Cryptanalysis of Raindrop and FBC

Bingqing Ren, Jiageng Chen*, Shihao Zhou, Xiushu Jin, Zhe Xia, Kaitai Liang

*Corresponding author for this work

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

1 Citation (Scopus)

Abstract

This paper introduces the results of several different security analysis of two new block ciphers: Raindrop and FBC, which are the two candidates of block cipher designs submitted to the Chinese Cryptographic Algorithms Design Competition in 2019. Raindrop applies two-branch Feistel structure, while FBC block cipher is based on the four-way dual Feistel structure design. We give detailed security evaluation on Raindrop and FBC, using differential, linear, impossible difference and boomerang cryptanalysis approaches. For Raindrop, we achieved the results as follows: differential attack on 12-round Raindrop based on the 11-round distinguisher with the computational complexity of 262.41; linear attack on 13-round Raindrop based on 12-round distinguisher with the computational complexity of 2106.3; impossible differential attack on 18-round Raindrop based on 12-round distinguisher with the computational complexity of 2102.83; and boomerang attack on 15-round Raindrop based on 14-round distinguisher with the computational complexity of 2224.6. For FBC, results are as follows: differential attack on 12-round FBC based on 11-round distinguisher with the computational complexity of 293.41; linear attack on 11-round FBC based on 10-round distinguisher with the computational complexity of 2112.54; impossible differential attack on 11-round FBC based on 7-round distinguisher with the computational complexity of 294-54; and boomerang attack on 13-round FBC based on 12-round distinguisher with the computational complexity of 2247.67. At present, the best records achieved are 18-round impossible differential attack for Raindrop-128-128 and 13-round boomerang attack for FBC128-256. The statistical distinguishers we built are similar to the proposals but we provide the concrete key recovery attacks in this study.

Original languageEnglish
Title of host publicationNetwork and System Security - 13th International Conference, NSS 2019, Proceedings
EditorsJoseph K. Liu, Xinyi Huang
PublisherSpringerOpen
Pages536-551
Number of pages16
ISBN (Print)9783030369378
DOIs
Publication statusPublished - 1 Jan 2019
Externally publishedYes
Event13th International Conference on Network and System Security, NSS 2019 - Sapporo, Japan
Duration: 15 Dec 201918 Dec 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11928 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference13th International Conference on Network and System Security, NSS 2019
Country/TerritoryJapan
CitySapporo
Period15/12/1918/12/19

Keywords

  • Boomerang cryptanalysis
  • Differential cryptanalysis
  • FBC
  • Impossible difference cryptanalysis
  • Linear cryptanalysis
  • Raindrop

Fingerprint

Dive into the research topics of 'Cryptanalysis of Raindrop and FBC'. Together they form a unique fingerprint.

Cite this