Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES

Chao Niu,Muzhou Li,Meiqin Wang,Qingju Wang,Siu-Ming Yiu
DOI: https://doi.org/10.1007/978-3-030-99277-4_11
2022-01-01
Abstract:We consider the related-tweak impossible differential cryptanalysis of TweAES. It is one of the underlying primitives of Authenticated Encryption with Associated Data (AEAD) scheme ESTATE which was accepted as one of second-round candidates in the NIST Lightweight Cryptography Standardization project. Firstly, we reveal several properties of TweAES, which show what kinds of distinguishers are more effective in recovering keys. With the help of automatic solver Simple Theorem Prover (STP), we achieve many 5.5-round related-tweak impossible differentials with fixed input differences and output differences that just have one active byte. Then, we implement 8-round key recovery attacks against TweAES based on one of these 5.5-round distinguishers. Moreover, another 5.5-round distinguisher that has four active bytes at the end is utilized to mount a 7-round key recovery attack against TweAES, which needs much lower attack complexities than the 6-round related-tweak impossible differential attack of TweAES in the design document. Our 8round key recovery attack is the best one against TweAES in terms of the number of rounds and complexities so far.
What problem does this paper attempt to address?