Optimized Linear Cryptanalysis of BAKSHEESH: A Case Study with Partial-Sum, FWT, and Key-Bridging
Yin Lv , Yingjie Zhang , Zhiru Chen , Danping Shi , Lei Hu
BAKSHEESH is a lightweight block cipher designed to achieve efficient implementation while maintaining adequate security, and is considered a competitor to ciphers such as GIFT. In this paper, we study the linear cryptanalysis of BAKSHEESH in a systematic and optimized manner. First, we develop a mixed-integer linear programming based automatic method to search for linear distinguishers of BAKSHEESH and identify a 21-round linear distinguisher. Then, in the key-recovery phase, for the first time, we propose an optimized strategy that combines the partial-sum, fast Walsh–Hadamard transform, and key-bridging techniques. This combination allows a significant reduction in the time complexity of the attack. Using the 21-round linear distinguisher, we mount a 24-round key-recovery attack on BAKSHEESH, which improves the previously best-known result by three rounds. In addition, we present 21-, 22-, and 23-round key-recovery attacks on BAKSHEESH to provide a detailed comparison, offering a comprehensive evaluation of BAKSHEESH’s security. Through these studies, we provide a deeper understanding of BAKSHEESH’s resistance to linear cryptanalysis and offer a quantitative assessment of its overall security margins.
BAKSHEESH / Linear Cryptanalysis / Mixed-Integer Linear Programming / Fast Walsh–Hadamard Transform / Partial-Sum / Key-Bridging / Key-Recovery Attack
Higher Education Press 2026
/
| 〈 |
|
〉 |