Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK

View through CrossRef
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. Therefore, we have evaluated the security of RBFK by application of differential cryptanalysis, linear cryptanalysis, and meet‐in‐the‐middle (MITM) attack and have found that RBFK is not secure against these attacks. This paper introduces not only a distinguish attack but also key recovery attacks on full‐round RBFK. In the distinguish attack scenario, data for differential cryptanalysis are two, and the time complexity is one for an exclusive‐OR operation. In the key recovery attack scenario, the data for linear cryptanalysis are one pair of known plaintext–ciphertext. The time complexity is one operation for a linear sum. Data for an MITM attack are two. The time complexity is 2 48 encryptions; the memory complexity is 2 45 bytes. Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.
Institution of Engineering and Technology (IET)
Title: Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Description:
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment.
Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature.
Therefore, we have evaluated the security of RBFK by application of differential cryptanalysis, linear cryptanalysis, and meet‐in‐the‐middle (MITM) attack and have found that RBFK is not secure against these attacks.
This paper introduces not only a distinguish attack but also key recovery attacks on full‐round RBFK.
In the distinguish attack scenario, data for differential cryptanalysis are two, and the time complexity is one for an exclusive‐OR operation.
In the key recovery attack scenario, the data for linear cryptanalysis are one pair of known plaintext–ciphertext.
The time complexity is one operation for a linear sum.
Data for an MITM attack are two.
The time complexity is 2 48 encryptions; the memory complexity is 2 45 bytes.
Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.

Related Results

Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we ...
Generalized differential-linear cryptanalysis of block cipher
Generalized differential-linear cryptanalysis of block cipher
Differential-linear cryptanalysis of block ciphers was proposed in 1994. It turns out to be more efficient in comparison with (separately) differential and linear cryptanalytic met...
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Block cipher merupakan salah satu teknik dalam kriptografi modern yang digunakan untuk melakukan enkripsi/dekripsi pada data digital dengan membagi pesan menjadi blok-blok data dan...
An optimized novel lightweight block cipher for image encryption
An optimized novel lightweight block cipher for image encryption
Abstract In the era of pervasive multimedia communication, image data has become a dominant form of information exchange across embedded, mobile, and IoT platforms. This ...
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cip...
Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
Enhancing SPN ciphers: Dynamic substitution-key addition layers via binary block circulant matrices
The SPN (Substitution-Permutation Network) block cipher is one of the fundamental and important structures in the field of symmetric encryption, widely used in modern encryption al...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...

Back to Top