Cube cryptanalysis of LBlock with noisy leakage

  • Authors:
  • Zhenqi Li;Bin Zhang;Yuan Yao;Dongdai Lin

  • Affiliations:
  • Institute of Software, Chinese Academy of Sciences, Beijing, China;SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China;Institute of Software, Chinese Academy of Sciences, Beijing, China;SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China

  • Venue:
  • ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present some side channel cube attacks on LBlock, a lightweight block cipher proposed at ACNS 2011. It is shown that in the single bit leakage model, 14 bits of the secret key can be recovered with 210.7 time and 27.6 chosen plaintexts, captured the 44th state bit of the third round. In the Hamming weight leakage model, the full 80-bit key can be retrieved with only 210 32-round LBlock encryptions and 211.1 chosen plaintexts, given the leakage of the second least significant bit (LSB) of the Hamming weight after the third round. We also provide a rigorous analysis on the error tolerance probabilities of our attacks and show that the full 80-bit key can be restored in 230 32-round LBlock encryptions with 28.5 chosen plaintexts and at most 5.5% of the noisy leaked bits in the LSB of the Hamming weight after the second round. Many of the ideas in our attacks are applicable to other block ciphers as well.