Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack

Total Page:16

File Type:pdf, Size:1020Kb

Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack International Journal of Network Security, Vol.20, No.5, PP.890-897, Sept. 2018 (DOI: 10.6633/IJNS.201809 20(5).10) 890 Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack Raja Muthalagu and Subeen Jain (Corresponding author: Raja Muthalagu) Department of Electrical and Electronic Engineering, Birla Institute of Technology and Science, Pilani 345055 Dubai International Academic City, Dubai, United Arab Emirates (Email: [email protected]) (Received July 2, 2017; revised and accepted Oct. 22 & Nov. 5, 2017) Abstract to provide end-to-end secure transmission of data among various users. It poses a challenge for designers to design In this paper, modifications in the original KASUMI block highly secure and attack-resistant algorithm for encryp- cipher is proposed by introducing a finite-state machine tion of data. (FSM) and substitution box (S- box) to provide better The KASUMI block cipher is used for providing en- confidentiality and integrity function in global system for cryption services in mobile networks like GSM, universal mobile communications (GSM) and 3G networks. The mobile telecommunications system (UMTS) and general FSM constitute the nonlinear combiner of SNOW 3G packet radio service (GPRS). In UMTS, KASUMI is used block cipher and it uses two S-box to provide strong dif- in the confidentiality (f8) and integrity algorithms (f9) fusion. The addition of FSM in KASUMI is introducing with names UEA1 and UIA1, respectively. In GSM, KA- the non-linearity in output bits and it will increase the SUMI is used in the A5/3 key stream generator and in complexity for an attacker to make an attack. Also, few GPRS in the GEA3 key stream generator. The KASUMI changes are made in a KI and KL keys that are used in is evolved from MISTY1 algorithm to provide users safe a different rounds of KASUMI to prevent various attacks and secure way for exchange of data. The KASUMI is a such as a rectangle attack, sandwich attack, single key slightly modified version of MISTY1. And it provides easy attack, etc. The simulation results show the performance hardware implementation that meets security require- improvement of the proposed modified KASUMI design is ment of 3G mobile communications. In [3, 4, 11, 12, 14] compared with the conventional KASUMI in terms both attacks related to KASUMI were discussed which indicate the encryption speed and encryption time taken. that KASUMI is weak algorithm. Though these attacks Keywords: Finite-state Machine (FSM); KASUMI; S- were very powerful and posed a threat on it, they were not box; SNOW-3G considered due to impractical assumptions made as sug- gested in [11] by 3GPP society and thus, inapplicable to real-life attack on full KASUMI. But as there are chances 1 Introduction of these or other attacks related to them being carried out practically, new algorithms are designed and worked The rapid growth of mobile communications has increased upon to provide high confidentiality and security of data. the requirement of having secure network/communication The experimental study of the obtained encryptor from between the users. Multiple ways of attacking or hacking various researchers are demonstrated its effectiveness in a network are used by attackers. As the wireless mode of protecting from many existing types of attacks aimed at communications provides feasibility and ease to the users, block cipher algorithms [13]. Also Reference [10] present a the security of information being exchanged within two new concept called a certificateless key insulated encryp- users or group of users is always at threat. Many algo- tion scheme (CL-KIE). rithms have been proposed which are used for different In this paper, it proposed the modified KASUMI block encryption purposes [5, 6, 16]. Some have proved resis- cipher to improve its resistance against attack. The tant towards attacks while some have high security issues SNOW-3G block cipher is a another encryption algo- with them and hence, proved as weaker one by attack- rithm for mobile networks and the concept of SNOW-3G ers. For having secure network, encryption services and is widely used in our proposed method. The SNOW-3G algorithms involved need to be robust and secure enough is used as UEA2 and UIA2 algorithm for providing con- International Journal of Network Security, Vol.20, No.5, PP.890-897, Sept. 2018 (DOI: 10.6633/IJNS.201809 20(5).10) 891 L R fidentiality and integrity in 3rd Generation Partnership 0 64 0 32 16 Project (3GPP) [7, 8]. It is seen as strong enough for car- 32 32 16 16 9 7 KL KO , KI KO rying any attack as it has Rijndael's SR box and SQ box 1 1 1 i,1 S9 KI and LFSR. It also uses three 32-bit registers R1, R2, R3 FL1 FO1 FIi1 i,1 zero-extend and 16 s-boxes and each having capacity to hold 32-bits. KO 2, KI 2 KL 2 S7 As suggested in [9] inclusion of R3 had increased resis- KO i,2 FO2 FL2 truncate tance of SNOW-3G towards algebraic attacks along with FIi2 KI i,2 KI KI use of two S-box, and it can be used strengthen the pro- i,j,1 i,j,2 KL KO , KI posed modified KASUMI. The FSM is known to provide 3 3 3 FL3 FO3 KO resistance towards differential and linear attack and, alge- i,3 S9 KI zero-extend braic attack as it uses S and S 32-bit boxes along with FIi3 i,3 1 2 KO 4, KI 4 KL 4 three registers R1, R2, and R3. The proposed KASUMI FO4 FL4 is using a part of SNOW-3G security module which are S7 FSM machine and two S-boxes. We have taken into use truncate KL KO , KI three 32-bit Shift Registers two of them providing input 5 5 5 to FSM. Besides introducing SNOW-3G, small change in FL5 FO5 KL keys of 1st and 8th round as well as change in KI keys Fig.2: FO Function Fig.3: FI Function KO 6, KI 6 KL 6 is also made which is discussed in further section of paper. 32 FO6 FL6 This paper is organized in following way: Section 2 16 16 KL gives briefly an overview of KASUMI. Different functions i,1 KL 7 KO 7, KI 7 and keys used in each rounds for their respective func- FL7 FO7 KL tions are described. Section 3 contains brief descrip- i,2 tion of SNOW-3G and describes about its two modules KO 8, KI 8 KL 8 LFSR and, FSM. Functioning of initialization and key- FO8 FL8 stream mode for generation of key-stream is also dis- cussed. Section 4 discusses about our proposed work re- bitwise AND operation bitwise OR operation lated to changes in KASUMI. Section 5 provides results of L8 R8 one bit left rotation our work done. Finally conclusions are given in Section 6. C Throughout this paper, ⊕ stands for EX-OR operation, Fig. 1: KASUMI Fig.4: FL Function k stands for Concatenation operation and is addition modulo 223. Figure 1: The original KASUMI algorithm, FO, FI and FL functions. 2 Overview of KASUMI KASUMI is modified form of cipher algorithm MISTY1. It is Fiestel network of 8-rounds taking input of 64-bit Input is divided in two 16-bit values, L (left) and R and giving output of 64-bit by using 128-bit key for each (right) as given below: round. Functions of KASUMI are FI, FO and FL func- 0 tions performed by them are completely different from R = R ⊕ ROL(L \ KLi;1) 0 each other and they use key values for doing their oper- L = L ⊕ ROL(R \ KLi;2) ations. The key values are KI for FI function, KO for 0 0 FO function and, KL for FL function for all 8 rounds. R and L are each 16-bit values obtained after performing Figure 1 provides Fiestel structure of 8-round KASUMI operations on R and L. These values obtained are then algorithm [2]. For odd numbered rounds, function FL concatenated to make 32-bit output. comes before FO, FI functions while in even numbered rounds, FO, FI comes before FL function. Brief descrip- tion of three functions of algorithm is given below along 2.2 FO Function with key-value operations done in them. This function has three rounds of operation as shown in Figure 1. It first takes 32-bit input, divides it in two 2.1 FL Function equal 16-bit values and, performs operation on it using This function has two rounds of operation as shown in 48-bit key KO and, another 48-bit sub-key KI used in FI Figure 1 It takes 32-bit input and performs operation on function. Figure for FO function is shown in Figure 1. it using 32-bit key, KL, to produce 32-bit output. Key, The 48-bit sub-keys are subdivided into three 16-bit sub- KL, is divided in two 16-bit values for each of the two keys where: rounds as shown below: KOi = KOi;1kKOi;2kKOi;3 KLi = KLi;1kKLi;2 KIi = KIi;1kKIi;2kKIi;3 International Journal of Network Security, Vol.20, No.5, PP.890-897, Sept. 2018 (DOI: 10.6633/IJNS.201809 20(5).10) 892 For each integer j (number of rounds within FO) with 1 ≤ j ≤ 3, Rj and Lj are given as: -1 s15 s11 s5 s2 s1 s0 Rj = FI(Lj−1 ⊕ KOi;j; KIi;j) ⊕ Rj−1 FSM Lj = Rj−1 ⊞ We then, return the 32-bit concatenated value obtained S1 S2 R1 R2 R3 (L3kR3) after completion of FO function.
Recommended publications
  • Improved Related-Key Attacks on DESX and DESX+
    Improved Related-key Attacks on DESX and DESX+ Raphael C.-W. Phan1 and Adi Shamir3 1 Laboratoire de s´ecurit´eet de cryptographie (LASEC), Ecole Polytechnique F´ed´erale de Lausanne (EPFL), CH-1015 Lausanne, Switzerland [email protected] 2 Faculty of Mathematics & Computer Science, The Weizmann Institute of Science, Rehovot 76100, Israel [email protected] Abstract. In this paper, we present improved related-key attacks on the original DESX, and DESX+, a variant of the DESX with its pre- and post-whitening XOR operations replaced with addition modulo 264. Compared to previous results, our attack on DESX has reduced text complexity, while our best attack on DESX+ eliminates the memory requirements at the same processing complexity. Keywords: DESX, DESX+, related-key attack, fault attack. 1 Introduction Due to the DES’ small key length of 56 bits, variants of the DES under multiple encryption have been considered, including double-DES under one or two 56-bit key(s), and triple-DES under two or three 56-bit keys. Another popular variant based on the DES is the DESX [15], where the basic keylength of single DES is extended to 120 bits by wrapping this DES with two outer pre- and post-whitening keys of 64 bits each. Also, the endorsement of single DES had been officially withdrawn by NIST in the summer of 2004 [19], due to its insecurity against exhaustive search. Future use of single DES is recommended only as a component of the triple-DES. This makes it more important to study the security of variants of single DES which increase the key length to avoid this attack.
    [Show full text]
  • Encryption Algorithm Trade Survey
    CCSDS Historical Document This document’s Historical status indicates that it is no longer current. It has either been replaced by a newer issue or withdrawn because it was deemed obsolete. Current CCSDS publications are maintained at the following location: http://public.ccsds.org/publications/ CCSDS HISTORICAL DOCUMENT Report Concerning Space Data System Standards ENCRYPTION ALGORITHM TRADE SURVEY INFORMATIONAL REPORT CCSDS 350.2-G-1 GREEN BOOK March 2008 CCSDS HISTORICAL DOCUMENT Report Concerning Space Data System Standards ENCRYPTION ALGORITHM TRADE SURVEY INFORMATIONAL REPORT CCSDS 350.2-G-1 GREEN BOOK March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT CONCERNING ENCRYPTION ALGORITHM TRADE SURVEY AUTHORITY Issue: Informational Report, Issue 1 Date: March 2008 Location: Washington, DC, USA This document has been approved for publication by the Management Council of the Consultative Committee for Space Data Systems (CCSDS) and reflects the consensus of technical panel experts from CCSDS Member Agencies. The procedure for review and authorization of CCSDS Reports is detailed in the Procedures Manual for the Consultative Committee for Space Data Systems. This document is published and maintained by: CCSDS Secretariat Space Communications and Navigation Office, 7L70 Space Operations Mission Directorate NASA Headquarters Washington, DC 20546-0001, USA CCSDS 350.2-G-1 i March 2008 CCSDS HISTORICAL DOCUMENT CCSDS REPORT CONCERNING ENCRYPTION ALGORITHM TRADE SURVEY FOREWORD Through the process of normal evolution, it is expected that expansion, deletion, or modification of this document may occur. This Recommended Standard is therefore subject to CCSDS document management and change control procedures, which are defined in the Procedures Manual for the Consultative Committee for Space Data Systems.
    [Show full text]
  • An Integrated Symmetric Key Cryptographic Method
    I.J.Modern Education and Computer Science, 2012, 5, 1-9 Published Online June 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.05.01 An Integrated Symmetric Key Cryptographic Method – Amalgamation of TTJSA Algorithm , Advanced Caesar Cipher Algorithm, Bit Rotation and Reversal Method: SJA Algorithm Somdip Dey Department of Computer Science, St. Xavier’s College [Autonomous], Kolkata, India. Email: [email protected] Joyshree Nath A.K. Chaudhuri School of IT, Calcutta University, Kolkata, India. Email: [email protected] Asoke Nath Department of Computer Science, St. Xavier’s College [Autonomous], Kolkata, India. Email: [email protected] Abstract—In this paper the authors present a new In banking system the data must be fully secured. Under integrated symmetric-key cryptographic method, named no circumstances the authentic data should go to hacker. SJA, which is the combination of advanced Caesar Cipher In defense the security of data is much more prominent. method, TTJSA method, Bit wise Rotation and Reversal The leakage of data in defense system can be highly fatal method. The encryption method consists of three basic and can cause too much destruction. Due to this security steps: 1) Encryption Technique using Advanced Caesar issue different cryptographic methods are used by Cipher, 2) Encryption Technique using TTJSA Algorithm, different organizations and government institutions to and 3) Encryption Technique using Bit wise Rotation and protect their data online. But, cryptography hackers are Reversal. TTJSA Algorithm, used in this method, is again always trying to break the cryptographic methods or a combination of generalized modified Vernam Cipher retrieve keys by different means.
    [Show full text]
  • Investigation of Some Cryptographic Properties of the 8X8 S-Boxes Created by Quasigroups
    Computer Science Journal of Moldova, vol.28, no.3(84), 2020 Investigation of Some Cryptographic Properties of the 8x8 S-boxes Created by Quasigroups Aleksandra Mileva, Aleksandra Stojanova, Duˇsan Bikov, Yunqing Xu Abstract We investigate several cryptographic properties in 8-bit S- boxes obtained by quasigroups of order 4 and 16 with several different algebraic constructions. Additionally, we offer a new construction of N-bit S-boxes by using different number of two layers – the layer of bijectional quasigroup string transformations, and the layer of modular addition with N-bit constants. The best produced 8-bit S-boxes so far are regular and have algebraic degree 7, nonlinearity 98 (linearity 60), differential uniformity 8, and autocorrelation 88. Additionally we obtained 8-bit S-boxes with nonlinearity 100 (linearity 56), differential uniformity 10, autocorrelation 88, and minimal algebraic degree 6. Relatively small set of performed experiments compared with the extremly large set of possible experiments suggests that these results can be improved in the future. Keywords: 8-bit S-boxes, nonlinearity, differential unifor- mity, autocorrelation. MSC 2010: 20N05, 94A60. 1 Introduction The main building blocks for obtaining confusion in all modern block ciphers are so called substitution boxes, or S-boxes. Usually, they work with much less data (for example, 4 or 8 bits) than the block size, so they need to be highly nonlinear. Two of the most successful attacks against modern block ciphers are linear cryptanalysis (introduced by ©2020 by CSJM; A. Mileva, A. Stojanova, D. Bikov, Y. Xu 346 Investigation of Some Cryptographic Properties of 8x8 S-boxes .
    [Show full text]
  • Optimization of Core Components of Block Ciphers Baptiste Lambin
    Optimization of core components of block ciphers Baptiste Lambin To cite this version: Baptiste Lambin. Optimization of core components of block ciphers. Cryptography and Security [cs.CR]. Université Rennes 1, 2019. English. NNT : 2019REN1S036. tel-02380098 HAL Id: tel-02380098 https://tel.archives-ouvertes.fr/tel-02380098 Submitted on 26 Nov 2019 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE DE DOCTORAT DE L’UNIVERSITE DE RENNES 1 COMUE UNIVERSITE BRETAGNE LOIRE Ecole Doctorale N°601 Mathématique et Sciences et Technologies de l’Information et de la Communication Spécialité : Informatique Par Baptiste LAMBIN Optimization of Core Components of Block Ciphers Thèse présentée et soutenue à RENNES, le 22/10/2019 Unité de recherche : IRISA Rapporteurs avant soutenance : Marine Minier, Professeur, LORIA, Université de Lorraine Jacques Patarin, Professeur, PRiSM, Université de Versailles Composition du jury : Examinateurs : Marine Minier, Professeur, LORIA, Université de Lorraine Jacques Patarin, Professeur, PRiSM, Université de Versailles Jean-Louis Lanet, INRIA Rennes Virginie Lallemand, Chargée de Recherche, LORIA, CNRS Jérémy Jean, ANSSI Dir. de thèse : Pierre-Alain Fouque, IRISA, Université de Rennes 1 Co-dir. de thèse : Patrick Derbez, IRISA, Université de Rennes 1 Remerciements Je tiens à remercier en premier lieu mes directeurs de thèse, Pierre-Alain et Patrick.
    [Show full text]
  • Security Evaluation of the K2 Stream Cipher
    Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 .
    [Show full text]
  • TS 135 202 V7.0.0 (2007-06) Technical Specification
    ETSI TS 135 202 V7.0.0 (2007-06) Technical Specification Universal Mobile Telecommunications System (UMTS); Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification (3GPP TS 35.202 version 7.0.0 Release 7) 3GPP TS 35.202 version 7.0.0 Release 7 1 ETSI TS 135 202 V7.0.0 (2007-06) Reference RTS/TSGS-0335202v700 Keywords SECURITY, UMTS ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1
    International Journal of Grid and Distributed Computing Vol. 10, No. 11 (2017), pp.79-98 http://dx.doi.org/10.14257/ijgdc.2017.10.11.08 Identifying Open Research Problems in Cryptography by Surveying Cryptographic Functions and Operations 1 Rahul Saha1, G. Geetha2, Gulshan Kumar3 and Hye-Jim Kim4 1,3School of Computer Science and Engineering, Lovely Professional University, Punjab, India 2Division of Research and Development, Lovely Professional University, Punjab, India 4Business Administration Research Institute, Sungshin W. University, 2 Bomun-ro 34da gil, Seongbuk-gu, Seoul, Republic of Korea Abstract Cryptography has always been a core component of security domain. Different security services such as confidentiality, integrity, availability, authentication, non-repudiation and access control, are provided by a number of cryptographic algorithms including block ciphers, stream ciphers and hash functions. Though the algorithms are public and cryptographic strength depends on the usage of the keys, the ciphertext analysis using different functions and operations used in the algorithms can lead to the path of revealing a key completely or partially. It is hard to find any survey till date which identifies different operations and functions used in cryptography. In this paper, we have categorized our survey of cryptographic functions and operations in the algorithms in three categories: block ciphers, stream ciphers and cryptanalysis attacks which are executable in different parts of the algorithms. This survey will help the budding researchers in the society of crypto for identifying different operations and functions in cryptographic algorithms. Keywords: cryptography; block; stream; cipher; plaintext; ciphertext; functions; research problems 1. Introduction Cryptography [1] in the previous time was analogous to encryption where the main task was to convert the readable message to an unreadable format.
    [Show full text]
  • Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT
    Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT Jiazhe Chen1;2;3?, Meiqin Wang1;2;3??, and Bart Preneel2;3 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics, Shandong University, Jinan 250100, China 2 Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium 3 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium [email protected] Abstract. TEA, XTEA and HIGHT are lightweight block ciphers with 64-bit block sizes and 128-bit keys. The round functions of the three ci- phers are based on the simple operations XOR, modular addition and shift/rotation. TEA and XTEA are Feistel ciphers with 64 rounds de- signed by Needham and Wheeler, where XTEA is a successor of TEA, which was proposed by the same authors as an enhanced version of TEA. HIGHT, which is designed by Hong et al., is a generalized Feistel cipher with 32 rounds. These block ciphers are simple and easy to implement but their diffusion is slow, which allows us to find some impossible prop- erties. This paper proposes a method to identify the impossible differentials for TEA and XTEA by using the weak diffusion, where the impossible differential comes from a bit contradiction. Our method finds a 14-round impossible differential of XTEA and a 13-round impossible differential of TEA, which result in impossible differential attacks on 23-round XTEA and 17-round TEA, respectively. These attacks significantly improve the previous impossible differential attacks on 14-round XTEA and 11-round TEA given by Moon et al.
    [Show full text]
  • New Cryptanalysis of Block Ciphers with Low Algebraic Degree
    New Cryptanalysis of Block Ciphers with Low Algebraic Degree Bing Sun1,LongjiangQu1,andChaoLi1,2 1 Department of Mathematics and System Science, Science College of National University of Defense Technology, Changsha, China, 410073 2 State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences, China, 10039 happy [email protected], ljqu [email protected] Abstract. Improved interpolation attack and new integral attack are proposed in this paper, and they can be applied to block ciphers using round functions with low algebraic degree. In the new attacks, we can determine not only the degree of the polynomial, but also coefficients of some special terms. Thus instead of guessing the round keys one by one, we can get the round keys by solving some algebraic equations over finite field. The new methods are applied to PURE block cipher successfully. The improved interpolation attacks can recover the first round key of 8-round PURE in less than a second; r-round PURE with r ≤ 21 is breakable with about 3r−2 chosen plaintexts and the time complexity is 3r−2 encryptions; 22-round PURE is breakable with both data and time complexities being about 3 × 320. The new integral attacks can break PURE with rounds up to 21 with 232 encryptions and 22-round with 3 × 232 encryptions. This means that PURE with up to 22 rounds is breakable on a personal computer. Keywords: block cipher, Feistel cipher, interpolation attack, integral attack. 1 Introduction For some ciphers, the round function can be described either by a low degree polynomial or by a quotient of two low degree polynomials over finite field with characteristic 2.
    [Show full text]
  • Peptide Microarray Profiling Identifies Phospholipase C Gamma 1 (PLC-Γ1) As a Potential Target for T(8;21) AML
    www.impactjournals.com/oncotarget/ Oncotarget, 2017, Vol. 8, (No. 40), pp: 67344-67354 Research Paper Peptide microarray profiling identifies phospholipase C gamma 1 (PLC-γ1) as a potential target for t(8;21) AML Hasan Mahmud1,2, Frank J.G. Scherpen1, Tiny Meeuwsen de Boer1, Harm-Jan Lourens1, Caroline Schoenherr3, Matthias Eder3, Michaela Scherr3, Victor Guryev4 and Eveline S. De Bont1 1Department of Pediatric Oncology/Hematology, Beatrix Children’s Hospital, University Medical Center Groningen, University of Groningen, Groningen, The Netherlands 2Stephenson Cancer Center, The University of Oklahoma Health Sciences Center, Oklahoma City, OK, USA 3Department of Hematology, Hemostasis, Oncology and Stem Cell Transplantation, Hannover Medical School, Hannover, Germany 4Laboratory of Genome Structure and Aging, European Research Institute for the Biology of Aging, University Medical Center Groningen, University of Groningen, Groningen, The Netherlands Correspondence to: Eveline S. De Bont, email: [email protected] Keywords: AML, leukemia, t(8;21), PLC-γ1, peptide microarray Received: February 21, 2017 Accepted: May 01, 2017 Published: June 27, 2017 Copyright: Mahmud et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License 3.0 (CC BY 3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. ABSTRACT The t(8;21) (q22;q22) chromosomal translocation is one of the most frequent genetic alterations in acute myeloid leukemia (AML) which has a need for improved therapeutic strategies. We found PLC-γ1 as one of the highest phosphorylated peptides in t(8;21) AML samples compared to NBM or CN-AML in our previous peptide microarray.
    [Show full text]
  • And ¡ , Respectively, Such That Бгваведзжиж © ¤ for Any Message
    Decorrelation: A Theory for Block Cipher Security Serge Vaudenay Swiss Federal Institute of Technology (EPFL) [email protected] Abstract. Pseudorandomness is a classical model for the security of block ciphers. In this paper we propose conve- nient tools in order to study it in connection with the Shannon Theory, the Carter-Wegman universal hash functions paradigm, and the Luby-Rackoff approach. This enables the construction of new ciphers with security proofs under specific models. We show how to ensure security against basic differential and linear cryptanalysis and even more general attacks. We propose practical construction schemes. 1 Introduction Conventional encryption is used in order to enforce confidentiality of communications in a network. Following the Kerckhoffs principles [34], schemes are defined by three public algorithms: a key generation scheme, an encryption scheme, and a decryption scheme. Two parties willing to communicate confidentially can generate a private key which is used as a parameter for encryption and decryption. Here encryption and decryption are formalized as functions ¡£¢ ¢¥¤§¦¨¦ © ¤ ¤ and ¡ , respectively, such that for any message . In 1949, Shannon formalized the notion of secrecy [59]. He formally proved the unconditional security (in his security model) of the Vernam Cipher which had been published in 1926 [71]. Unfortunately, this scheme happens to be quite expensive to implement for networking because the sender and the receiver need to be synchronized, and they need quite cumbersome huge keys. Shannon's result also proves that unconditional security cannot be achieved in a better (i.e. cheaper) way. For this reason, empirical security seemed to be the only efficient alternative, and all secret key block ciphers which have been publicly developed were considered to be secure until some researcher published a dedicated attack on it.
    [Show full text]