NTT Technical Review, February 2006, Vol. 4, No. 2

Total Page:16

File Type:pdf, Size:1020Kb

NTT Technical Review, February 2006, Vol. 4, No. 2 Special Feature Promoting the Use of Camellia Masayuki Kanda† Abstract Camellia, a 128-bit block cipher developed jointly by NTT and Mitsubishi Electric Corporation, is an encryption algorithm with the world’s highest level of security and performance. It has been selected as an ISO/IEC international standard cipher and an Internet standard cipher. This report provides an overview of Camellia and describes NTT’s efforts to promote its use. 1. Camellia: Japan’s representative cipher speed software implementations (shown in blue), Mitsubishi Electric’s world-renowned know-how on Recognizing that cryptographic technology has designing ciphers for compact and high-speed hard- become an important foundation of the information ware implementations (red), and world-class cipher- society, a worldwide movement is taking place to security evaluation techniques*2 developed by both select secure encryption algorithms as standard and companies (yellow). Camellia uses a message-block recommended ciphers based on strict evaluations per- length of 128 bits and supports secret keys of three formed by cryptographic researchers. Camellia has different lengths: 128, 192, and 256 bits. been recognized as the only cipher in the world hav- It has been proven mathematically that Camellia is ing security and processing performance levels secure against differential and linear cryptanalysis, equivalent to AES (Advanced Encryption Standard), which are known to be strong attacks against block the standard cipher of the United States government. ciphers. It has also been shown that Camellia is Like AES, Camellia has been selected as a next-gen- secure against other attacks. In addition, no obvious eration international standard cipher by various stan- vulnerabilities have been found to date in numerous dardization organizations and projects. Camellia is third-party evaluations conducted by cryptographic expected to be used on the international level as researchers throughout the world. Therefore, Camel- Japan’s representative cipher. lia’s expected security level in future (security mar- This article provides an overview of Camellia, dis- gin) is in the world’s top class. Camellia is expected cusses the significance of its selection by standard- to be more resistant to future unknown attacks than ization organizations and projects, and describes how AES. NTT is working to promote the use of Camellia now Another feature of Camellia is its excellent utility and in the future. in diverse applications. Unlike AES, Camellia uses the same structure for encryption and decryption, 2. Overview of Camellia which enables it to exhibit superior performance in Camellia is a 128-bit block cipher*1 developed *1 Block cipher: A block cipher, which encrypts data in fixed-length jointly by NTT and Mitsubishi Electric Corporation blocks, is a symmetric key encryption algorithm that uses the same [1], [2]. As shown in Fig. 1, its design combines secret key to encrypt and decrypt data. Since it achieves high- NTT’s know-how on designing ciphers for high- speed encryption processing, it is used widely in various applica- tions such as communication sessions that deal with large-volume data, file encryption, and mobile terminal authentication. † NTT Information Sharing Platform Laboratories *2 Cipher-security evaluation techniques: Methods of expressing an Yokosuka-shi, 239-0847 Japan index of immunity against cryptanalytic attacks, e.g., differential E-mail: [email protected] cryptanalysis and linear cryptanalysis. Vol. 4 No. 2 Feb. 2006 49 Special Feature Subkey Secret key S : substitution table (128, 192, or 256 bits) Plaintext (128 bits) Round function i S1 Round function S4 Primary converter Round function S3 Linear S2 transformation Secondary converter Round function S by exclusive 4 OR Primary S3 converter Round function Intermediate key S2 Secondary converter Round function S1 Rotation & choice section Primary Intermediate-key generator converter Subkey –1 Security evaluation FL FL Subkey technique Ciphertext (128 bits) Subkey Fig. 1. Design of Camellia. Entering/leaving control Gbit/s-class hardware implementations system; traffic-control system About 45 kilo-gates (KGs) at 2 Gbit/s (0.18-µm application-specific integrated circuit (ASIC)) About 9.5K slices at 400 Mbit/s (field programmable Enables high-speed and compact implementations Encrypted router; gate array (FPGA)) (key length: 128 bits) for both smartcards having little onboard memory High-speed software implementations Smartcard and small-scale central processing units (CPUs) authentication High-speed processing of requests from many clients having low processing power RAM: about 60 B; server ROM: 1.5 KB or less Processing time: about 2 ms (at 15 MHz) (key length: 128 bits; data size: 128 bits) Encrypted file management system Authentication Encrypted communication path system Internet services Hard-disk drive Protection of portable media High-speed software implementations capable of encrypting High-efficiency/compact hardware implementations high-definition television (HDTV)-grade video streaming capable of low power consumption and low-cost About 500 Mbit/s (on Pentium III, 1.3 GHz) production Cellular µ (key length: 128 bits; assembler language) About 8 KGs at 200 Mbps (0.18- m ASIC) phones About 2K slices at 250 Mbps (FPGA) Web services Cryptographic library (key length: 128 bits) Videoconferencing systems; Hardware digital rights management (DRM) systems * Performance values are best values. Fig. 2. Camellia’s high-efficiency processing. smartcards that have a little onboard memory and in achieve high-speed processing in hardware imple- other compact hardware devices. Specifically, mentations. Camellia can be used to achieve high-speed encryp- Moreover, it can be used to construct the world’s tion processing on a variety of platforms from low- smallest implementation of a 128-bit block cipher cost smartcards to personal computers and server sys- (with a circuit scale under 8000 gates) with a pro- tems by using software implementations that use cessing efficiency at the highest level in this class. As instruction sets and ROM/RAM (read-only memory, shown in Fig. 2, Camellia achieves high-efficiency random access memory) sizes applicable to the appli- processing by flexibly adapting the implementation cation environments in question. In this way, Camel- to the application and circumstances. Camellia is the lia has been shown to achieve processing speeds from best choice in these typical software implementations four to five times faster than Triple DES and at least and two hardware implementations, which have dif- twice as fast as FEAL-32X. It can also be used to ferent priorities for performance, memory, and cost. 50 NTT Technical Review Special Feature 3. Camellia’s inclusion among standard and ing performance as AES, Camellia has joined AES recommended ciphers on the lists of various standard and recommended ciphers, as shown in Fig. 3. Its selection as an Besides international cryptography societies, NTT ISO/IEC international standard cipher and Internet has submitted proposals for using Camellia to the standard cipher is especially significant [5]. European Union’s project for selecting recommended ciphers (NESSIE: New European Schemes for Signa- 3.1 ISO/IEC international standard cipher tures, Integrity, and Encryption) and Japan’s project Based on the results of evaluations conducted in a for selecting recommended ciphers for e-government similar manner to those of NESSIE and CRYPTREC, (CRYPTREC: Cryptography Research and Evalua- ISO/IEC standardized a set of ciphers recognized tion Committees) [3]. In this way, NTT received thor- internationally as secure and efficient in the first for- ough and objective evaluations of Camellia from mal ISO/IEC international standard cipher (ISO/ researchers throughout the world over a period of IEC18033 series). Camellia, AES, and SEED (devel- several years. For example, the evaluation performed oped by Korea Information Security Agency (KISA)) at NESSIE determined that “Camellia has many sim- are the only 128-bit block ciphers included in ilarities to AES, so much of the analysis for AES is ISO/IEC18033-3 and are thus destined to become also applicable to Camellia. It is also the case that the next-generation standards. NESSIE project did not find an attack on either AES or Camellia.” For this reason, Camellia was the only 3.2 Internet standard ciphers 128-bit block cipher selected as an EU recommended The only ciphers that can be formally used on the cipher out of ten submitted ciphers [4]. Internet are those that have been selected by IETF Furthermore, as the only 128-bit block cipher in the (Internet Engineering Task Force) as Internet stan- world having the same level of security and process- dard ciphers. As a result, protocols for secure com- Standardization organization Type of standardized ciphers Japanese block ciphers Overseas block ciphers Camellia AES NESSIE EU recommended ciphers MISTY 1 — — SHACAL-2 Camellia, Cipherunicorn-A, AES Recommended ciphers for Hierocrypt-3, SC2000 CRYPTREC e-government in Japan Cipherunicorn-E, Hierocrypt-L1, MISTY 1 3-key Triple DES ISO/IEC international Camellia AES, SEED ISO/IEC standard ciphers MISTY 1 Triple DES, CAST-128 (ISO/IEC18033-3) Camellia (RFC4132) AES, SEED SSL/TLS standard ciphers Japanese first — Triple DES, IDEA, RC2 Camellia (RFC4051) AES XML standard ciphers — Triple DES Camellia (RFC3657) AES, SEED IETF S/MIME standard ciphers Triple DES, CAST-128, IDEA, — RC2, RC5 Camellia (RFC4312)
Recommended publications
  • 25 Years of Linear Cryptanalysis -Early History and Path Search Algorithm
    25 Years of Linear Cryptanalysis -Early History and Path Search Algorithm- Asiacrypt 2018, December 3 2018 Mitsuru Matsui © Mitsubishi Electric Corporation Back to 1990… 2 © Mitsubishi Electric Corporation FEAL (Fast data Encipherment ALgorithm) • Designed by Miyaguchi and Shimizu (NTT). • 64-bit block cipher family with the Feistel structure. • 4 rounds (1987) • 8 rounds (1988) • N rounds(1990) N=32 recommended • Key size is 64 bits (later extended to 128 bits). • Optimized for 8-bit microprocessors (no lookup tables). • First commercially successful cipher in Japan. • Inspired many new ideas, including linear cryptanalysis. 3 © Mitsubishi Electric Corporation FEAL-NX Algorithm [Miyaguchi 90] subkey 4 © Mitsubishi Electric Corporation The Round Function of FEAL 2-byte subkey Linear Relations 푌 2 = 푋1 0 ⊕ 푋2 0 푌 2 = 푋1 0 ⊕ 푋2 0 ⊕ 1 (푁표푡푎푡푖표푛: 푌 푖 = 푖-푡ℎ 푏푖푡 표푓 푌) 5 © Mitsubishi Electric Corporation Linear Relations of the Round Function Linear Relations 푂 16,26 ⊕ 퐼 24 = 퐾 24 K 푂 18 ⊕ 퐼 0,8,16,24 = 퐾 8,16 ⊕ 1 푂 10,16 ⊕ 퐼 0,8 = 퐾 8 S 0 푂 2,8 ⊕ 퐼 0 = 퐾 0 ⊕ 1 (푁표푡푎푡푖표푛: 퐴 푖, 푗, 푘 = 퐴 푖 ⊕ 퐴 푗 ⊕ 퐴 푘 ) S1 O I f S0 f 3-round linear relations with p=1 S1 f modified round function f at least 3 subkey (with whitening key) f bytes affect output6 6 © Mitsubishi Electric Corporation History of Cryptanalysis of FEAL • 4-round version – 100-10000 chosen plaintexts [Boer 88] – 20 chosen plaintexts [Murphy 90] – 8 chosen plaintexts [Biham, Shamir 91] differential – 200 known plaintexts [Tardy-Corfdir, Gilbert 91] – 5 known plaintexts [Matsui, Yamagishi
    [Show full text]
  • Camellia: a 128-Bit Block Cipher Suitable for Multiple Platforms
    gopyright x nd witsuishi iletri gorp ortion PHHHEPHHI g mel l iX e IPVEfit flo k gipher uitle for wultiple ltforms y z y uzumro eoki etsuyshikw wsyuki und z y z z witsuru wtsui hiho worii tunkoxkjim oshio okit y xipp on elegrph nd elephone gorp ortion IEI rikrino okD okosukD ungwD PQWEHVRU tpn fmroDkndDshihogdislFnttFoFjp z witsuishi iletri gorp ortion SEIEI yfunD umkurD ungwD PRUEVSHI tpn fihikwDmtsuiDjuneISDtokitgdissFislFmeloFoFjp er IFHX tuly IQD PHHH er PFHX eptemer PTD PHHI estrtF e present new IPVEit lo k ipher lled gmel liF gmelli supp orts IPVEit lo ksizend IPVED IWPED nd PSTEit keysD iFeF the sme interfe sp eitions s the edvned inryption tndrd @eiAF iieny on oth softE wre nd hrdwre pltforms is remrkle hrteristi of gmelli in ddition to its high level of seurityF st is onrmed tht gmelli provides strong seurity ginst dierentil nd liner ryptnlysisF gompred to the ei nlistsD iFeF weD gTD ijndelD erp entD nd woshD gmelli oers t lest omprle enryption sp eed in softwre nd hrdwreF en optimized implementtion of gmelE li in ssemly lnguge n enrypt on entiums s s @IFIQqrzA t the rte of RUI wits p er seondF sn dditionD distinguishing feture is its smll hrdwre designF e hrdwre implementtionD whih inludes enryptionD deryptionD nd the key shedule for IPVEit keysD o upies only VFIPu gtes using HFIV"m gwy esg lirryF his is in the smllest lss mong ll existing IPVEit lo k iphersF gopyright x nd witsuishi iletri gorp ortion PHHHEPHHI gontents I sntro dution I P hesign tionle Q PFI p Efuntion X X X X X X X X X X X X X X X X X X X X X X X X X
    [Show full text]
  • Advanced Encryption Standard Real-World Alternatives
    Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives CPSC 367: Cryptography and Security Michael Fischer Lecture 7 February 5, 2019 Thanks to Ewa Syta for the slides on AES CPSC 367, Lecture 7 1/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Multiple Encryption Composition Group property Birthday Attack Advanced Encryption Standard AES Real-World Issues Alternative Private Key Block Ciphers CPSC 367, Lecture 7 2/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Multiple Encryption CPSC 367, Lecture 7 3/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Composition of cryptosystems Encrypting a message multiple times with the same or different ciphers and keys seems to make the cipher stronger, but that's not always the case. The security of the composition can be difficult to analyze. For example, with the one-time pad, the encryption and decryption functions Ek and Dk are the same. The composition Ek ◦ Ek is the identity function! CPSC 367, Lecture 7 4/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Composition within practical cryptosystems Practical symmetric cryptosystems such as DES and AES are built as a composition of simpler systems. Each component offers little security by itself, but when composed, the layers obscure the message to the point that it is difficult for an adversary to recover. The trick is to find ciphers that successfully hide useful information from a would-be attacker when used in concert. CPSC 367, Lecture 7 5/58 Outline Multiple Encryption Birthday Attack Advanced Encryption Standard Real-World Alternatives Composition Double Encryption Double encryption is when a cryptosystem is composed with itself.
    [Show full text]
  • Implementations of Block Cipher SEED on Smartphone Operating Systems
    SECURWARE 2011 : The Fifth International Conference on Emerging Security Information, Systems and Technologies Implementations of Block Cipher SEED on Smartphone Operating Systems HwanJin Lee, DongHoon Shin, and Hyun-Chul Jung Security R&D Team Korea Internet & Security Agency (KISA) Seoul, Korea {lhj79, dhshin, hcjung}@kisa.or.kr Abstract—As more and more people are using smartphones limited power and offers inferior performance compared to a these days, a great deal of important information, such as PC. Therefore, it is difficult to use an open cryptographic personal information and the important documents of library such as OpenSSL, which is designed for the PC corporations among other things, are being saved on environment, in a smartphone. We need to study on the way smartphones. Unlike a PC, people can access another person’s for the effective use of SEED in smartphone. smartphone without great difficulty, and there is a high This paper presents the results of implementing the block possibility of losing one’s smartphone. If smartphone is lost cipher SEED to a smartphone. The results of a comparison without encryption, important information can be exploited. In with open cryptographic libraries (OpenSSL, BouncyCastle) addition, the open cryptographic library for PCs cannot be will also be presented. The SEED is a block cipher used due to the limited performance of the smartphone. This established as an international standard ISO/IEC and the paper introduces the optimization implementation technique for the smartphone OS and the results of using that technique. Korean standard. Section 2 introduces the SEED and open In addition, the results of a speed comparison with the open cryptographic libraries; Section 3 introduces smartphone cryptographic library will be presented.
    [Show full text]
  • Zero Correlation Linear Cryptanalysis on LEA Family Ciphers
    Journal of Communications Vol. 11, No. 7, July 2016 Zero Correlation Linear Cryptanalysis on LEA Family Ciphers Kai Zhang, Jie Guan, and Bin Hu Information Science and Technology Institute, Zhengzhou 450000, China Email: [email protected]; [email protected]; [email protected] Abstract—In recent two years, zero correlation linear Zero correlation linear cryptanalysis was firstly cryptanalysis has shown its great potential in cryptanalysis and proposed by Andrey Bogdanov and Vicent Rijmen in it has proven to be effective against massive ciphers. LEA is a 2011 [2], [3]. Generally speaking, this cryptanalytic block cipher proposed by Deukjo Hong, who is the designer of method can be concluded as “use linear approximation of an ISO standard block cipher - HIGHT. This paper evaluates the probability 1/2 to eliminate the wrong key candidates”. security level on LEA family ciphers against zero correlation linear cryptanalysis. Firstly, we identify some 9-round zero However, in this basic model of zero correlation linear correlation linear hulls for LEA. Accordingly, we propose a cryptanalysis, the data complexity is about half of the full distinguishing attack on all variants of 9-round LEA family code book. The high data complexity greatly limits the ciphers. Then we propose the first zero correlation linear application of this new method. In FSE 2012, multiple cryptanalysis on 13-round LEA-192 and 14-round LEA-256. zero correlation linear cryptanalysis [4] was proposed For 13-round LEA-192, we propose a key recovery attack with which use multiple zero correlation linear approximations time complexity of 2131.30 13-round LEA encryptions, data to reduce the data complexity.
    [Show full text]
  • Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly ∗
    Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly ∗ Brian Rogers, Siddhartha Chhabra, Yan Solihin Milos Prvulovic Dept. of Electrical and Computer Engineering College of Computing North Carolina State University Georgia Institute of Technology {bmrogers, schhabr, solihin}@ncsu.edu [email protected] Abstract and feasible threat is physical or hardware attacks which involve placing a bus analyzer that snoops data communicated between the In today’s digital world, computer security issues have become processor chip and other chips [7, 8]. Although physical attacks increasingly important. In particular, researchers have proposed may be more difficult to perform than software-based attacks, they designs for secure processors which utilize hardware-based mem- are very powerful as they can bypass any software security protec- ory encryption and integrity verification to protect the privacy and tion employed in the system. The proliferation of mod-chips that integrity of computation even from sophisticated physical attacks. bypass Digital Rights Management protection in game systems has However, currently proposed schemes remain hampered by prob- demonstrated that given sufficient financial payoffs, physical attacks lems that make them impractical for use in today’s computer sys- are very realistic threats. tems: lack of virtual memory and Inter-Process Communication Recognizing these threats, computer architecture researchers support as well as excessive storage and performance overheads. have recently proposed various types of secure processor architec- In this paper, we propose 1) Address Independent Seed Encryption tures [4, 5, 13, 14, 16, 17, 18, 19, 20, 22, 23, 24, 25, 26]. Secure pro- (AISE), a counter-mode based memory encryption scheme using a cessors assume that off-chip communication is vulnerable to attack novel seed composition, and 2) Bonsai Merkle Trees (BMT), a novel and that the chip boundary provides a natural security boundary.
    [Show full text]
  • Camellia: a 128-Bit Block Cipher Suitable for Multiple Platforms
    Copyright NTT and Mitsubishi Electric Corporation 2000 Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms † ‡ † Kazumaro Aoki Tetsuya Ichikawa Masayuki Kanda ‡ † ‡ ‡ Mitsuru Matsui Shiho Moriai Junko Nakajima Toshio Tokita † Nippon Telegraph and Telephone Corporation 1-1 Hikarinooka, Yokosuka, Kanagawa, 239-0847 Japan {maro,kanda,shiho}@isl.ntt.co.jp ‡ Mitsubishi Electric Corporation 5-1-1 Ofuna, Kamakura, Kanagawa, 247-8501 Japan {ichikawa,matsui,june15,tokita}@iss.isl.melco.co.jp September 26, 2000 Abstract. We present a new 128-bit block cipher called Camellia. Camellia sup- ports 128-bit block size and 128-, 192-, and 256-bit key lengths, i.e. the same interface specifications as the Advanced Encryption Standard (AES). Camellia was carefully designed to withstand all known cryptanalytic attacks and even to have a sufficiently large security leeway for use of the next 10-20 years. There are no hidden weakness inserted by the designers. It was also designed to have suitability for both software and hardware implementations and to cover all possible encryption applications that range from low-cost smart cards to high-speed network systems. Compared to the AES finalists, Camellia offers at least comparable encryption speed in software and hardware. An optimized implementation of Camellia in assembly language can en- crypt on a PentiumIII (800MHz) at the rate of more than 276 Mbits per second, which is much faster than the speed of an optimized DES implementation. In ad- dition, a distinguishing feature is its small hardware design. The hardware design, which includes key schedule, encryption and decryption, occupies approximately 11K gates, which is the smallest among all existing 128-bit block ciphers as far as we know.
    [Show full text]
  • FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 NSS
    FIPS 140-2 Non-Proprietary Security Policy Oracle Linux 7 NSS Cryptographic Module FIPS 140-2 Level 1 Validation Software Version: R7-4.0.0 Date: January 22nd, 2020 Document Version 2.3 © Oracle Corporation This document may be reproduced whole and intact including the Copyright notice. Title: Oracle Linux 7 NSS Cryptographic Module Security Policy Date: January 22nd, 2020 Author: Oracle Security Evaluations – Global Product Security Contributing Authors: Oracle Linux Engineering Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Worldwide Inquiries: Phone: +1.650.506.7000 Fax: +1.650.506.7200 oracle.com Copyright © 2020, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. Oracle specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may reproduced or distributed whole and intact including this copyright notice. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Oracle Linux 7 NSS Cryptographic Module Security Policy i TABLE OF CONTENTS Section Title
    [Show full text]
  • Internet Engineering Task Force (IETF) S. Kanno Request for Comments: 6367 NTT Software Corporation Category: Informational M
    Internet Engineering Task Force (IETF) S. Kanno Request for Comments: 6367 NTT Software Corporation Category: Informational M. Kanda ISSN: 2070-1721 NTT September 2011 Addition of the Camellia Cipher Suites to Transport Layer Security (TLS) Abstract This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6367. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
    Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT Jorge Nakahara Jr1, Pouyan Sepehrdad1, Bingsheng Zhang2, Meiqin Wang3 1EPFL, Lausanne, Switzerland 2Cybernetica AS, Estonia and University of Tartu, Estonia 3Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, China Estonian Theory Days, 2-4.10.2009 Outline Why cryptanalysis?! Outline Outline Contributions The PRESENT Block Cipher Revisited Algebraic Cryptanalysis of PRESENT Linear Cryptanalysis of PRESENT Linear Hulls of PRESENT Conclusions Acknowledgements Outline Outline Contributions we performed linear analysis of reduced-round PRESENT exploiting fixed-points (and other symmetries) of pLayer exploiting low Hamming Weight bitmasks using iterative linear relations first linear hull analysis of PRESENT: 1st and 2nd best trails known-plaintext and ciphertext-only attack settings revisited algebraic analysis of 5-round PRESENT in less than 3 min best attacks on up to 26-round PRESENT (out of 31 rounds) Outline Outline The PRESENT Block Cipher block cipher designed by Bogdanov et al. at CHES’07 aimed at RFID tags, sensor networks (hardware environments) SPN structure 64-bit block size, 80- or 128-bit key size, 31 rounds one full round: xor with round subkey, S-box layer, bit permutation (pLayer) key schedule: 61-bit left rotation, S-box application, and xor with counter Outline Outline The PRESENT Block Cipher Computational graph of one full round of PRESENT Outline Outline Previous attack complexities on reduced-round
    [Show full text]
  • Security Analysis of an Encryption Scheme Based on Nonpositional Polynomial Notations
    Open Eng. 2016; 6:250–258 Research Article Open Access Nursulu Kapalova* and Dilmukhanbet Dyusenbayev Security analysis of an encryption scheme based on nonpositional polynomial notations DOI 10.1515/eng-2016-0034 unique providing that bases are pairwise relatively prime. Received May 05, 2016; accepted Jun 28, 2016 As distinct from classical RNSs, irreducible polynomials over GF(2) that is binary polynomials serve as bases in Abstract: The aim of the research was to conduct a cryp- NPNs [1–6]. tographic analysis of an encryption scheme developed Based on NPNs, nonconventional algorithms for en- on the basis of nonpositional polynomial notations to cryption, digital signatures and cryptographic key ex- estimate the algorithm strength. Nonpositional polyno- change have been developed [3, 7–9]. This paper is con- mial notations (NPNs) are residue number systems (RNSs) cerned with an investigation of the strength of a noncon- based on irreducible polynomials over GF(2). To evalu- ventional encryption scheme against cryptanalysis. The ate if the algorithms developed on the basis of NPNs are core of the algorithm under study is as follows. secure, mathematical models of cryptanalysis involving algebraic, linear and differential methods have been de- 1. First of all, an NPN is formed with its working bases signed. The cryptanalysis is as follows. A system of non- consisting of chosen irreducible polynomials linear equations is obtained from a function transforming p x p x ... p x plaintext into ciphertext with a key. Next, a possibility of 1( ), 2( ), , S( ) (1) transition of the nonlinear system to a linear one is consid- over GF(2) of degrees m1, m2, ..
    [Show full text]
  • Preliminary Analysis: SEED’S First Year
    SEED Findings Summary stocktondemonstration.org Preliminary Analysis: SEED’s First Year AUTHORS: CONTRIBUTING RESEARCHERS: Dr. Stacia West, Mina Addo, Mae Carlson, Dr. Amy Castro Baker, Conway Homes Residents Council, Sukhi Samra, Pandora Crowder, Meagan Cusack, Stacy Elliott, Erin Coltrera Daniel Horn, Jenna Steckel, Tooma Zaghloul Preliminary Analysis: SEED's First Year Executive Summary “ Poverty is the biggest issue. Everything we deal with stems from that. There’s so many people working incredibly hard, and if life happens, there’s no bottom. “ —Michael D. Tubbs The Stockton Economic Empowerment Key Findings Include: Demonstration, or SEED, was the nation’s • Guaranteed income reduced income volatility, first mayor-led guaranteed income initiative. or the month-to-month income fluctuations Launched in February 2019 by former Mayor that households face. Michael D. Tubbs, SEED gave 125 Stocktonians $500 per month for 24 months. The cash was • Unconditional cash enabled recipients unconditional, with no strings attached and no to find full-time employment. work requirements. • Recipients of guaranteed income were This Randomized Control Trial (RCT) pilot is being healthier, showing less depression and anxiety evaluated by a team of independent researchers, and enhanced wellbeing. Dr. Stacia West of the University of Tennessee • The guaranteed income alleviated financial and Dr. Amy Castro Baker of the University of scarcity creating new opportunities for Pennsylvania, and funded by the Evidence for self-determination, choice, goal-setting, Action Program at the Robert Wood Johnson and risk-taking. Foundation. SEED sought to confront, address, and humanize Our primary research questions are the following: some of the most pressing and pernicious How does guaranteed income impact problems our country faces: inequality, income income volatility? How do changes in income volatility, and poverty.
    [Show full text]