Research Article

SAT-Based Security Evaluation for WARP against Linear Cryptanalysis

Algorithm 1

The SAT model for searching the linear trails with optimal correlation/lower bound for the number of active Sboxes of WARP
Input:-round, predefined threshold of the correlation (the number of active Sboxes ),
   ().
Output: If (), return a linear trail with optimal correlation (lower bound for the number of active Sboxes).
1: /Step 1: Construct the SAT model./
2: For to do
3:  For to 32 do
4:   Add the constraints in Equation (4) to describe the mask propagations of three-fork branching.
5:   If :
6:    If :
7:      Add the constraints in Table 6 to describe the mask propagations of Sbox with correlations.
8:    If :
9:     Add the constraints in Table 7 to describe the mask propagations of the activeness of Sbox.
10:    Add the constaints in Equation (5) to describe the mask propagations of XOR operation and operation.
11: / Step 2: Find a linear trail./
12: If then
13:  , set the objective function to Equation (9).
14: If then
15:  , set the objective function to Equation (8).
16: For to do
17:  Add the constraints to describe the objective function.
18:  Invoke the solver to solve the model.
19:  If solver finds a solution then
20:   Return the -round linear trail.
21:  Else
22:   .