
Self‐similarity cryptanalysis of the block cipher ITUbee
Author(s) -
Soleimany Hadi
Publication year - 2015
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2014.0131
Subject(s) - block cipher , differential cryptanalysis , impossible differential cryptanalysis , linear cryptanalysis , key schedule , boomerang attack , computer science , higher order differential cryptanalysis , cipher , theoretical computer science , cryptanalysis , arithmetic , algorithm , mathematics , cryptography , computer security , encryption
Recent developments in the resource constrained devices have led to a renewed interest in designing light‐weight primitives with inventive and unconventional structures. Using round‐dependent constants instead of a strong key schedule is one of the most widely used trick against the self‐similarity cryptanalysis in recent cipher proposals. So far there has been little discussion about the effect of the round constants on the security of the ciphers. In this study, the authors identify several weaknesses in round‐reduced versions of the block cipher ITUbee, which was presented recently at LightSec 2013. These weaknesses allow to build relations between the round constants. The author's technique leads to several cryptanalysis in the weak‐key, related‐key and single‐key models and shows that the resistance of ITUbee against self‐similarity cryptanalysis is not independent of the values of round constants. They show that the round‐reduced cipher under a fraction of the keys is distinguishable from an ideal random permutation. Then they utilise a similar technique to show there exists a deterministic related‐key differential distinguisher for up to eight rounds of the cipher. This observation leads to the decrease of the security of 8‐round ITUbee in the single‐key model by one bit.