cronokirby

(2026-04) A Key Schedule Design and Evaluation under Boundary Round-Key Leakage

2026-04-08

Abstract

We study key-schedule design under boundary round-key leakage, namely leakage of the first round key, the last round key, or both end round keys. We propose the nonlinear key-schedule RKi=KF(KT(i))\mathrm{RK}_i = K \oplus F\bigl(K \oplus T(i)\bigr), where KK is the master key, T(i)T(i) is a public domain separation value, and FF is a public SPN-based permutation parameterized by its round count NFN_F.

Under the boundary-leakage model considered in this paper, leakage of one end round key yields an instance of the equation Z=UF(U)Z=U\oplus F(U), whereas leakage of both end round keys yields a differential constraint of the form F(U)F(UΔ)=ΓF(U)\oplus F(U\oplus\Delta)=\Gamma, where Δ\Delta is determined by the two end indices and Γ\Gamma is derived from the two leaked round-key values. These reductions clarify the nonlinear systems induced by boundary leakage and the absence of a linear elimination route to the master key.

We also evaluate reduced variants of the resulting systems through Gr"obner basis experiments, and further examine them by SAT-based key-recovery experiments and right-censored runtime analysis via a Weibull AFT model. Within the tested range, we do not observe degree collapse or unusually strong linear bias. These results provide heuristic support for the view that, under the boundary-leakage model considered here, the tested instantiations of the proposed key-schedule family do not admit an obvious efficient inversion route.