Square and boomerang attacks analysis of diffusion property of 3D-AES block cipher

The antigen-antibody interaction, somatic hyper mutation and protein structural features in immune systems have been selected as inspired approach in designing the new block cipher algorithm called 3D-AES. However, these computation elements from immune systems have not proved yet whether it can be successfully applied and satisfies with Shannon's diffusion property in designing a new block cipher algorithm. This paper introduces two different types of attacks on the proposed block cipher. This paper measures and analyses the diffusion property of the block cipher by square attack and boomerang attack. It also discussed the best possible diffusion and described how it is relevant for chosen plaintext attack and conventional non related-key attacks based on the experiment done in the contact of the wide trail strategy family.

[1]  Yu Sasaki,et al.  Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers , 2012, Selected Areas in Cryptography.

[2]  Chae Hoon Lim,et al.  CRYPTON: A New 128-bit Block Cipher - Specification and Analysis , 1998 .

[3]  Stefan Lucks The Saturation Attack - A Bait for Twofish , 2000, FSE.

[4]  Simon Heron,et al.  Encryption: Advanced Encryption Standard (AES) , 2009 .

[5]  Jorge Nakahara,et al.  3D: A Three-Dimensional Block Cipher , 2008, CANS.

[6]  Vincent Rijmen,et al.  The KHAZAD Legacy-Level Block Cipher , 2001 .

[7]  Bruce Schneier,et al.  Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent , 2000, FSE.

[8]  David A. Wagner,et al.  The Boomerang Attack , 1999, FSE.

[9]  Vincent Rijmen,et al.  The Block Cipher Square , 1997, FSE.

[10]  Azmi Jaafar,et al.  Symmetric Encryption Algorithm Inspired by Randomness and Non-Linearity of Immune Systems , 2012, Int. J. Nat. Comput. Res..

[11]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[12]  Suriyani Ariffin Secure block cipher inspired by the human immune system , 2012 .

[13]  Vincent Rijmen,et al.  The Cipher SHARK , 1996, FSE.

[14]  Yosuke Todo FFT-Based Key Recovery for the Integral Attack , 2014, IACR Cryptol. ePrint Arch..

[15]  Jean-Jacques Quisquater,et al.  Integral Cryptanalysis on reduced-round Safer++ , 2003, IACR Cryptol. ePrint Arch..

[16]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[17]  Jongsung Kim,et al.  Amplified Boomerang Attack against Reduced-Round SHACAL , 2002, ASIACRYPT.

[18]  Azmi Jaafar,et al.  Byte Permutations in Block Cipher Based on Immune Systems , 2011 .

[19]  K. P. Subbalakshmi,et al.  High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive , 2006, ACNS.

[20]  Bruce Schneier,et al.  A SELF-STUDY COURSE IN BLOCK-CIPHER CRYPTANALYSIS , 2000, Cryptologia.

[21]  Wang Xiao-yun Saturation cryptanalysis of CLEFIA , 2008 .

[22]  Paulo S. L. M. Barreto,et al.  CURUPIRA, a block cipher for constrained platforms , 2007 .

[23]  Dengguo Feng,et al.  Integral Cryptanalysis of Reduced FOX Block Cipher , 2005, ICISC.

[24]  Orr Dunkelman,et al.  The effects of the omission of last round's MixColumns on AES , 2010, Inf. Process. Lett..

[25]  Azmi Jaafar,et al.  Immune Systems Approaches for Cryptographic Algorithm , 2011, 2011 Sixth International Conference on Bio-Inspired Computing: Theories and Applications.

[26]  David Wagner,et al.  Integral Cryptanalysis (Extended abstract) , 2002, FSE 2002.

[27]  William Stallings,et al.  Cryptography and network security , 1998 .

[28]  Massimiliano Sala,et al.  Implementation and improvement of the Partial Sum Attack on 6-round AES , 2014, IACR Cryptol. ePrint Arch..

[29]  Jyoti Malik,et al.  A Review of Various Techniques of Cryptanalysis , 2012 .

[30]  M. Z’aba Analysis of linear relationships in block ciphers , 2010 .

[31]  Jue Wu,et al.  Cross Entropy: A New Solver for Markov Random Field Modeling and Applications to Medical Image Segmentation , 2005, MICCAI.

[32]  Lars R. Knudsen,et al.  Advanced Encryption Standard (AES) - An Update , 1999, IMACC.

[33]  Daniyal M. Alghazzawi,et al.  Advanced Encryption Standard - Cryptanalysis research , 2014, 2014 International Conference on Computing for Sustainable Global Development (INDIACom).