Accelerating the Search of Differential and Linear Characteristics with the SAT Method

The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search is not always satisfactory for the search of long trails or ciphers with large state sizes. Compared with the extensive attention on the enha...

Full description

Saved in:
Bibliographic Details
Published inIACR Transactions on Symmetric Cryptology Vol. 2021; no. 1; pp. 269 - 315
Main Authors Sun, Ling, Wang, Wei, Wang, Meiqin
Format Journal Article
LanguageEnglish
Published Ruhr-Universität Bochum 01.01.2021
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search is not always satisfactory for the search of long trails or ciphers with large state sizes. Compared with the extensive attention on the enhancement for the search with the mixed integer linear programming (MILP) method, few works care for the acceleration of the automatic search with the Boolean satisfiability problem (SAT) or satisfiability modulo theories (SMT) method. This paper intends to fill this vacancy. Firstly, with the additional encoding variables of the sequential counter circuit for the original objective function in the standard SAT method, we put forward a new encoding method to convert the Matsui’s bounding conditions into Boolean formulas. This approach does not rely on new auxiliary variables and significantly reduces the consumption of clauses for integrating multiple bounding conditions into one SAT problem. Then, we evaluate the accelerating effect of the novel encoding method under different sets of bounding conditions. With the observations and experience in the tests, a strategy on how to create the sets of bounding conditions that probably achieve extraordinary advances is proposed. The new idea is applied to search for optimal differential and linear characteristics for multiple ciphers. For PRESENT, GIFT-64, RECTANGLE, LBlock, TWINE, and some versions in SIMON and SPECK families of block ciphers, we obtain the complete bounds (full rounds) on the number of active S-boxes, the differential probability, as well as the linear bias. The acceleration method is also employed to speed up the search of related-key differential trails for GIFT-64. Based on the newly identified 18-round distinguisher with probability 2−58, we launch a 26-round key-recovery attack with 260.96 chosen plaintexts. To our knowledge, this is the longest attack on GIFT-64. Lastly, we note that the attack result is far from threatening the security of GIFT-64 since the designers recommended users to double the number of rounds under the related-key attack setting.
AbstractList The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search is not always satisfactory for the search of long trails or ciphers with large state sizes. Compared with the extensive attention on the enhancement for the search with the mixed integer linear programming (MILP) method, few works care for the acceleration of the automatic search with the Boolean satisfiability problem (SAT) or satisfiability modulo theories (SMT) method. This paper intends to fill this vacancy. Firstly, with the additional encoding variables of the sequential counter circuit for the original objective function in the standard SAT method, we put forward a new encoding method to convert the Matsui’s bounding conditions into Boolean formulas. This approach does not rely on new auxiliary variables and significantly reduces the consumption of clauses for integrating multiple bounding conditions into one SAT problem. Then, we evaluate the accelerating effect of the novel encoding method under different sets of bounding conditions. With the observations and experience in the tests, a strategy on how to create the sets of bounding conditions that probably achieve extraordinary advances is proposed. The new idea is applied to search for optimal differential and linear characteristics for multiple ciphers. For PRESENT, GIFT-64, RECTANGLE, LBlock, TWINE, and some versions in SIMON and SPECK families of block ciphers, we obtain the complete bounds (full rounds) on the number of active S-boxes, the differential probability, as well as the linear bias. The acceleration method is also employed to speed up the search of related-key differential trails for GIFT-64. Based on the newly identified 18-round distinguisher with probability 2−58, we launch a 26-round key-recovery attack with 260.96 chosen plaintexts. To our knowledge, this is the longest attack on GIFT-64. Lastly, we note that the attack result is far from threatening the security of GIFT-64 since the designers recommended users to double the number of rounds under the related-key attack setting.
Author Wang, Wei
Sun, Ling
Wang, Meiqin
Author_xml – sequence: 1
  givenname: Ling
  surname: Sun
  fullname: Sun, Ling
– sequence: 2
  givenname: Wei
  surname: Wang
  fullname: Wang, Wei
– sequence: 3
  givenname: Meiqin
  surname: Wang
  fullname: Wang, Meiqin
BookMark eNqFkF1LwzAYhYMoOOf-guQPtCZpmibgzZhfg4kXTvEuvE3TNaM2kgbFf2_cFMQbr877wTkcnhN0OPjBInRGSc5FKcV59KPJ3xhhNHc0Z0JlBS0P0ISVVGW0Kp4Pf83HaDaOW0IIk6oQXE3Q09wY29sA0Q0bHDuLHywE02Hf4kvXtjbYITroMQwNXrkhPfGigwAm2uDG6MyI313s9tb5Gt_Z2PnmFB210I929q1T9Hh9tV7cZqv7m-VivspMIVTM6rYgwirCmCCk4qpKaoBJawjlUjJLOCVCpbUuatlwXsiSNU2lqFRQtaaYouU-t_Gw1a_BvUD40B6c3h182GgIqWRvdWMrMDWhrC4ZZ5wDmKouqRRto0TqkbIu9lkm-HEMttXGxcTFDzGA6zUleodcfyHXO-TaUZ2Q64Q82cUf-0-df4yf18KJbg
CitedBy_id crossref_primary_10_1007_s10623_025_01611_1
crossref_primary_10_23919_cje_2021_00_415
crossref_primary_10_1016_j_jisa_2025_104016
crossref_primary_10_1049_2024_5574862
crossref_primary_10_1007_s12095_024_00708_z
crossref_primary_10_1016_j_jisa_2021_103087
crossref_primary_10_23919_cje_2022_00_313
crossref_primary_10_1587_transfun_2023EAP1149
crossref_primary_10_1007_s13389_022_00298_7
crossref_primary_10_1007_s10623_023_01259_9
crossref_primary_10_1016_j_jisa_2022_103129
crossref_primary_10_1049_2024_8315115
crossref_primary_10_1360_SSI_2023_0189
crossref_primary_10_62056_a3n59qgxq
crossref_primary_10_1186_s42400_023_00184_7
crossref_primary_10_1007_s10623_024_01527_2
crossref_primary_10_1007_s11424_024_3168_2
crossref_primary_10_1049_2023_5323380
crossref_primary_10_1007_s10623_022_01034_2
crossref_primary_10_1587_transfun_2023EAP1098
crossref_primary_10_1002_int_23078
crossref_primary_10_1016_j_jisa_2024_103773
crossref_primary_10_1109_ACCESS_2021_3116468
crossref_primary_10_1007_s00145_024_09499_1
crossref_primary_10_1016_j_jisa_2024_103737
crossref_primary_10_1093_comjnl_bxab213
crossref_primary_10_3390_electronics13163141
crossref_primary_10_1109_ACCESS_2023_3270396
crossref_primary_10_1016_j_jisa_2022_103316
crossref_primary_10_1049_ise2_12119
crossref_primary_10_1093_comjnl_bxac169
crossref_primary_10_1093_comjnl_bxac102
crossref_primary_10_1007_s10623_025_01571_6
crossref_primary_10_1093_comjnl_bxad071
crossref_primary_10_1109_ACCESS_2024_3434594
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.46586/tosc.v2021.i1.269-315
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

Database_xml – sequence: 1
  dbid: DOA
  name: Directory of Open Access Journals (DOAJ)
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2519-173X
EndPage 315
ExternalDocumentID oai_doaj_org_article_de7acb012b524244aac7b5186fd96f30
10_46586_tosc_v2021_i1_269_315
GroupedDBID AAYXX
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c369t-bf306e90226007497260ca28ec014882e041069ec0b3b8d443852dd79189a7fc3
IEDL.DBID DOA
ISSN 2519-173X
IngestDate Wed Aug 27 01:12:54 EDT 2025
Tue Jul 01 03:41:35 EDT 2025
Thu Apr 24 23:06:07 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c369t-bf306e90226007497260ca28ec014882e041069ec0b3b8d443852dd79189a7fc3
OpenAccessLink https://doaj.org/article/de7acb012b524244aac7b5186fd96f30
PageCount 47
ParticipantIDs doaj_primary_oai_doaj_org_article_de7acb012b524244aac7b5186fd96f30
crossref_citationtrail_10_46586_tosc_v2021_i1_269_315
crossref_primary_10_46586_tosc_v2021_i1_269_315
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2021-01-01
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – month: 01
  year: 2021
  text: 2021-01-01
  day: 01
PublicationDecade 2020
PublicationTitle IACR Transactions on Symmetric Cryptology
PublicationYear 2021
Publisher Ruhr-Universität Bochum
Publisher_xml – name: Ruhr-Universität Bochum
SSID ssj0002893649
Score 2.4504037
Snippet The introduction of the automatic search boosts the cryptanalysis of symmetric-key primitives to some degree. However, the performance of the automatic search...
SourceID doaj
crossref
SourceType Open Website
Enrichment Source
Index Database
StartPage 269
SubjectTerms Automatic search
Differential cryptanalysis
Linear cryptanalysis
Matsui’s bounding condition
SAT method
Title Accelerating the Search of Differential and Linear Characteristics with the SAT Method
URI https://doaj.org/article/de7acb012b524244aac7b5186fd96f30
Volume 2021
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07T8MwELZQJxYEAkR5yQNr2qZ-j6VQVUhlalE3y744qKhKEQR-P-c4oHbqwhQljiPnu8R3nx_fEXKnVYiycy5zTrOMB-EyDSAy4Zh0jIOEQdyNPHuW0wV_WorlVqqvuCYsyQMn4PpFUA48dqNexJ0M3DlQXuRaloWRJWvYOvq8LTL1lqbPmOQmbQnm6GVlv958Qu8buX7eWyExlAa7H7HjjbZE-xvvMjkmR21YSEepOSfkIFSn5GUEgF4h2qh6pRip0bQ4mG5K-tAmNsEfdE1dVVAklVhIx7sCzDSOs6aqozmdNemiz8hi8jgfT7M2D0IGTJo68_iaMhj0tlFMnhuFR3BDHSAOB-phGHAkdgZPPfO64JxpMSwKZXJtnCqBnZNOtanCBaEQGJYrBco5Xhpk0h4touSggBwGheoS8YuHhVYkPOaqWFskCw2ONuJoGxztKreIo0Ucu6T_V-89yWTsrXEf4f67O8pcNxfQ-LY1vt1n_Mv_eMgVOYxtS-Mq16RTf3yFG4w0an_bfFQ_9u7QSg
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Accelerating+the+Search+of+Differential+and+Linear+Characteristics+with+the+SAT+Method&rft.jtitle=IACR+Transactions+on+Symmetric+Cryptology&rft.au=Sun%2C+Ling&rft.au=Wang%2C+Wei&rft.au=Wang%2C+Meiqin&rft.date=2021-01-01&rft.issn=2519-173X&rft.eissn=2519-173X&rft.spage=269&rft.epage=315&rft_id=info:doi/10.46586%2Ftosc.v2021.i1.269-315&rft.externalDBID=n%2Fa&rft.externalDocID=10_46586_tosc_v2021_i1_269_315
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2519-173X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2519-173X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2519-173X&client=summon