Skip to main content

Cryptanalysis of Raindrop and FBC

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11928))

Abstract

This paper introduces the results of several different security analysis of two new block ciphers: Raindrop and FBC, which are the two candidates of block cipher designs submitted to the Chinese Cryptographic Algorithms Design Competition in 2019. Raindrop applies two-branch Feistel structure, while FBC block cipher is based on the four-way dual Feistel structure design. We give detailed security evaluation on Raindrop and FBC, using differential, linear, impossible difference and boomerang cryptanalysis approaches. For Raindrop, we achieved the results as follows: differential attack on 12-round Raindrop based on the 11-round distinguisher with the computational complexity of \(2^{62.41}\); linear attack on 13-round Raindrop based on 12-round distinguisher with the computational complexity of \(2^{106.3}\); impossible differential attack on 18-round Raindrop based on 12-round distinguisher with the computational complexity of \(2^{102.83}\); and boomerang attack on 15-round Raindrop based on 14-round distinguisher with the computational complexity of \(2^{224.6}\). For FBC, results are as follows: differential attack on 12-round FBC based on 11-round distinguisher with the computational complexity of \(2^{93.41}\); linear attack on 11-round FBC based on 10-round distinguisher with the computational complexity of \(2^{112.54}\); impossible differential attack on 11-round FBC based on 7-round distinguisher with the computational complexity of \(2^{94.54}\); and boomerang attack on 13-round FBC based on 12-round distinguisher with the computational complexity of \(2^{247.67}\). At present, the best records achieved are 18-round impossible differential attack for Raindrop-128-128 and 13-round boomerang attack for FBC128-256. The statistical distinguishers we built are similar to the proposals but we provide the concrete key recovery attacks in this study.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Biham, E., Shamir, A.: Differential cryptanalysis of des-like cryptosystems. In: Conference on the Theory and Application of Cryptography (1990)

    Google Scholar 

  2. Biryukov, A., Khovratovich, D.: Related-key cryptanalysis of the full AES-192 and AES-256. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 1–18. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-10366-7_1

    Chapter  Google Scholar 

  3. Blondeau, C., Gérard, B., Nyberg, K.: Multiple differential cryptanalysis using, and X2 statistics. In: Visconti, I., De Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 343–360. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32928-9_19

    Chapter  MATH  Google Scholar 

  4. Cheon, J.H., Kim, M.J., Kim, K., Jung-Yeun, L., Kang, S.W.: Improved impossible differential cryptanalysis of rijndael and crypton. In: Kim, K. (ed.) ICISC 2001. LNCS, vol. 2288, pp. 39–49. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-45861-1_4

    Chapter  Google Scholar 

  5. Feng, X., Zeng, X., Zhang, F., Zeng, G., Tang, D., Gan, G.: Block cipher algorithm FBC (2019)

    Google Scholar 

  6. Feng, X., Zeng, X., Zhang, F., Zeng, G., Tang, D., Gan, G.: The report of design and evaluation of block cipher algorithm FBC (2019)

    Google Scholar 

  7. Hermelin, M., Cho, J.Y., Nyberg, K.: Multidimensional linear cryptanalysis of reduced round serpent. In: Mu, Y., Susilo, W., Seberry, J. (eds.) ACISP 2008. LNCS, vol. 5107, pp. 203–215. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70500-0_15

    Chapter  Google Scholar 

  8. Howard, R.: Data encryption standard. Comput. Secur. 6(3), 195–196 (1987)

    Article  Google Scholar 

  9. Knudsen, L.: Deal-a 128-bit block cipher. Complexity 258(2), 216 (1998)

    Google Scholar 

  10. Matsui, M.: On correlation between the order of S-boxes and the strength of DES. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 366–375. Springer, Heidelberg (1995). https://doi.org/10.1007/BFb0053451

    Chapter  Google Scholar 

  11. Ohta, H., Matsui, M.: A description of the MISTY1 encryption algorithm. RFC2994, November (2000)

    Google Scholar 

  12. Selçuk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptology 21(1), 131–147 (2008)

    Article  MathSciNet  Google Scholar 

  13. Wagner, D.: The boomerang attack. In: Knudsen, L. (ed.) FSE 1999. LNCS, vol. 1636, pp. 156–170. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48519-8_12

    Chapter  Google Scholar 

  14. Wang, M., Li, Y., Li, M., Fu, Y., Fan, Y., Huang, L.: Raindrop series block cipher algorithms design proposal (2019)

    Google Scholar 

Download references

Acknowledgement

This work has been partly supported by the National Natural Science Foundation of China under Grant No. 61702212 and the Fundamental Research Funds for the Central Universities under Grand No. CCNU19TS017.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jiageng Chen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ren, B., Chen, J., Zhou, S., Jin, X., Xia, Z., Liang, K. (2019). Cryptanalysis of Raindrop and FBC. In: Liu, J., Huang, X. (eds) Network and System Security. NSS 2019. Lecture Notes in Computer Science(), vol 11928. Springer, Cham. https://doi.org/10.1007/978-3-030-36938-5_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36938-5_33

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36937-8

  • Online ISBN: 978-3-030-36938-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics