Abstract
This paper introduces the results of several different security analysis of two new block ciphers: Raindrop and FBC, which are the two candidates of block cipher designs submitted to the Chinese Cryptographic Algorithms Design Competition in 2019. Raindrop applies two-branch Feistel structure, while FBC block cipher is based on the four-way dual Feistel structure design. We give detailed security evaluation on Raindrop and FBC, using differential, linear, impossible difference and boomerang cryptanalysis approaches. For Raindrop, we achieved the results as follows: differential attack on 12-round Raindrop based on the 11-round distinguisher with the computational complexity of \(2^{62.41}\); linear attack on 13-round Raindrop based on 12-round distinguisher with the computational complexity of \(2^{106.3}\); impossible differential attack on 18-round Raindrop based on 12-round distinguisher with the computational complexity of \(2^{102.83}\); and boomerang attack on 15-round Raindrop based on 14-round distinguisher with the computational complexity of \(2^{224.6}\). For FBC, results are as follows: differential attack on 12-round FBC based on 11-round distinguisher with the computational complexity of \(2^{93.41}\); linear attack on 11-round FBC based on 10-round distinguisher with the computational complexity of \(2^{112.54}\); impossible differential attack on 11-round FBC based on 7-round distinguisher with the computational complexity of \(2^{94.54}\); and boomerang attack on 13-round FBC based on 12-round distinguisher with the computational complexity of \(2^{247.67}\). At present, the best records achieved are 18-round impossible differential attack for Raindrop-128-128 and 13-round boomerang attack for FBC128-256. The statistical distinguishers we built are similar to the proposals but we provide the concrete key recovery attacks in this study.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Conference on the Theory and Application of Cryptography (1990)
Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1–18. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_1
Blondeau, C., Gérard, B., Nyberg, K.: Multiple differential cryptanalysis using, and X2 statistics. In: Visconti, I., De Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 343–360. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32928-9_19
Cheon, J.H., Kim, M.J., Kim, K., Jung-Yeun, L., Kang, S.W.: Improved impossible differential cryptanalysis of rijndael and crypton. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 39–49. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45861-1_4
Feng, X., Zeng, X., Zhang, F., Zeng, G., Tang, D., Gan, G.: Block cipher algorithm FBC (2019)
Feng, X., Zeng, X., Zhang, F., Zeng, G., Tang, D., Gan, G.: The report of design and evaluation of block cipher algorithm FBC (2019)
Hermelin, M., Cho, J.Y., Nyberg, K.: Multidimensional linear cryptanalysis of reduced round serpent. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 203–215. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70500-0_15
Howard, R.: Data encryption standard. Comput. Secur. 6(3), 195–196 (1987)
Knudsen, L.: Deal-a 128-bit block cipher. Complexity 258(2), 216 (1998)
Matsui, M.: On correlation between the order of S-boxes and the strength of DES. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 366–375. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053451
Ohta, H., Matsui, M.: A description of the MISTY1 encryption algorithm. RFC2994, November (2000)
Selçuk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptology 21(1), 131–147 (2008)
Wagner, D.: The boomerang attack. In: Knudsen, L. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156–170. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48519-8_12
Wang, M., Li, Y., Li, M., Fu, Y., Fan, Y., Huang, L.: Raindrop series block cipher algorithms design proposal (2019)
Acknowledgement
This work has been partly supported by the National Natural Science Foundation of China under Grant No. 61702212 and the Fundamental Research Funds for the Central Universities under Grand No. CCNU19TS017.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Ren, B., Chen, J., Zhou, S., Jin, X., Xia, Z., Liang, K. (2019). Cryptanalysis of Raindrop and FBC. In: Liu, J., Huang, X. (eds) Network and System Security. NSS 2019. Lecture Notes in Computer Science(), vol 11928. Springer, Cham. https://doi.org/10.1007/978-3-030-36938-5_33
Download citation
DOI: https://doi.org/10.1007/978-3-030-36938-5_33
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36937-8
Online ISBN: 978-3-030-36938-5
eBook Packages: Computer ScienceComputer Science (R0)