GPU-Based Brute Force Cryptanalysis of KLEIN


Creative Commons License

Tezcan C.

10th International Conference on Information Systems Security and Privacy, Rome, Italy, 26 - 28 February 2024, pp.884-889, (Full Text) identifier

  • Publication Type: Conference Paper / Full Text
  • Doi Number: 10.5220/0012461900003648
  • City: Rome
  • Country: Italy
  • Page Numbers: pp.884-889
  • Middle East Technical University Affiliated: Yes

Abstract

KLEIN is a family of lightweight block ciphers that supports 64-bit, 80-bit, and 96-bit secret keys. In this work, we provide a CUDA optimized table-based implementation of the KLEIN family which does not contain shared memory bank conflicts. Our best optimization reach more than 45 billion 64-bit KLEIN key searches on an RTX 4090. Our results show that KLEIN block cipher is susceptible to brute force attacks via GPUs. Namely, in order to break KLEIN in a year via brute force, one needs around 13, 1.34 million, and 111 billion RTX 4090 GPUs for 64-bit, 80-bit, and 96-bit secret keys, respectively. We recommend lightweight designs to avoid short keys.