International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Symmetric Cryptology, Volume 2024

Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs


Debasmita Chakraborty
Indian Statistical Institute, Kolkata, India, Graz University of Technology, Graz, Austria

Hosein Hadipour
Graz University of Technology, Graz, Austria

Phuong Hoa Nguyen
Univ Rennes, Inria, CNRS, IRISA, Rennes, France

Maria Eichlseder
Graz University of Technology, Graz, Austria


Keywords: Cryptanalysis, Impossible differentials, Key recovery, CP, ARX, AndRX, SIMON, SPECK, Simeck, ChaCha, Chaskey, LEA, SipHash


Abstract

The impossible differential (ID) attack is one of the most important cryptanalytic techniques for block ciphers. There are two phases to finding an ID attack: searching for the distinguisher and building a key recovery upon it. Previous works only focused on automated distinguisher discovery, leaving key recovery as a manual post-processing task, which may lead to a suboptimal final complexity. At EUROCRYPT 2023, Hadipour et al. introduced a unified constraint programming (CP) approach based on satisfiability for finding optimal complete ID attacks in strongly aligned ciphers. While this approach was extended to weakly-aligned designs like PRESENT at ToSC 2024, its application to ARX and AndRX ciphers remained as future work. Moreover, this method only exploited ID distinguishers with direct contradictions at the junction of two deterministic transitions. In contrast, some ID distinguishers, particularly for ARX and AndRX designs, may not be detectable by checking only the existence of direct contradictions. This paper fills these gaps by extending Hadipour et al.’s method to handle indirect contradictions and adapting it for ARX and AndRX designs. We also present a similar method for identifying zero-correlation (ZC) distinguishers. Moreover, we extend our new model for finding ID distinguishers to a unified optimization problem that includes both the distinguisher and the key recovery for AndRX designs. Our method improves ID attacks and introduces new distinguishers for several ciphers, such as SIMON, SPECK, Simeck, ChaCha, Chaskey, LEA, and SipHash. For example, we achieve a one-round improvement in ID attacks against SIMON-64-96, SIMON-64-128, SIMON-128-128, SIMON-128-256 and a two-round improvement against SIMON-128- 192. These results significantly contribute to our understanding of the effectiveness of automated tools in the cryptanalysis of different design paradigms.

Publication

Transactions on Symmetric Cryptology, Volume 2024, Issue 3

Paper

Artifact

Artifact number
tosc/2024/a4

Artifact published
September 5, 2025

Badge
IACR FSE Artifacts Functional

README

ZIP (499123 Bytes)  

View on Github

License
This work is licensed under the MIT License.

Some files in this archive are licensed under a different license. See the contents of this archive for more information.

Note that license information is supplied by the authors and has not been confirmed by the IACR.


BibTeX How to cite

Chakraborty, D., Hadipour, H., Nguyen, P. H., & Eichlseder, M. (2024). Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs. IACR Transactions on Symmetric Cryptology, 2024(3), 84-176. https://doi.org/10.46586/tosc.v2024.i3.84-176. Artifact available at https://artifacts.iacr.org/tosc/2025/a4