{"id":"https://openalex.org/W4411408814","doi":"https://doi.org/10.1109/tit.2025.3580774","title":"Depending on DEEPAND: Cryptanalysis of NLFSR-Based Lightweight Ciphers TinyJAMBU, KATAN, and KTANTAN","display_name":"Depending on DEEPAND: Cryptanalysis of NLFSR-Based Lightweight Ciphers TinyJAMBU, KATAN, and KTANTAN","publication_year":2025,"publication_date":"2025-06-18","ids":{"openalex":"https://openalex.org/W4411408814","doi":"https://doi.org/10.1109/tit.2025.3580774"},"language":"en","primary_location":{"id":"doi:10.1109/tit.2025.3580774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3580774","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003758327","display_name":"Amit Jana","orcid":"https://orcid.org/0000-0003-4171-0650"},"institutions":[{"id":"https://openalex.org/I6498739","display_name":"Indian Statistical Institute","ror":"https://ror.org/00q2w1j53","country_code":"IN","type":"education","lineage":["https://openalex.org/I6498739"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Amit Jana","raw_affiliation_strings":["Indian Statistical Institute, Kolkata, India"],"raw_orcid":"https://orcid.org/0000-0003-4171-0650","affiliations":[{"raw_affiliation_string":"Indian Statistical Institute, Kolkata, India","institution_ids":["https://openalex.org/I6498739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054077729","display_name":"Mostafizar Rahman","orcid":"https://orcid.org/0000-0003-0934-4769"},"institutions":[{"id":"https://openalex.org/I180941496","display_name":"University of Hyogo","ror":"https://ror.org/0151bmh98","country_code":"JP","type":"education","lineage":["https://openalex.org/I180941496"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Mostafizar Rahman","raw_affiliation_strings":["Graduate School of Information Science, University of Hyogo, Kobe, Japan","Graduate School of Informatics, University of Hyogo, Kobe, Japan"],"raw_orcid":"https://orcid.org/0000-0003-0934-4769","affiliations":[{"raw_affiliation_string":"Graduate School of Information Science, University of Hyogo, Kobe, Japan","institution_ids":["https://openalex.org/I180941496"]},{"raw_affiliation_string":"Graduate School of Informatics, University of Hyogo, Kobe, Japan","institution_ids":["https://openalex.org/I180941496"]}]},{"author_position":"last","author":{"id":null,"display_name":"Dhiman Saha","orcid":"https://orcid.org/0000-0002-4668-073X"},"institutions":[{"id":"https://openalex.org/I4210121466","display_name":"Indian Institute of Technology Bhilai","ror":"https://ror.org/02sscsx71","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210121466"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Dhiman Saha","raw_affiliation_strings":["Department of Computer Science and Engineering, de.ci.phe.red Lab, Indian Institute of Technology Bhilai, Durg, India","Department of Computer Science and Engineering, de.ci.phe.red Lab, Indian Institute of Technology Bhilai, India"],"raw_orcid":"https://orcid.org/0000-0002-4668-073X","affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, de.ci.phe.red Lab, Indian Institute of Technology Bhilai, Durg, India","institution_ids":["https://openalex.org/I4210121466"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, de.ci.phe.red Lab, Indian Institute of Technology Bhilai, India","institution_ids":["https://openalex.org/I4210121466"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003758327"],"corresponding_institution_ids":["https://openalex.org/I6498739"],"apc_list":null,"apc_paid":null,"fwci":2.1377,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88831969,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":"71","issue":"9","first_page":"7348","last_page":"7366"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9606999754905701,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9570000171661377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.6765502095222473},{"id":"https://openalex.org/keywords/linear-cryptanalysis","display_name":"Linear cryptanalysis","score":0.6557430028915405},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6321641802787781},{"id":"https://openalex.org/keywords/differential-cryptanalysis","display_name":"Differential cryptanalysis","score":0.6150198578834534},{"id":"https://openalex.org/keywords/boomerang-attack","display_name":"Boomerang attack","score":0.5829163193702698},{"id":"https://openalex.org/keywords/block-cipher","display_name":"Block cipher","score":0.5691885948181152},{"id":"https://openalex.org/keywords/impossible-differential-cryptanalysis","display_name":"Impossible differential cryptanalysis","score":0.47739356756210327},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.35260117053985596},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.29831886291503906}],"concepts":[{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.6765502095222473},{"id":"https://openalex.org/C82424418","wikidata":"https://www.wikidata.org/wiki/Q1826463","display_name":"Linear cryptanalysis","level":4,"score":0.6557430028915405},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6321641802787781},{"id":"https://openalex.org/C36123800","wikidata":"https://www.wikidata.org/wiki/Q1224471","display_name":"Differential cryptanalysis","level":4,"score":0.6150198578834534},{"id":"https://openalex.org/C147552392","wikidata":"https://www.wikidata.org/wiki/Q2869899","display_name":"Boomerang attack","level":5,"score":0.5829163193702698},{"id":"https://openalex.org/C106544461","wikidata":"https://www.wikidata.org/wiki/Q543151","display_name":"Block cipher","level":3,"score":0.5691885948181152},{"id":"https://openalex.org/C120488936","wikidata":"https://www.wikidata.org/wiki/Q3005748","display_name":"Impossible differential cryptanalysis","level":5,"score":0.47739356756210327},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.35260117053985596},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.29831886291503906}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tit.2025.3580774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tit.2025.3580774","pdf_url":null,"source":{"id":"https://openalex.org/S4502562","display_name":"IEEE Transactions on Information Theory","issn_l":"0018-9448","issn":["0018-9448","1557-9654"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Theory","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W118865363","https://openalex.org/W197228877","https://openalex.org/W1487353416","https://openalex.org/W1601321736","https://openalex.org/W1607874478","https://openalex.org/W1629301835","https://openalex.org/W1883151075","https://openalex.org/W1937380053","https://openalex.org/W2087928947","https://openalex.org/W2130087229","https://openalex.org/W2233121608","https://openalex.org/W2495518322","https://openalex.org/W2549714595","https://openalex.org/W2769174685","https://openalex.org/W2770809732","https://openalex.org/W2795031214","https://openalex.org/W2810850319","https://openalex.org/W2953777703","https://openalex.org/W3089729761","https://openalex.org/W3097161896","https://openalex.org/W3097184403","https://openalex.org/W3110785930","https://openalex.org/W3183766709","https://openalex.org/W3213206267","https://openalex.org/W3214853081","https://openalex.org/W4242766192","https://openalex.org/W4290995558","https://openalex.org/W4386844127","https://openalex.org/W6737701625","https://openalex.org/W6802421668"],"related_works":["https://openalex.org/W2557174342","https://openalex.org/W4230315357","https://openalex.org/W57168481","https://openalex.org/W2950215720","https://openalex.org/W3123145532","https://openalex.org/W2791274315","https://openalex.org/W2083383916","https://openalex.org/W2560473362","https://openalex.org/W2786560893","https://openalex.org/W1574936599"],"abstract_inverted_index":{"Automated":[0],"cryptanalysis":[1,10,33,61],"has":[2,47,110,159],"taken":[3],"center":[4],"stage":[5],"in":[6,31,44,49,120,153,244,335,358,371,390],"the":[7,12,23,41,68,98,115,130,185,209,213,225,228,232,241,272,296,305,318,331,336,339,353,361,380,391,417],"arena":[8],"of":[9,25,132,135,145,227,234,253,275,308,320,435],"since":[11],"pioneering":[13],"work":[14,91],"by":[15,71,147,173,329,365],"Mouha":[16],"<italic":[17,149,247,257,276,286,367],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[18,150,192,248,258,260,265,268,277,279,287,368],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">et":[19,151,369],"al</i>.":[20,152,370],"which":[21],"showcased":[22],"power":[24],"Mixed":[26],"Integer":[27],"Linear":[28],"Programming":[29],"(MILP)":[30],"solving":[32],"problems":[34,65],"that":[35,170],"otherwise,":[36],"required":[37],"significant":[38],"effort.":[39],"Since":[40],"inception,":[42],"research":[43],"this":[45,101,217],"area":[46],"moved":[48],"primarily":[50],"two":[51],"directions.":[52],"One":[53],"is":[54,77,92,200,342],"to":[55,66,78,82,95,97,107,113,162,178,219,230,238,284,294,344,360,415,432],"model":[56,105,158,215,242,341,382],"more":[57,59,85,179],"and":[58,128,166,355,403,428],"classical":[60],"tools":[62],"as":[63,108,194,300,437],"optimization":[64],"leverage":[67],"ease":[69],"provided":[70],"state-of-the-art":[72],"solvers.":[73],"The":[74,89,156],"other":[75,433],"direction":[76],"improve":[79],"existing":[80],"models":[81],"make":[83,345],"them":[84],"efficient":[86],"and/or":[87],"accurate.":[88],"current":[90],"an":[93],"attempt":[94],"contribute":[96],"latter.":[99],"In":[100,187,411],"work,":[102],"a":[103,189,246,346],"general":[104],"referred":[106],"DEEPAND":[109,125,332,340,381,413],"been":[111,160],"devised":[112],"capture":[114,416],"correlation":[116,419],"between":[117],"AND":[118,138,206,423],"gates":[119,139,207,424],"NLFSR-based":[121],"lightweight":[122],"block":[123,302],"ciphers.":[124,186,303],"builds":[126],"upon":[127,328],"generalizes":[129],"idea":[131],"joint":[133],"propagation":[134],"differences":[136],"through":[137],"captured":[140],"using":[141,208],"refined":[142,214],"MILP":[143],"modeling":[144],"TinyJAMBU":[146,203,254,309],"Saha":[148],"FSE":[154],"2020.":[155],"proposed":[157],"applied":[161],"TinyJAMBU,":[163],"KATAN,":[164,321],"KTANTAN":[165,388,409],"can":[167,429],"detect":[168],"correlations":[169],"were":[171],"missed":[172],"earlier":[174,196],"models.":[175],"This":[176,222,270],"leads":[177],"accurate":[180],"differential":[181,398],"bounds":[182],"for":[183,202,317,375,406],"both":[184,352],"particular,":[188],"384-round":[190],"(<italic":[191],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">full-round</i>":[193],"per":[195],"specification)":[197],"Type-IV":[198,251],"trail":[199,252],"found":[201],"with":[204,262,400],"14-active":[205],"new":[210],"model,":[211],"while":[212],"reported":[216,324],"figure":[218],"be":[220,285,292,313,430],"19.":[221],"also":[223],"reaffirms":[224],"decision":[226],"designers":[229],"increase":[231],"number":[233],"rounds":[235],"from":[236],"384":[237],"640.":[239],"Moreover,":[240,334],"succeeds":[243],"searching":[245],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">full":[249],"round</i>":[250],"keyed":[255],"permutation":[256],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">P</i><sub":[259,278],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">1024</sub>":[261,280],"probability":[263],"2<sup":[264,267],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u2212105</sup>(\u226b":[266],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u2212128</sup>).":[269],"reveals":[271,396],"non-random":[273],"properties":[274],"thereby":[281],"showing":[282],"it":[283,290],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">non-ideal</i>.":[288],"Hence":[289],"cannot":[291],"expected":[293],"provide":[295],"same":[297],"security":[298,307],"levels":[299],"robust":[301],"Further,":[304],"provable":[306],"AEAD":[310],"scheme":[311],"should":[312],"carefully":[314],"revisited.":[315],"Similarly,":[316],"variants":[319],"several":[322],"previously":[323],"trails":[325],"are":[326,425],"improved":[327],"employing":[330],"model.":[333],"related-key":[337,392],"setting,":[338],"able":[343],"better":[347,420],"140-round":[348],"boomerang":[349,363],"distinguisher":[350],"(for":[351],"data":[354,402],"time":[356,404],"complexity)":[357],"comparison":[359],"previous":[362],"attack":[364],"Isobe":[366],"ACISP":[372],"2013.":[373],"Furthermore,":[374],"enhanced":[376],"applicability,":[377],"we":[378],"employ":[379],"on":[383],"another":[384],"multiple":[385,422],"AND-based":[386],"cipher,":[387],",":[389],"setting.":[393],"Our":[394],"analysis":[395],"practical":[397],"distinguishers":[399],"low":[401],"complexities":[405],"all":[407],"full-round":[408],"variants.":[410],"summary,":[412],"seems":[414],"underlying":[418],"when":[421],"at":[426],"play":[427],"adapted":[431],"classes":[434],"ciphers":[436],"well.":[438]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-29T09:16:38.111599","created_date":"2025-10-10T00:00:00"}
