IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508

This article has now been updated. Please use the final version.

Towards Finding Better Differentials on Multiple-Branch-Based Structures with the SAT Method
Kazuma TAKATatsuya ISHIKAWAKosei SAKAMOTOTakanori ISOBE
Author information
JOURNAL FREE ACCESS Advance online publication

Article ID: 2023EAP1159

Details
Abstract

As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis can become a significant threat to them. In particular, since a multiple-branch-based design, such as Orthros can have the strong clustering effect on differential attacks due to its large internal state, it is crucial to investigate the impact of the clustering effect in such a design. In this paper, we present a new SAT-based automatic search method for evaluating the clustering effect in the multiple-branch-based design. By exploiting an inherent trait of multiple-branch-based designs, our method enables highly efficient evaluations of clustering effects on this-type designs. We apply our method to the low-latency PRF Orthros, and show a best differential distinguisher reaching up to 7 rounds of Orthros with 2116.806 time/data complexity and 9-round distinguisher for each underlying permutation which is 2 more rounds than known longest distinguishers. Besides, we update the designer's security bound for differential attacks based on the lower bounds for the number of active S-boxes, and obtain the optimal differential characteristic of Orthros, Branch 1, and Branch 2 for the first time. Consequently, we improve the designer's security bound from 9/12/12 to 7/10/10 rounds for Orthros/Branch 1/Branch 2 based on a single differential characteristic. Moreover, we define Orthros-like three-branch-based PRF in order to investigate the impact of the clustering effect when increasing the number of branches. Based on the results of our evaluation, we show that adding one more branch makes the clustering effect easy to happen, but is promising to enhance the security against differential cryptanalysis.

Content from these authors
© 2024 The Institute of Electronics, Information and Communication Engineers
feedback
Top