Journal on Communications ›› 2019, Vol. 40 ›› Issue (9): 184-192.doi: 10.11959/j.issn.1000-436x.2019152

• Correspondences • Previous Articles     Next Articles

Related-key impossible boomerang cryptanalysis on TWINE

Min XIE,Feng TIAN,Jiaqi LI   

  1. State Key Laboratory of Integrated Services Networks,Xidian University,Xi’an 710071,China
  • Revised:2019-05-22 Online:2019-09-25 Published:2019-09-28
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0800601);The National Natural Science Foundation of China(U1636209);The National Cryptography Development Fund of the 13th Five-Year Plan(MMJJ20180219)

Abstract:

In order to evaluate the security of the lightweight block cipher TWINE,the method of related-key impossible boomerang cryptanalysis was applied and a related-key impossible boomerang distinguisher consisting of 16-round and 17-round paths was constructed.Based on this new distinguisher,an attack on 23-round TWINE was mounted successfully by concatenating 4-round to the beginning and 2-round for the 17-round path and 3-round for the 16-round path to the end respectively.The attack on 23-round TWINE required data complexity of only 2 <sup>62.05</sup>plaintexts and computational complexity of about 2 <sup>70.49</sup>23-round encryptions.Compared with published cryptanalysis results,the proposed attack has obvious advantages.

Key words: TWINE algorithm, lightweight block cipher, impossible boomerang, related-key

CLC Number: 

No Suggested Reading articles found!