Contact Us Search Paper

Differential Cryptanalysis of the Improved-DLBCA Lightweight Block Cipher

Yige Zhu1, Yihui Zhou1,2, Yanping Li3, Zhenqiang Wu1,2,*

Corresponding Author:

Zhenqiang Wu

Affiliation(s):

1School of Artificial Intelligence and Computer Science, Shaanxi Normal University, 710119, Xi’an, China

2Shaanxi Key Laboratory of Network and System Security, Xidian University, 710071, Xi’an, China

3School of Mathematics and Statistics, Shaanxi Normal University, 710119, Xi’an, China

*Corresponding author

Abstract:

As resource-constrained devices become increasingly prevalent in satellite communication systems, evaluating whether lightweight ciphers such as Improved-DLBCA can provide both efficiency and security has become an essential task. Motivated by these practical needs, this paper presents a comprehensive security assessment of Improved-DLBCA, a lightweight block cipher designed specifically for constrained environments. Through SAT-based automated search methods, we perform detailed differential cryptanalysis of the algorithm, identifying optimal 11-round differential characteristics with probability 2−31 and constructing a practical key-recovery attack on 14-round Improved-DLBCA with time complexity 261.5 encryption equivalents. Our results validate the SAT methodology for lightweight cipher analysis and offer important security insights for satellite communication applications.

Keywords:

Block cipher, Lightweight cryptography, Differential cryptanalysis, SAT, Improved-DLBCA

Downloads: 1 Views: 7
Cite This Paper:

Yige Zhu, Yihui Zhou, Yanping Li, Zhenqiang Wu (2025). Differential Cryptanalysis of the Improved-DLBCA Lightweight Block Cipher. Journal of Networking and Network Applications, Volume 5, Issue 4, pp. 158–164. https://doi.org/10.33969/J-NaNA.2025.050402.

References:

[1] X. Guo and L. Ma, “Survivability Analysis of Satellite-Based Networks Under Solar Storm Hazards,” Journal of Networking and Network Applications, vol. 4, no. 4, pp. 157–164, 2024.

[2] Y. Xi, R. Feng, Y. Zhou, H. Liu, and L. Lu, “Analysis Methods for Block Ciphers under Noise Interference: A Case Study of XOR Operations,” in Proc. 2025 Int. Conf. Netw. Netw. Appl. (NaNA), Tashkent, Uzbekistan, 2025.

[3] P. Shao, G. Zhang, and M. Li, “Automatic Search for Differential Characteristics in ARX Ciphers,” in Proc. 2014 10th International Conference on Natural Computation (ICNC), pp. 1009–1013, 2014. 

[4] E. Biham and A. Shamir, “Differential Cryptanalysis of DES-like Cryp-tosystems,” in Proc. 10th Annual International Cryptology Conference on Advances in Cryptology, pp. 2–21, 1990.

[5] J. Zhou, M. Tian, Z. Wu, L. Lu, and Y. Zhou, “Recent Advances in Differential Cryptanalysis of Block Ciphers,” in Proc. 2025 Int. Conf. Netw. Netw. Appl. (NaNA), Tashkent, Uzbekistan, 2025.

[6] J. Zhou, Y. Zhu, M. Tian, L. Lu, and Y. Zhou, “Cryptanalysis of Block Ciphers with Noise: A Case Study on Permutation Operations,” in Proc. 2025 Int. Conf. Netw. Netw. Appl. (NaNA), Tashkent, Uzbekistan, 2025.

[7] S. Salim and M. Aldabbagh, “Design 32-bit Lightweight Block Cipher Algorithm (DLBCA),” in Proceedings of the International Journal of Computer Applications, vol. 166, no. 8, 2017.

[8] S. Aldabbagh, A. G. Sulaiman, I. Shaikhli, K. Al-Enezi, and A. Alenezi, “Improving the Cost Factor of DLBCA Lightweight Block Cipher Algorithm,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 10, no. 2, pp. 786–791, 2018.

[9] M. Soos, K. Nohl, and C. Castelluccia, “Extending SAT Solvers to Cryptographic Problems,” in Proc. SAT 2009, LNCS, vol. 5584, pp. 244–257, 2009.

[10] L. Sun, W. Wang, and M. Wang, “Accelerating the Search of Differential and Linear Characteristics with the SAT Method,” Cryptology ePrint Archive, Report 2021/213, 2021.

[11] A. Biere, T. Faller, K. Fazekas, M. Fleury, N. Froleyks, and F. Pollitt, “CaDiCaL 2.0,” in Proc. Computer Aided Verification - 36th Interna-tional Conference, CAV 2024, LNCS, vol. 14681, pp. 133–152, 2024.

[12] A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher,” in Proc. CHES 2007, LNCS, vol. 4727, pp. 450–466, 2007.

[13] J. Zhao, S. Xu, Z. Zhang, X. Dong, and Z. Li, “Differential Cryptanalysis of the Lightweight Block Cipher GIFT,” J. Cryptologic Res., vol. 5, no. 4, pp. 335–343, 2018.

[14] J. Lu, G. Liu, L. Xiong, B. Sun, and C. Li, “Differential Attack on Lightweight PFP Algorithm,” J. Cryptologic Res., vol. 11, no. 6, pp. 1293–1307, 2024.