Let permutation
be
s-secure against the CICO problem. We split it into two permutations
and
, i.e.,
.
is a vector subspace spanned by
. We use
to be the input state and output state of
respectively, where
and
are fixed constants. According to the definition of CICO problem, if we can find
and
such that
with a complexity smaller than
, then we may conclude that the permutation security margin is insufficient.
In order to describe this technique in more detail, we assume that the permutation
is the
Grendel permutation. We let
consist of two nonlinear layers, one linear layer and one round key addition in the
Grendel round function.
can be expressed as
, then
can be regarded as an
round
Grendel round function with a linear layer and a round key addition.
S is denoted as the S-box, and
is the inverse of the S-box.
Figure 2.
A detailed description of a specific trick with a state size of 4.
Figure 2.
A detailed description of a specific trick with a state size of 4.
When . We set
, then
is a vector subspace spanned by
. Let the input states of
be
, where
is a fixed constant. Let the states after
be
. When passing through the first nonlinear layer of
, there is
The S-box must satisfy the Formula
4, and the above Equation
6 can be established successfully. We found that
and
are fixed,
can be represented by
as
. Then we have
When . We set
, then
is a vector subspace spanned by
. Similar to
, we denote the input and output states of
as
and
respectively, where
are fixed constants. When passing through the first nonlinear layer of
, there is
We fix
to a constant denoted as
;
satisfies
Then we can obtain
In order to simplify the equation, we set
, and bring
into Equation
8, then we get
Therefore, if
and
satisfy
we will have
When . In general, we set
,
is also a vector subspace spanned by
. Similarly, the input and output states of
are in the form of
and
respectively. Let
be a fixed constant. When passing through the first nonlinear layer of
, there is
We also fix
to a constant denoted as
, then
fulfills
Just like
and
, we set
. By bringing
and the constant
back into the Equation
9, then we can obtain
Therefore, if
and
satisfy
we will have
Let
be the input to
, where only
is the unknown variable. We define the output of
as
,
is a fixed constant. By considering the final position of the output from
, we construct a univariate equation with
as its variable, which is in the form of
Given a valid
, we can invariably infer an input
specifically tailored for the R-round permutation
that projects onto the vector subspace
.