New differential cryptanalysis results for the lightweight block cipher BORON

Je Sen Teh, Li Jing Tham, Norziana Jamil, Wun She Yap

Research output: Contribution to journalArticlepeer-review

13 Citations (Scopus)

Abstract

BORON is a 64-bit lightweight block cipher based on the substitution–permutation network that supports an 80-bit (BORON-80) and 128-bit (BORON-128) secret key. In this paper, we revisit the use of differential cryptanalysis on BORON in the single-key model. Using an SAT/SMT approach, we look for differentials that consist of multiple differential characteristics with the same input and output differences. Each characteristic that conforms to a given differential improves its overall probability. We also implemented the same search using Matsui's algorithm for verification and performance comparison purposes. We identified high-probability differentials which were then used in key recovery attacks against BORON-80/128. We used 8-round differentials with a probability of 2−58.16 and 2−62.42 in key recovery attacks against 9 and 10 rounds of BORON-80 and BORON-128 with time/data/memory complexities of 259.18/259.16/224 and 2111.34/263.42/271 respectively. Our key recovery framework provides a more accurate estimate of the attack complexity as compared to previous work. The attacks proposed in this paper are the best differential attacks against BORON-80/128 in the single-key model to date.

Original languageEnglish
Article number103129
JournalJournal of Information Security and Applications
Volume66
DOIs
Publication statusPublished - May 2022
Externally publishedYes

Keywords

  • BORON
  • Branch-and-bound
  • Cryptanalysis
  • Differential cryptanalysis
  • SAT solver
  • SMT solver

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'New differential cryptanalysis results for the lightweight block cipher BORON'. Together they form a unique fingerprint.

Cite this