TY - JOUR
T1 - Related-Key Amplified Boomerang Attack on Full-Round MM-128
AU - Eom, Hyejin
AU - Seok, Byoungjin
AU - Lee, Changhoon
N1 - Publisher Copyright:
© 2023,Human-centric Computing and Information Sciences.All Rights Reserved.
PY - 2023
Y1 - 2023
N2 - Recently, the use of open platforms with various network functions and hardware interfaces has been increasing in various fields such as the Internet of Things, smart buildings, and industrial automation. In this new device environment, data-dependent operation (DDO) usage-based cryptographic design based on the control element have been introduced, which is suitable for ensuring high-efficiency performance and network security of the CIA (confidentiality, integrity, accessibility) security model. Among them, the MM-128 proposed by Hieu and his colleagues is a high-speed block cipher that uses the latest FPGA devices to increase the hardware implementation efficiency of block ciphers. It is composed of 9 rounds and uses a 256-bit key. However, most data-dependent permutation (DDP), DDO, and switchable data-dependent operation (SDDOS)-based block ciphers are vulnerable to related-key attacks owing to their simple key scheduling processes, including this paper’s target algorithm MM-128. This paper presents a related-key amplified boomerang attack that is more efficient than an exhaustive attack as the first known result. The attack on MM-128 requires 272.5 related-key chosen plaintexts and 2132.5 encryptions. In future research, this work is expected to be extended and improved with the latest boomerang connectivity table (BCT) and differential-linear connectivity table (DLCT) techniques to obtain better cryptanalytic results.
AB - Recently, the use of open platforms with various network functions and hardware interfaces has been increasing in various fields such as the Internet of Things, smart buildings, and industrial automation. In this new device environment, data-dependent operation (DDO) usage-based cryptographic design based on the control element have been introduced, which is suitable for ensuring high-efficiency performance and network security of the CIA (confidentiality, integrity, accessibility) security model. Among them, the MM-128 proposed by Hieu and his colleagues is a high-speed block cipher that uses the latest FPGA devices to increase the hardware implementation efficiency of block ciphers. It is composed of 9 rounds and uses a 256-bit key. However, most data-dependent permutation (DDP), DDO, and switchable data-dependent operation (SDDOS)-based block ciphers are vulnerable to related-key attacks owing to their simple key scheduling processes, including this paper’s target algorithm MM-128. This paper presents a related-key amplified boomerang attack that is more efficient than an exhaustive attack as the first known result. The attack on MM-128 requires 272.5 related-key chosen plaintexts and 2132.5 encryptions. In future research, this work is expected to be extended and improved with the latest boomerang connectivity table (BCT) and differential-linear connectivity table (DLCT) techniques to obtain better cryptanalytic results.
KW - Block Cipher
KW - Controlled Substitution-Permutation Network (CSPN)
KW - Data-Dependent Operations (DDOs)
KW - MM-128
KW - Related-key Amplified Boomerang Attack
UR - https://www.scopus.com/pages/publications/85151039082
U2 - 10.22967/HCIS.2023.13.003
DO - 10.22967/HCIS.2023.13.003
M3 - Article
AN - SCOPUS:85151039082
SN - 2192-1962
VL - 12
JO - Human-centric Computing and Information Sciences
JF - Human-centric Computing and Information Sciences
M1 - 03
ER -