks against \chachacore and other ARX ciphers. Finally, we exhibit an improved key recovery attack on reduced \leafamily.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
arxautomated toolssatmilpheuristicdifferential
Contact author(s)
emanuele bellini @ tii ae
david gerault @ tii ae
juan grados @ tii ae
thomas peyrin @ ntu edu sg
History
2024-10-28: approved
2024-10-25: received
See all versions
Short URL
https://ia.cr/2024/1743
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2024/1743,
      author = {Emanuele Bellini and David GERAULT and Juan Grados and Thomas Peyrin},
      title = {The Window Heuristic: Automating Differential Trail Search in {ARX} Ciphers with Partial Linearization Trade-offs},
      howpublished = {Cryptology {ePrint} Archive, Paper 2024/1743},
      year = {2024},
      url = {https://eprint.iacr.org/2024/1743}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.