Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON

  • Conference paper
  • First Online:
Information Systems Security and Privacy (ICISSP 2021, ICISSP 2022)

Abstract

DryGASCON and Ascon are two similar authenticated encryption algorithms submitted to NIST’s recently finalized lightweight cryptography competition. DryGASCON was eliminated after the second round, while Ascon won the competition and became the new lightweight cryptography standard. We analyze these two ciphers using differential-linear distinguishers to better understand their security. By using the parallel computing power of GPUs, we show that better distinguishers can be obtained experimentally in practice which cannot be obtained theoretically by known methods. We offer the best experimentally obtained 5-round differential-linear distinguishers for the permutations of Ascon and DryGASCON. We also provide related-key differential-linear attacks on 5-round Ascon.

The work of Cihangir Tezcan has been supported by TUBITAK 1001 Project under the grant number 121E228 and by Middle East Technical University Scientific Research Projects Coordination Unit under grant number AGEP-704-2023-11294.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 53.49
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 69.54
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://github.com/cihangirtezcan/CUDA_ASCON.

  2. 2.

    https://ascon.iaik.tugraz.at/publications.html.

References

  1. Bar-On, A., Dunkelman, O., Keller, N., Weizman, A.: DLCT: a new tool for differential-linear cryptanalysis. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 313–342. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17653-2_11

    Chapter  Google Scholar 

  2. Bernstein, D.: Caesar: competition for authenticated encryption: Security, applicability, and robustness. https://competitions.cr.yp.to/caesar.html (2013). Accessed 10 May 2021

  3. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28496-0_19

    Chapter  Google Scholar 

  4. Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Permutation-based encryption, authentication and authenticated encryption. Directions in Authenticated Ciphers, pp. 159–170 (2012)

    Google Scholar 

  5. Biham, E., Dunkelman, O., Keller, N.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 254–266. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_16

    Chapter  Google Scholar 

  6. Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)

    Article  MathSciNet  MATH  Google Scholar 

  7. Blondeau, C., Gérard, B., Tillich, J.P.: Accurate estimates of the data complexity and success probability for various cryptanalyses. Designs Codes Crypt. 59(1), 3–34 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  8. Civek, A.B., Tezcan, C.: Differential-linear attacks on permutation ciphers revisited: experiments on Ascon and DryGASCON. In: Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9–11, 2022, pp. 202–209. SCITEPRESS (2022). https://doi.org/10.5220/0010982600003120

  9. Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard Information Security and Cryptography. Springer, Berlin, Heidelberg (2002). https://doi.org/10.1007/978-3-662-04722-4

    Book  MATH  Google Scholar 

  10. Dobraunig, C., Eichlseder, M., Mendel, F.: Heuristic tool for linear cryptanalysis with applications to Caesar candidates. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 490–509. Springer (2015)

    Google Scholar 

  11. Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Cryptanalysis of Ascon. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 371–387. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16715-2_20

    Chapter  Google Scholar 

  12. Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Ascon v1. 2. Submission to the CAESAR Competition (2016)

    Google Scholar 

  13. Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of power analysis in the real world: a complete break of the KeeLoq code hop** scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203–220. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85174-5_12

    Chapter  MATH  Google Scholar 

  14. Herndon, R., El-Issa, R., Heer, D., **ong, J., Hwu, W.-M., El-Hadedy, M.: RECO-DryGASCON: re-configurable lightweight DryGASCON engine. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FTC 2020. AISC, vol. 1290, pp. 703–721. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-63092-8_47

    Chapter  Google Scholar 

  15. Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60590-8_16

    Chapter  Google Scholar 

  16. Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 17–25. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_3

    Chapter  Google Scholar 

  17. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33

    Chapter  Google Scholar 

  18. McKay, K., Bassham, L., Sönmez Turan, M., Mouha, N.: Report on lightweight cryptography. Tech. rep, National Institute of Standards and Technology (2016)

    Google Scholar 

  19. Meijer, C., Verdult, R.: Ciphertext-only cryptanalysis on hardened mifare classic cards. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12–6, 2015, pp. 18–30. ACM (2015). https://doi.org/10.1145/2810103.2813641, http://doi.acm.org/10.1145/2810103.2813641

  20. NIST: Lightweight cryptography standardization process: nist selects ascon. https://csrc.nist.gov/News/2023/lightweight-cryptography-nist-selects-ascon (2023). Accessed 17 Apr 2023

  21. Riou, S.: Drygascon: a submission to the NIST lightweight cryptography standardization process (2019)

    Google Scholar 

  22. Tezcan, C.: Improbable differential attacks on present using undisturbed bits. J. Comput. Appl. Math. 259, 503–511 (2014)

    Article  MATH  Google Scholar 

  23. Tezcan, C.: Truncated, impossible, and improbable differential analysis of ascon. In: International Conference on Information Systems Security and Privacy, vol. 2, pp. 325–332. SCITEPRESS (2016)

    Google Scholar 

  24. Tezcan, C.: Analysis of ascon, drygascon, and shamash permutations. Int. J. Inf. Secur. Sci. 9(3), 172–187 (2020)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cihangir Tezcan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Civek, A.B., Tezcan, C. (2023). Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON. In: Mori, P., Lenzini, G., Furnell, S. (eds) Information Systems Security and Privacy. ICISSP ICISSP 2021 2022. Communications in Computer and Information Science, vol 1851. Springer, Cham. https://doi.org/10.1007/978-3-031-37807-2_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-37807-2_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-37806-5

  • Online ISBN: 978-3-031-37807-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation