Open problems of proving security of ARX-based ciphers to differential cryptanalysis

There are many ARX-based symmetric primitives that form the core of modern lightweight cryptography. The paper considers the known methods of proving differential properties of ARX-based ciphers based on application of partial difference distribution tables, probabilistic neutral bits and SAT solvers. The known long trail strategy that allows designing provable secure ARX-based block ciphers is also considered. The open problems of proving ARX-ciphers security to differential attacks are formulated. It is underlined that there is no universal theory that allows evaluating security of any ARX-based primitive to differential cryptanalysis.

[1]  Olexandr Kuznetsov,et al.  Strumok stream cipher: Specification and basic properties , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[2]  A. A. Kuznetsov,et al.  Methods of synthesis of signals with prescribed properties , 2007 .

[3]  V. A. Krasnobayev,et al.  A Method for Increasing the Reliability of Verification of Data Represented in a Residue Number System , 2014 .

[4]  I. D. Gorbenko,et al.  ENSEMBLE AND CORRELATION PROPERTIES OF CRYPTOGRAPHIC SIGNALS FOR TELECOMMUNICATION SYSTEM AND NETWORK APPLICATIONS , 2016 .

[5]  V. M. Grachev,et al.  Data security mechanisms implemented in the database with universal model , 2014 .

[6]  V. M. Grachev,et al.  Technology for developing databases of information systems , 2014 .

[7]  Sergii Kavun,et al.  Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications , 2014 .

[8]  Nicky Mouha,et al.  The Design Space of Lightweight Cryptography , 2015, IACR Cryptol. ePrint Arch..

[9]  Alina Andrushkevych,et al.  The block symmetric ciphers in the post-quantum period , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[10]  Bart Preneel,et al.  A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis , 2013, IACR Cryptol. ePrint Arch..

[11]  Jason Smith,et al.  The SIMON and SPECK lightweight block ciphers , 2015, 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC).

[12]  Tamila Lavrovska,et al.  Physical model of pseudorandom codes in multidimensional Euclidean space , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[13]  Alex Biryukov,et al.  Automatic Search for Differential Trails in ARX Ciphers , 2014, CT-RSA.

[14]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[15]  Shahram Khazaei,et al.  New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba , 2008, FSE.

[16]  A. V. Potii,et al.  A System Approach to Certification of Pseudorandom Numbers Generators Used in Information Protection Systems , 1998 .

[17]  A. A. Kuznetsov,et al.  THE STATISTICAL ANALYSIS OF A NETWORK TRAFFIC FOR THE INTRUSION DETECTION AND PREVENTION SYSTEMS , 2015 .

[18]  Ivan Gorbenko,et al.  Examining a possibility to use and the benefits of post-quantum algorithms dependent on the conditions of their application , 2017 .

[19]  Olexandr Kuznetsov,et al.  Combinatorial properties of block symmetric ciphers key schedule , 2016, 2016 Third International Scientific-Practical Conference Problems of Infocommunications Science and Technology (PIC S&T).

[20]  Bart Preneel,et al.  The Differential Analysis of S-Functions , 2010, Selected Areas in Cryptography.

[21]  I. Gorbenko,et al.  Methods of Information Protection in Communications Systems and Methods of Their Cryptoanalysis , 1998 .