In this paper, we propose new techniques for impossible differential cryptanalysis. The first one is a hybrid model for finding distinguishers on block ciphers that have both bit-oriented and word-oriented components; we apply this model to LBlock, and build an improbable differential for 18 rounds, improving over the previous 17-round results. Our second model builds impossible differential attacks for ARX ciphers automatically, including, for the first time, hash table based optimizations into the complexity evaluation of the attack. We apply this model to the HIGHT block cipher, and improve complexity of the state-of-the-art 27-round attack. Finally, we include these techniques in the cryptanalysis tool CLAASP, building the needed decryption functions automatically from the block cipher’s graph representation; this inversion technique is of independent interest to other similar libraries, such as TAGADA.
Impossible Differentials Automation: Model Generation and New Techniques / E. Bellini, A. De Piccoli, D. Gerault, P. Huynh, S. Pelizzola, A. Visconti (LECTURE NOTES IN COMPUTER SCIENCE). - In: Impossible Differentials Automation: Model Generation and New Techniques / [a cura di] Christina Boura, Atefeh Mashatan, Ali Miri. - [s.l] : Springer Science and Business Media Deutschland GmbH, 2026 Jan 02. - ISBN 9783032105356. - pp. 144-175 (( 32. International Conference on Selected Areas in Cryptography, SAC Toronto 2025 [10.1007/978-3-032-10536-3_6].
Impossible Differentials Automation: Model Generation and New Techniques
A. De PiccoliSecondo
;S. Pelizzola
Penultimo
;A. ViscontiUltimo
2026
Abstract
In this paper, we propose new techniques for impossible differential cryptanalysis. The first one is a hybrid model for finding distinguishers on block ciphers that have both bit-oriented and word-oriented components; we apply this model to LBlock, and build an improbable differential for 18 rounds, improving over the previous 17-round results. Our second model builds impossible differential attacks for ARX ciphers automatically, including, for the first time, hash table based optimizations into the complexity evaluation of the attack. We apply this model to the HIGHT block cipher, and improve complexity of the state-of-the-art 27-round attack. Finally, we include these techniques in the cryptanalysis tool CLAASP, building the needed decryption functions automatically from the block cipher’s graph representation; this inversion technique is of independent interest to other similar libraries, such as TAGADA.| File | Dimensione | Formato | |
|---|---|---|---|
|
Impossible_Differential_Trails_Automated_Search.pdf
embargo fino al 02/01/2027
Tipologia:
Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Licenza:
Publisher
Dimensione
787.71 kB
Formato
Adobe PDF
|
787.71 kB | Adobe PDF | Visualizza/Apri Richiedi una copia |
|
978-3-032-10536-3-1.pdf
accesso riservato
Tipologia:
Publisher's version/PDF
Licenza:
Nessuna licenza
Dimensione
1.74 MB
Formato
Adobe PDF
|
1.74 MB | Adobe PDF | Visualizza/Apri Richiedi una copia |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.




