{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:48Z","timestamp":1767339648533,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:00:00Z","timestamp":1654128000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T00:00:00Z","timestamp":1654128000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872359","62122085","61936008"],"award-info":[{"award-number":["61872359","62122085","61936008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2020YFB1805402"],"award-info":[{"award-number":["2020YFB1805402"]}]},{"DOI":"10.13039\/501100004739","name":"Youth Innovation Promotion Association of the Chinese Academy of Sciences","doi-asserted-by":"publisher","award":["not applicable"],"award-info":[{"award-number":["not applicable"]}],"id":[{"id":"10.13039\/501100004739","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Nonlinear feedback shift register (NFSR) is one of the most important cryptographic primitives in lightweight cryptography. At ASIACRYPT 2010, Knellwolf et al. proposed conditional differential attack to perform a cryptanalysis on NFSR-based cryptosystems. The main idea of conditional differential attack is to restrain the propagation of the difference and obtain a detectable bias of the difference of the output bit. QUARK is a lightweight hash function family which is designed by Aumasson et al. at CHES 2010. Then the extended version of QUARK was published in <jats:italic>Journal of Cryptology<\/jats:italic> 2013. In this paper, we propose an improved conditional differential attack on QUARK. One improvement is that we propose a method to select the input difference. We could obtain a set of good input differences by this method. Another improvement is that we propose an automatic condition imposing algorithm to deal with the complicated conditions efficiently and easily. It is shown that with the improved conditional differential attack on QUARK, we can detect the bias of output difference at a higher round of QUARK. Compared to the current literature, we find a distinguisher of U-QUARK\/D-QUARK\/S-QUARK\/C-QUARK up to 157\/171\/292\/460 rounds with increasing 2\/5\/33\/8 rounds respectively. We have performed the attacks on each instance of QUARK on a 3.30 GHz Intel Core i5 CPU, and all these attacks take practical complexities which have been fully verified by our experiments. As far as we know, all of these results have been the best thus far.<\/jats:p>","DOI":"10.1186\/s42400-021-00108-3","type":"journal-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:03:55Z","timestamp":1654135435000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Improved conditional differential attacks on lightweight hash family QUARK"],"prefix":"10.1186","volume":"5","author":[{"given":"Xiaojuan","family":"Lu","sequence":"first","affiliation":[]},{"given":"Bohan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Meicheng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dongdai","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,2]]},"reference":[{"issue":"2","key":"108_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/s00145-012-9125-6","volume":"26","author":"J-P Aumasson","year":"2013","unstructured":"Aumasson J-P, Henzen L, Meier W, Naya-Plasencia M (2013) Quark: a lightweight hash. J Cryptol 26(2):313\u2013339","journal-title":"J Cryptol"},{"key":"108_CR2","unstructured":"Aumasson J-P. Github - veorq\/quark: lightweight cryptographic hash functions (reference code). https:\/\/github.com\/veorq\/Quark\/"},{"key":"108_CR3","doi-asserted-by":"crossref","unstructured":"Aumasson J-P, Henzen L, Meier W, Naya-Plasencia M (2010) Quark: a lightweight hash. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 1\u201315","DOI":"10.1007\/978-3-642-15031-9_1"},{"key":"108_CR4","unstructured":"Aumasson J-P, Knellwolf S, Meier W (2012) Heavy Quark for secure AEAD. DIAC-Directions in Authenticated Ciphers"},{"key":"108_CR5","doi-asserted-by":"crossref","unstructured":"Banik S (2014) Some insights into differential cryptanalysis of Grain v1. In: Australasian conference on information security and privacy. Springer, pp 34\u201349","DOI":"10.1007\/978-3-319-08344-5_3"},{"issue":"3","key":"108_CR6","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1007\/s00145-016-9237-5","volume":"30","author":"C Blondeau","year":"2017","unstructured":"Blondeau C, Leander G, Nyberg K (2017) Differential-linear cryptanalysis revisited. J Cryptol 30(3):859\u2013888","journal-title":"J Cryptol"},{"key":"108_CR7","doi-asserted-by":"crossref","unstructured":"De\u00a0Canniere C, Preneel B (2008) Trivium. In: New stream cipher designs. Springer, Heidelberg, pp 244\u2013266","DOI":"10.1007\/978-3-540-68351-3_18"},{"key":"108_CR8","doi-asserted-by":"crossref","unstructured":"De\u00a0Canniere C, Dunkelman O, Kne\u017eevi\u0107 M (2009) KATAN and KTANTAN-a family of small and efficient hardware-oriented block ciphers. In: International workshop on cryptographic hardware and embedded systems. Springer, pp 272\u2013288","DOI":"10.1007\/978-3-642-04138-9_20"},{"key":"108_CR9","doi-asserted-by":"crossref","unstructured":"Dinur I, Shamir A (2009) Cube attacks on tweakable black box polynomials. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 278\u2013299","DOI":"10.1007\/978-3-642-01001-9_16"},{"key":"108_CR10","doi-asserted-by":"crossref","unstructured":"Hell M, Johansso, T, Maximov A, Meier W (2008) The Grain family of stream ciphers. In: New stream cipher designs. Springer, Heidelberg, pp 179\u2013190","DOI":"10.1007\/978-3-540-68351-3_14"},{"key":"108_CR11","doi-asserted-by":"crossref","unstructured":"Knellwolf S, Meier W, Naya-Plasencia M (2010) Conditional differential cryptanalysis of NLFSR-based cryptosystems. In: International conference on the theory and application of cryptology and information security. Springer, pp 130\u2013145","DOI":"10.1007\/978-3-642-17373-8_8"},{"key":"108_CR12","unstructured":"Knellwolf S (2012) Cryptanalysis of hardware-oriented ciphers the knapsack generator, and sha-1. PhD thesis, ETH Zurich"},{"issue":"2","key":"108_CR13","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1049\/iet-ifs.2018.5180","volume":"13","author":"J-Z Li","year":"2018","unstructured":"Li J-Z, Guan J (2018) Advanced conditional differential attack on grain-like stream cipher and application on grain v1. IET Inf Secur 13(2):141\u2013148","journal-title":"IET Inf Secur"},{"issue":"9","key":"108_CR14","first-page":"4548","volume":"12","author":"J-Z Li","year":"2018","unstructured":"Li J-Z, Guan J (2018) Improved conditional differential attacks on round-reduced Grain v1. KSII Trans Internet Inf Syst (TIIS) 12(9):4548\u20134559","journal-title":"KSII Trans Internet Inf Syst (TIIS)"},{"key":"108_CR15","doi-asserted-by":"crossref","unstructured":"Liu M, Lu X, Lin D (2021) Differential-linear cryptanalysis from an algebraic perspective. In: Annual international cryptology conference. Springer, pp 247\u2013277","DOI":"10.1007\/978-3-030-84252-9_9"},{"issue":"1","key":"108_CR16","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1049\/iet-ifs.2015.0427","volume":"11","author":"Z Ma","year":"2017","unstructured":"Ma Z, Tian T, Qi W-F (2017) Improved conditional differential attacks on Grain v1. IET Inf Secur 11(1):46\u201353","journal-title":"IET Inf Secur"},{"key":"108_CR17","doi-asserted-by":"crossref","unstructured":"Yang J, Liu M, Lin D, Wang W (2018) Symbolic-like computation and conditional differential cryptanalysis of quark. In: International workshop on security. Springer, pp 244\u2013261","DOI":"10.1007\/978-3-319-97916-8_16"},{"issue":"9","key":"108_CR18","doi-asserted-by":"publisher","first-page":"1801","DOI":"10.1002\/sec.1144","volume":"8","author":"K Zhang","year":"2015","unstructured":"Zhang K, Guan J, Fei X (2015) Improved conditional differential cryptanalysis. Secur Commun Netw 8(9):1801\u20131811","journal-title":"Secur Commun Netw"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-021-00108-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-021-00108-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-021-00108-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:04:13Z","timestamp":1654135453000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-021-00108-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,2]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["108"],"URL":"https:\/\/doi.org\/10.1186\/s42400-021-00108-3","relation":{},"ISSN":["2523-3246"],"issn-type":[{"type":"electronic","value":"2523-3246"}],"subject":[],"published":{"date-parts":[[2022,6,2]]},"assertion":[{"value":"2 November 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"12"}}