Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible dif...

Full description

Bibliographic Details
Main Author: Sugio Nobuyuki
Format: Article
Language:English
Published: Hindawi-IET 2023-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/2023/6691726
_version_ 1797437768383594496
author Sugio Nobuyuki
author_facet Sugio Nobuyuki
author_sort Sugio Nobuyuki
collection DOAJ
description Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. Therefore, we have evaluated the security of RBFK by application of differential cryptanalysis, linear cryptanalysis, and meet-in-the-middle (MITM) attack and have found that RBFK is not secure against these attacks. This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. In the distinguish attack scenario, data for differential cryptanalysis are two, and the time complexity is one for an exclusive-OR operation. In the key recovery attack scenario, the data for linear cryptanalysis are one pair of known plaintext–ciphertext. The time complexity is one operation for a linear sum. Data for an MITM attack are two. The time complexity is 248 encryptions; the memory complexity is 245 bytes. Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.
first_indexed 2024-03-09T11:26:25Z
format Article
id doaj.art-3e44cee2299a42a8b87100136ee896f1
institution Directory Open Access Journal
issn 1751-8717
language English
last_indexed 2024-03-09T11:26:25Z
publishDate 2023-01-01
publisher Hindawi-IET
record_format Article
series IET Information Security
spelling doaj.art-3e44cee2299a42a8b87100136ee896f12023-12-01T00:00:03ZengHindawi-IETIET Information Security1751-87172023-01-01202310.1049/2023/6691726Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFKSugio Nobuyuki0Hokkaido University of ScienceRandomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. Although the authors claimed that RBFK is secure against differential cryptanalysis, linear cryptanalysis, impossible differential attack, and zero correlation linear cryptanalysis, the details were not explained in the literature. Therefore, we have evaluated the security of RBFK by application of differential cryptanalysis, linear cryptanalysis, and meet-in-the-middle (MITM) attack and have found that RBFK is not secure against these attacks. This paper introduces not only a distinguish attack but also key recovery attacks on full-round RBFK. In the distinguish attack scenario, data for differential cryptanalysis are two, and the time complexity is one for an exclusive-OR operation. In the key recovery attack scenario, the data for linear cryptanalysis are one pair of known plaintext–ciphertext. The time complexity is one operation for a linear sum. Data for an MITM attack are two. The time complexity is 248 encryptions; the memory complexity is 245 bytes. Because the vulnerabilities are identified in the round function and the key scheduling part, we propose some improvements for RBFK against these attacks.http://dx.doi.org/10.1049/2023/6691726
spellingShingle Sugio Nobuyuki
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
IET Information Security
title Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
title_full Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
title_fullStr Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
title_full_unstemmed Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
title_short Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK
title_sort differential linear and meet in the middle attacks on the lightweight block cipher rbfk
url http://dx.doi.org/10.1049/2023/6691726
work_keys_str_mv AT sugionobuyuki differentiallinearandmeetinthemiddleattacksonthelightweightblockcipherrbfk