Title of article :
Total Break of Zorro Using Linear and Differential Attacks
Author/Authors :
Rasoolzadeh, Shahram sharif university of technology - Electronic Research Institute - Department of Electrical Engineering, Information Systems and Security Lab (ISSL), تهران, ايران , Ahmadian, Zahra sharif university of technology - Electronic Research Institute - Department of Electrical Engineering, Information Systems and Security Lab (ISSL), تهران, ايران , Salmasizadeh, Mahmoud sharif university of technology - Electronic Research Institute, تهران, ايران , Aref, Mohammad Reza sharif university of technology - Department of Electrical Engineering, Information Systems and Security Lab (ISSL), تهران, ايران
Abstract :
An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wang et al. we present new differential and linear attacks on Zorro, both of which recover the full secret key with practical complexities. These attacks are based on very efficient distinguishers that have only two active S-Boxes per four rounds. The time complexity of our differential and linear attacks are 255:40 and 245:44 and the data complexity are 255:15 chosen plaintexts and 245:44 known plaintexts, respectively. The results clearly show that the block cipher Zorro does not have enough security against differential and linear attacks.
Keywords :
Differential Attack , Lightweight Block Cipher , Linear Attack , Zorro.
Journal title :
ISeCure - The ISC International Journal of Information Security
Journal title :
ISeCure - The ISC International Journal of Information Security