Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Mar 29;12(1):5317.
doi: 10.1038/s41598-022-09004-3.

Cube attacks on round-reduced TinyJAMBU

Affiliations

Cube attacks on round-reduced TinyJAMBU

Wil Liam Teng et al. Sci Rep. .

Abstract

Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited environments such as IoT. To meet the challenge, the National Institute of Standards and Technology (NIST) announced the Lightweight Cryptography (LWC) project. One of the finalists of the project is the TinyJAMBU cipher. This work evaluates the security of the cipher. The tool used for the evaluation is the cube attack. We present five distinguishing attacks DA1-DA5 and two key recovery attacks KRA1-KRA2. The first two distinguishing attacks (DA1 and DA2) are launched against the initialisation phase of the cipher. The best result achieved for the attacks is a distinguisher for an 18-bit cube, where the cipher variant consists of the full initialisation phase together with 438 rounds of the encryption phase. The key recovery attacks (KRA1 and KRA2) are also launched against the initialisation phase of the cipher. The best key recovery attack can be applied for a cipher variant that consists of the full initialisation phase together with 428 rounds of the encryption phase. The attacks DA3-DA5 present a collection of distinguishers up to 437 encryption rounds, whose 32-bit cubes are chosen from the plaintext, nonce, or associated data bits. The results are confirmed experimentally. A conclusion from the work is that TinyJAMBU has a better security margin against cube attacks than claimed by the designers.

PubMed Disclaimer

Conflict of interest statement

The authors declare no competing interests.

References

    1. Mouha, N. The design space of lightweight cryptography. In NIST Lightweight Cryptography Workshop 2015. https://csrc.nist.gov/csrc/media/events/lightweight-cryptography-worksho... (2015).
    1. NIST: Lightweight cryptography. https://csrc.nist.gov/projects/lightweight-cryptography.
    1. Turan, M. S., McKay, K., Chang, D., Çalik, Ç., Bassham, L., Kang, J., & Kelsey, J. Status report on the second round of the NIST lightweight cryptography standardization process. National Institute of Standards and Technology Internal Report 8369; 10.6028/NIST.IR.8369 (2021).
    1. Wu, H., & Huang, T. TinyJAMBU: A family of lightweight authenticated encryption algorithms. Submission to the NIST Lightweight Cryptography Standardization Process. https://csrc.nist.gov/CSRC/media/Projects/Lightweight-Cryptography/docum... (2019).
    1. Wu, H., & Huang, T. TinyJAMBU: A family of lightweight authenticated encryption algorithms (version 2). Submission to the NIST Lightweight Cryptography Standardization Process. https://csrc.nist.gov/CSRC/media/Projects/lightweight-cryptography/docum... (2021).