Abstract
DryGASCON and Ascon are two similar authenticated encryption algorithms submitted to NIST’s recently finalized lightweight cryptography competition. DryGASCON was eliminated after the second round, while Ascon won the competition and became the new lightweight cryptography standard. We analyze these two ciphers using differential-linear distinguishers to better understand their security. By using the parallel computing power of GPUs, we show that better distinguishers can be obtained experimentally in practice which cannot be obtained theoretically by known methods. We offer the best experimentally obtained 5-round differential-linear distinguishers for the permutations of Ascon and DryGASCON. We also provide related-key differential-linear attacks on 5-round Ascon.
The work of Cihangir Tezcan has been supported by TUBITAK 1001 Project under the grant number 121E228 and by Middle East Technical University Scientific Research Projects Coordination Unit under grant number AGEP-704-2023-11294.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bar-On, A., Dunkelman, O., Keller, N., Weizman, A.: DLCT: a new tool for differential-linear cryptanalysis. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11476, pp. 313–342. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-17653-2_11
Bernstein, D.: Caesar: competition for authenticated encryption: Security, applicability, and robustness. https://competitions.cr.yp.to/caesar.html (2013). Accessed 10 May 2021
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Duplexing the sponge: single-pass authenticated encryption and other applications. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 320–337. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-28496-0_19
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Permutation-based encryption, authentication and authenticated encryption. Directions in Authenticated Ciphers, pp. 159–170 (2012)
Biham, E., Dunkelman, O., Keller, N.: Enhancing differential-linear cryptanalysis. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 254–266. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36178-2_16
Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Blondeau, C., Gérard, B., Tillich, J.P.: Accurate estimates of the data complexity and success probability for various cryptanalyses. Designs Codes Crypt. 59(1), 3–34 (2011)
Civek, A.B., Tezcan, C.: Differential-linear attacks on permutation ciphers revisited: experiments on Ascon and DryGASCON. In: Proceedings of the 8th International Conference on Information Systems Security and Privacy, ICISSP 2022, Online Streaming, February 9–11, 2022, pp. 202–209. SCITEPRESS (2022). https://doi.org/10.5220/0010982600003120
Daemen, J., Rijmen, V.: The Design of Rijndael: AES - The Advanced Encryption Standard Information Security and Cryptography. Springer, Berlin, Heidelberg (2002). https://doi.org/10.1007/978-3-662-04722-4
Dobraunig, C., Eichlseder, M., Mendel, F.: Heuristic tool for linear cryptanalysis with applications to Caesar candidates. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 490–509. Springer (2015)
Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Cryptanalysis of Ascon. In: Nyberg, K. (ed.) CT-RSA 2015. LNCS, vol. 9048, pp. 371–387. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-16715-2_20
Dobraunig, C., Eichlseder, M., Mendel, F., Schläffer, M.: Ascon v1. 2. Submission to the CAESAR Competition (2016)
Eisenbarth, T., Kasper, T., Moradi, A., Paar, C., Salmasizadeh, M., Shalmani, M.T.M.: On the Power of power analysis in the real world: a complete break of the KeeLoq code hop** scheme. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 203–220. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-85174-5_12
Herndon, R., El-Issa, R., Heer, D., **ong, J., Hwu, W.-M., El-Hadedy, M.: RECO-DryGASCON: re-configurable lightweight DryGASCON engine. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) FTC 2020. AISC, vol. 1290, pp. 703–721. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-63092-8_47
Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 196–211. Springer, Heidelberg (1995). https://doi.org/10.1007/3-540-60590-8_16
Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 17–25. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48658-5_3
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48285-7_33
McKay, K., Bassham, L., Sönmez Turan, M., Mouha, N.: Report on lightweight cryptography. Tech. rep, National Institute of Standards and Technology (2016)
Meijer, C., Verdult, R.: Ciphertext-only cryptanalysis on hardened mifare classic cards. In: Ray, I., Li, N., Kruegel, C. (eds.) Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, October 12–6, 2015, pp. 18–30. ACM (2015). https://doi.org/10.1145/2810103.2813641, http://doi.acm.org/10.1145/2810103.2813641
NIST: Lightweight cryptography standardization process: nist selects ascon. https://csrc.nist.gov/News/2023/lightweight-cryptography-nist-selects-ascon (2023). Accessed 17 Apr 2023
Riou, S.: Drygascon: a submission to the NIST lightweight cryptography standardization process (2019)
Tezcan, C.: Improbable differential attacks on present using undisturbed bits. J. Comput. Appl. Math. 259, 503–511 (2014)
Tezcan, C.: Truncated, impossible, and improbable differential analysis of ascon. In: International Conference on Information Systems Security and Privacy, vol. 2, pp. 325–332. SCITEPRESS (2016)
Tezcan, C.: Analysis of ascon, drygascon, and shamash permutations. Int. J. Inf. Secur. Sci. 9(3), 172–187 (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Civek, A.B., Tezcan, C. (2023). Experimentally Obtained Differential-Linear Distinguishers for Permutations of ASCON and DryGASCON. In: Mori, P., Lenzini, G., Furnell, S. (eds) Information Systems Security and Privacy. ICISSP ICISSP 2021 2022. Communications in Computer and Information Science, vol 1851. Springer, Cham. https://doi.org/10.1007/978-3-031-37807-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-37807-2_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-37806-5
Online ISBN: 978-3-031-37807-2
eBook Packages: Computer ScienceComputer Science (R0)