On the security analysis of ElephantDelirium algorithm
HOU Chengan, LIU Meicheng
Author information+
( 1. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; 2. School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100093, China)
{{custom_zuoZheDiZhi}}
{{custom_authorNodes}}
{{custom_bio.content}}
{{custom_bio.content}}
Collapse
History+
Published
2023-02-28
Issue Date
2023-02-28
Abstract
This paper focuses on the security analysis of ElephantDelirium algorithm. Elephant is one of the candidate algorithms in the finalist of National Institute of Standards and Technology ( NIST) lightweight cryptographic ( LWC) project. Its encryption algorithm extends the key to the secret masks through an invertible map, and then uses a permutation on the internal states to achieve confusion and diffusion. The ElephantDelirium algorithm is an instance of Elephant encryption algorithm which uses Keccakf[ 200] as its underlying permutation. This paper constructs a 5round zerosum distinguisher using the property that the algebraic degree of nonlinear operation in Keccakf[ 200] permutation is 2. Based on this distinguisher, we use the divide and conquer method to guess the secret mask in the output of 6round ElephantDelirium algorithm and filter out the right secret mask by checking the ze rosum property. As a result, the secret mask can be recovered with 100% accuracy and 100% suc cess rate. This attack is under the noncerespecting setting and costs about 2. 8 seconds to recover all key bits using a single CPU core. This work is the first practical attack on the ElephantDelirium algo rithm. Also, we improve the result of optimized interpolation attack on 8round ElephantDelirium algo rithm with the help of the cube attack. This improvement reduces the complexity from 298. 3 to 295. 2 .