Back to Search Start Over

Algebraic and Higher-Order Differential Cryptanalysis of Pyjamask-96

Authors :
Dobraunig
Rotella
Schoone
Laboratoire de Mathématiques de Versailles (LMV)
Université de Versailles Saint-Quentin-en-Yvelines (UVSQ)-Université Paris-Saclay-Centre National de la Recherche Scientifique (CNRS)
Austrian Science Fund, FWF: J 4277-N38 Austrian Science Fund, FWF European Research Council, ERC: 788980, ERC-2017-ADG
Christoph Dobraunig is supported by the Austrian Science Fund (FWF): J 4277-N38. Yann Rotella and Jan Schoone are supported by the European Research Council under the ERC advanced grant agreement under grant ERC-2017-ADG Nr. 788980 ESCADA.
Source :
IACR Transactions on Symmetric Cryptology, IACR Transactions on Symmetric Cryptology; Volume 2020, Issue 1; 289-312, IACR Transactions on Symmetric Cryptology, Ruhr Universität Bochum, 2020, 2020 (1), pp.289-312. ⟨10.13154/tosc.v2020.i1.289-312⟩, IACR Transactions on Symmetric Cryptology, 2020, 289-312, IACR Transactions on Symmetric Cryptology, Vol 2020, Iss 1 (2020), IACR Transactions on Symmetric Cryptology, 2020, 1, pp. 289-312
Publication Year :
2020

Abstract

Cryptographic competitions, like the ongoing NIST call for lightweight cryptography, always provide a thriving research environment, where new interesting ideas are proposed and new cryptographic insights are made. One proposal for this NIST call that is accepted for the second round is Pyjamask. Pyjamask is an authenticated encryption scheme that builds upon two block ciphers, Pyjamask-96 and Pyjamask-128, that aim to minimize the number of AND operations at the cost of a very strong linear layer. A side-effect of this goal is a slow growth in the algebraic degree. In this paper, we focus on the block cipher Pyjamask-96 and are able to provide a theoretical key-recovery attack reaching 14 (out of 14) rounds as well as a practical attack on 8 rounds. We do this by combining higher-order differentials with an in-depth analysis of the system of equations gotten for 2.5 rounds of Pyjamask-96. The AEAD-scheme Pyjamask itself is not threatened by the work in this paper.<br />IACR Transactions on Symmetric Cryptology, Volume 2020, Issue 1

Details

ISSN :
2519173X
Volume :
2020
Database :
OpenAIRE
Journal :
IACR Transactions on Symmetric Cryptology
Accession number :
edsair.doi.dedup.....8a72951e8141e43d828a1608956ed8d7
Full Text :
https://doi.org/10.13154/tosc.v2020.i1.289-312⟩