Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree

Total Page:16

File Type:pdf, Size:1020Kb

Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree Yosuke Todo1;2 1 NTT Secure Platform Laboratories, Tokyo, Japan [email protected] 2 Kobe University, Kobe, Japan Abstract. We proposed the division property, which is a new method to find integral characteristics, at EUROCRYPT 2015. In this paper, we expound the division property, its effectiveness, and follow-up results. Higher-Order Differential and Integral Cryptanalyses. After the pro- posal of the differential cryptanalysis [1], many extended cryptanalyses have been proposed. The higher-order differential cryptanalysis is one of such extensions. The concept was first introduced by Lai [6] and the advantage over the classical differential cryptanalysis was studied by Knudsen [4]. Assuming the algebraic degree of the target block cipher Ek is upper-bounded by d for any k, the dth order differential is always constant. Then, we can distinguish the target cipher Ek as ideal block ciphers because it is unlikely that ideal block ciphers have such property, and we call this property the higher-order differential characteristics in this paper. The similar technique to the higher-order differential cryptanalysis was used as the dedicated attack against the block cipher Square [3], and the dedicated attack was later referred to the square attack. In 2002, Knudsen and Wagner formalized the square attack as the integral cryptanalysis [5]. In the integral cryptanalysis, attackers first prepare N chosen plaintexts. If the XOR of all cor- responding ciphertexts is 0, we say that the cipher has an integral characteristic with N chosen plaintexts. The integral characteristic is found by evaluating the propagation of four integral properties: A, C, B, and U. Division Property. Before the introduction of the division property, it is im- portant to understand the difference between the higher-order differential and integral cryptanalyses. Actually, we can regard both cryptanalyses as the same cryptanalysis. Nevertheless, the higher-order differential and integral characteris- tics are constructed by completely different methods, and either of both methods has its own advantages and disadvantages. Moreover, there are some experi- mental characteristics that cannot be proven by either of both methods. These observation causes significant motivation that we develop the division property. At Eurocrypt 2015, we proposed the division property, which is a novel tech- nique to find integral (higher-order differential) characteristics [8]. This technique is the generalization of the integral property that can also exploit the algebraic degree at the same time. As a result, the division property can find integral characteristics that cannot be found by the two conventional methods. Let X be a subset whose elements take n-bit values, and assume that the set fulfills n L the division property Dk . Then, x2 πu(x) is 0 and unknown when w(u) < k X n and w(u) ≥ k, respectively, where w(u) denotes the Hamming weight of u 2 F2 . n n n The division properties Dn, D2 , and D1 correspond to the integral properties n n A, B, and U, respectively. Clearly, the division properties from D3 to Dn−1 are not used in the integral property. Moreover, let us consider the set S(X) whose elements are computed by applying the S-box S for elements in X. Then, if the algebraic degree of the S-box is at most d, the propagation of the division n n property is Dk !Ddk=de. The proposal paper of the division property at EUROCRYPT2015 only shows the usefulness of generic attacks against Feistel and Substitution-Permutation networks. To insist the usefulness of the division property, we applied the new technique to the cryptanalysis on full MISTY1 at CRYPTO2015 [7]. Then, many follow-up results have been reported [11, 9, 2, 10], and nowadays, new ciphers that discuss the security for the analysis using the division property in advance have been proposed. References 1. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO. LNCS, vol. 537, pp. 2{21. Springer (1990) 2. Boura, C., Canteaut, A.: Another view of the division property (2016), https: //eprint.iacr.org/2016/554, (Accepted to CRYPTO 2016) 3. Daemen, J., Knudsen, L.R., Rijmen, V.: The block cipher Square. In: Biham, E. (ed.) FSE. LNCS, vol. 1267, pp. 149{165. Springer (1997) 4. Knudsen, L.R.: Truncated and higher order differentials. In: Preneel, B. (ed.) FSE. LNCS, vol. 1008, pp. 196{211. Springer (1994) 5. Knudsen, L.R., Wagner, D.: Integral cryptanalysis. In: Daemen, J., Rijmen, V. (eds.) FSE. LNCS, vol. 2365, pp. 112{127. Springer (2002) 6. Lai, X.: Higher order derivatives and differential cryptanalysis. In: Communications and Cryptography. The Springer International Series in Engineering and Computer Science, vol. 276, pp. 227{233 (1994) 7. Todo, Y.: Integral cryptanalysis on full MISTY1. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO Part I. LNCS, vol. 9215, pp. 413{432. Springer (2015a) 8. Todo, Y.: Structural evaluation by generalized integral property. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT Part I. LNCS, vol. 9056, pp. 287{314. Springer (2015b) 9. Todo, Y., Morii, M.: Bit-based division property and application to Simon family. IACR Cryptology ePrint Archive 2016, 285 (2016), https://eprint.iacr.org/ 2016/285, (Accepted to FSE 2016) 10. Xiang, Z., Zhang, W., Bao, Z., Lin, D.: Applying milp method to searching in- tegral distinguishers based on division property for 6 lightweight block ciphers. IACR Cryptology ePrint Archive 2016, 857 (2016), https://eprint.iacr.org/ 2016/857, (Accepted to ASIACRYPT 2016) 11. Zhang, H., Wu, W.: Structural evaluation for generalized Feistel structures and ap- plications to LBlock and TWINE. In: Biryukov, A., Goyal, V. (eds.) INDOCRYPT. LNCS, vol. 9462, pp. 218{237. Springer (2015).
Recommended publications
  • Integral Cryptanalysis on Full MISTY1⋆
    Integral Cryptanalysis on Full MISTY1? Yosuke Todo NTT Secure Platform Laboratories, Tokyo, Japan [email protected] Abstract. MISTY1 is a block cipher designed by Matsui in 1997. It was well evaluated and standardized by projects, such as CRYPTREC, ISO/IEC, and NESSIE. In this paper, we propose a key recovery attack on the full MISTY1, i.e., we show that 8-round MISTY1 with 5 FL layers does not have 128-bit security. Many attacks against MISTY1 have been proposed, but there is no attack against the full MISTY1. Therefore, our attack is the first cryptanalysis against the full MISTY1. We construct a new integral characteristic by using the propagation characteristic of the division property, which was proposed in 2015. We first improve the division property by optimizing a public S-box and then construct a 6-round integral characteristic on MISTY1. Finally, we recover the secret key of the full MISTY1 with 263:58 chosen plaintexts and 2121 time complexity. Moreover, if we can use 263:994 chosen plaintexts, the time complexity for our attack is reduced to 2107:9. Note that our cryptanalysis is a theoretical attack. Therefore, the practical use of MISTY1 will not be affected by our attack. Keywords: MISTY1, Integral attack, Division property 1 Introduction MISTY [Mat97] is a block cipher designed by Matsui in 1997 and is based on the theory of provable security [Nyb94,NK95] against differential attack [BS90] and linear attack [Mat93]. MISTY has a recursive structure, and the component function has a unique structure, the so-called MISTY structure [Mat96].
    [Show full text]
  • Performance Analysis of Advanced Encryption Standard (AES) S-Boxes
    International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-9, Issue-1, May 2020 Performance Analysis of Advanced Encryption Standard (AES) S-boxes Eslam w. afify, Abeer T. Khalil, Wageda I. El sobky, Reda Abo Alez Abstract : The Advanced Encryption Standard (AES) algorithm The fundamental genuine data square length for AES is 128 is available in a wide scope of encryption packages and is the bits that as it might; the key length for AES possibly 128, single straightforwardly accessible cipher insisted by the 192, or 256 bits [2, 3]. The conversation is focused on National Security Agency (NSA), The Rijndael S-box is a Rijndael S-Box yet a huge amount of the trade can in like substitution box S-Box assumes a significant job in the AES manner be associated with the ideal security of block cipher algorithm security. The quality of S-Box relies upon the plan and mathematical developments. Our paper gives an outline of AES and the objective of the cryptanalysis. As follows the paper S-Box investigation, the paper finds that algebraic attack is the is sorted out: Section II gives a detailed analysis of the most security gap of AES S-Box, likewise give a thought structure of the AES. Section III scope in the cryptanalysis regarding distinctive past research to improve the static S- study of algebraic techniques against block ciphers, gives a confines that has been utilized AES, to upgrade the quality of detailed analysis of S-Box algebraic structure and AES Performance by shocking the best S-box.
    [Show full text]
  • Optimization and Guess-Then-Solve Attacks in Cryptanalysis
    Optimization and Guess-then-Solve Attacks in Cryptanalysis Guangyan Song A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy of University College London. Department of Computer Science University College London December 4, 2018 2 I, Guangyan Song, confirm that the work presented in this thesis is my own. Where information has been derived from other sources, I confirm that this has been indicated in the work. Abstract In this thesis we study two major topics in cryptanalysis and optimization: software algebraic cryptanalysis and elliptic curve optimizations in cryptanalysis. The idea of algebraic cryptanalysis is to model a cipher by a Multivariate Quadratic (MQ) equation system. Solving MQ is an NP-hard problem. However, NP-hard prob- lems have a point of phase transition where the problems become easy to solve. This thesis explores different optimizations to make solving algebraic cryptanalysis problems easier. We first worked on guessing a well-chosen number of key bits, a specific opti- mization problem leading to guess-then-solve attacks on GOST cipher. In addition to attacks, we propose two new security metrics of contradiction immunity and SAT immunity applicable to any cipher. These optimizations play a pivotal role in recent highly competitive results on full GOST. This and another cipher Simon, which we cryptanalyzed were submitted to ISO to become a global encryption standard which is the reason why we study the security of these ciphers in a lot of detail. Another optimization direction is to use well-selected data in conjunction with Plaintext/Ciphertext pairs following a truncated differential property.
    [Show full text]
  • 1. Classical Cryptography
    1. Classical Cryptography Some Simple Cryptosystems • Shift Cipher, • Substitution Cipher, • Affine Cipher, • Vigenere Cipher, • Hill Cipher, • Permutation Cipher, • Stream Cipher Modular Arithmetic, Number theory, and Group Cryptanalysis The RSA Cryptosystem 1 Classical Cryptography Definition 1.1: A cryptosystem is a five-tuple (P, C, H, E, D), where the following conditions are satisfied: 1. P is a finite set of possible plaintexts 2. C is a finite set of possible ciphertexts 3. H the keyspace, is a finite set of possible keys 4. For each K H, there is an encryption rule eK E : P C and a corresponding decryption rule dK D: C P such that x C, dK (eK(x)) = x Oscar x y x Alice Encrypter Decrypter Bob Secure chanel K Key source 2 Modular Arithmetic Definition 1.2: Suppose a and b are integers, and m is positive integer. Then we write a b (mod m) if m divides b-a. • a b mod m if and only if (a-b) = km for some k •Zm the equivalence class under mod m • Canonical form Zm = {0,1,2,…,m-1}, we use the positive remainder as the standard representation. • -1 m -1 mod m • (Zm, +, 0) is a Group . + is closed . Associative: (a + b) + c = a + (b + c) . Commutative: a + b = b + a (abelian group) . 0 is the identity for +: a + 0 = a + 0 = a . Additive inverse: (-a) + a = a + (-a) = 0 3 Modular Arithmetic • (Zm, +, , 0, 1) is a Ring . +, are closed . +, are associative and commutative (abelian ring) . Operation distributes over +: a (b + c) = a b + a c .
    [Show full text]
  • Discrete Square Roots Cryptosystems Rabin Cryptosystem
    CHAPTER 6: OTHER CRYPTOSYSTEMS and BASIC CRYPTOGRAPHY PRIMITIVES A large number of interesting and important cryptosystems have already been designed. In this chapter we present several other of them in order to illustrate other principles and techniques that can be used to design cryptosystems. Part VI At first, we present several cryptosystems security of which is based on the fact that computation of square roots and discrete logarithms is in general infeasible in some Public-key cryptosystems, II. Other cryptosystems, security, PRG, hash groups. functions Secondly, we discuss one of the fundamental questions of modern cryptography: when can a cryptosystem be considered as (computationally) perfectly secure? In order to do that we will: discuss the role randomness play in the cryptography; introduce the very fundamental definitions of perfect security of cryptosystem present some examples of perfectly secure cryptosystems. Finally, we discuss in some details such important cryptography primitives as pseudo-random number generators and hash functions prof. Jozef Gruska IV054 6. Public-key cryptosystems, II. Other cryptosystems, security, PRG, hash functions 2/66 DISCRETE SQUARE ROOTS CRYPTOSYSTEMS RABIN CRYPTOSYSTEM Let Blum primes p, q are kept secret, and let the Blum integer n = pq be the public key. Encryption: of a plaintext w < n c = w 2 (mod n) Decryption: -briefly It is easy to verify (using Euler’s criterion which says that if c is a quadratic residue (p 1)/2 modulo p, then c − 1 (mod p),) that DISCRETE SQUARE ROOTS CRYPTOSYSTEMS ≡ c(p+1)/4mod p and c(q+1)/4mod q ± ± p+1 p 1 are two square roots of c modulo p and q.
    [Show full text]
  • On Constructions of MDS Matrices from Circulant-Like Matrices for Lightweight Cryptography
    On Constructions of MDS Matrices From Circulant-Like Matrices For Lightweight Cryptography Technical Report No. ASU/2014/1 Dated : 14th February, 2014 Kishan Chand Gupta Applied Statistics Unit Indian Statistical Institute 203, B. T. Road, Kolkata 700108, INDIA. [email protected] Indranil Ghosh Ray Applied Statistics Unit Indian Statistical Institute 203, B. T. Road, Kolkata 700108, INDIA. indranil [email protected] On Constructions of MDS Matrices From Circulant-Like Matrices For Lightweight Cryptography Kishan Chand Gupta and Indranil Ghosh Ray Applied Statistics Unit, Indian Statistical Institute. 203, B. T. Road, Kolkata 700108, INDIA. [email protected], indranil [email protected] Abstract. Maximum distance separable (MDS) matrices have applications not only in coding theory but are also of great importance in the design of block ciphers and hash functions. It is highly nontrivial to find MDS matrices which could be used in lightweight cryptography. In a SAC 2004 paper, Junod et. al. constructed a new class of efficient MDS matrices whose submatrices were circulant matrices and they coined the term circulating-like matrices for these new class of matrices which we rename as circulant-like matrices. In this paper we study this construction and propose efficient 4 × 4 and 8 × 8 circulant-like MDS matrices. We prove that such d × d circulant-like MDS matrices can not be involutory or orthogonal which are good for designing SPN networks. Although these matrices are efficient, but the inverse of such matrices are not guaranteed to be efficient. Towards this we design a new type of circulant- like MDS matrices which are by construction involutory.
    [Show full text]
  • Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and Secret Spns
    IACR Transactions on Symmetric Cryptology ISSN 2519-173X, Vol. 2016, No. 2, pp. 226–247. DOI:10.13154/tosc.v2016.i2.226-247 Multiset-Algebraic Cryptanalysis of Reduced Kuznyechik, Khazad, and secret SPNs Alex Biryukov1, Dmitry Khovratovich2 and Léo Perrin3 1 Interdisciplinary Centre for Security, Reliability and Trust (SnT), Computer Science and Communications Research Unit (CSC), University of Luxembourg, Luxembourg, Luxembourg [email protected] 2 University of Luxembourg, Luxembourg, Luxembourg [email protected] 3 Interdisciplinary Centre for Security, Reliability and Trust (SnT), Computer Science and Communications Research Unit, University of Luxembourg, Luxembourg, Luxembourg [email protected] Abstract. We devise the first closed formula for the number of rounds of a blockcipher with secret components so that these components can be revealed using multiset, algebraic-degree, or division-integral properties, which in this case are equivalent. Using the new result, we attack 7 (out of 9) rounds of Kuznyechik, the recent Russian blockcipher standard, thus halving its security margin. With the same technique we attack 6 (out of 8) rounds of Khazad, the legacy 64-bit blockcipher. Finally, we show how to cryptanalyze and find a decomposition of generic SPN construction for which the inner-components are secret. All the attacks are the best to date. Keywords: Generic SPN · Algebraic attack · Multi-set · Integral · Division property · Kuznyechik · Khazad 1 Introduction 1.1 Multiset, integrals, division, and algebraic degree Multiset attacks originated in the late 1990s with application to byte-oriented block- ciphers [BS01] and are also known as Square [DKR97], integral [KW02], and satura- tion [Luc01] attacks. For years, they remained the most efficient method to attack AES [FKL+00, DF13], Camellia, and other popular designs.
    [Show full text]
  • New Directions in Cryptanalysis of Block Ciphers
    Journal of Computer Science 5 (12): 1091-1094, 2009 ISSN 1549-3636 © 2009 Science Publications New Directions in Cryptanalysis of Block Ciphers Davood RezaeiPour and Mohamad Rushdan Md Said Institute for Mathematical Research, University Putra Malaysia, 43400 UPM Serdang, Selangor Darul Ehsan, Malaysia Abstract: Problem statement: The algebraic expression of the Advanced Encryption Standard (AES) RIJNDAEL S-box involved only 9 terms. The selected mapping for RIJNDAEL S-box has a simple algebraic expression. This enables algebraic manipulations which can be used to mount interpolation attack. Approach: The interpolation attack was introduced as a cryptanalytic attack against block ciphers. This attack is useful for cryptanalysis using simple algebraic functions as S-boxes. Results: In this study, we presented an improved AES S-box with good properties to improve the complexity of AES S-box algebraic expression with terms increasing to 255. Conclusion: The improved S-box is resistant against interpolation attack. We can develop the derivatives of interpolation attack using the estimations of S-box with less nonlinearity. Key words: Block cipher, AES, S-box, interpolation attack, Lagrange interpolation formula INTRODUCTION In this article, we first describe the main parts of AES (RIJNDAEL) which consists of the individual The interpolation attack is a technique for attacking transformations and AES S-box. We will introduce the block ciphers built from simple algebraic functions. A interpolation attack with considering of the points of block cipher algorithm may not include any algebraic weakness and strength in AES S-box. Finally, we will property that can be efficiently distinguishable, since an discuss the manner of doing interpolation attack using the different representations of AES S-box.
    [Show full text]
  • On the Interpolation Attacks on Block Ciphers 111
    On the Interp olation Attacks on Blo ck Ciphers A.M. Youssef and G. Gong Center for Applied Cryptographic Research Department of Combinatorics and Optimization UniversityofWaterlo o, Waterlo o, ON N2L 3G1 fa2youssef, [email protected] o.ca Abstract. The complexityofinterp olation attacks on blo ck ciphers de- p ends on the degree of the p olynomial approximation and/or on the numb er of terms in the p olynomial approximation expression. In some situations, the round function or the S-b oxes of the blo ck cipher are expressed explicitly in terms of algebraic function, yet in many other o ccasions the S-b oxes are expressed in terms of their Bo olean function representation. In this case, the cryptanalyst has to evaluate the algebraic description of the S-b oxes or the round function using the Lagrange in- terp olation formula. A natural question is what is the e ect of the choice of the irreducible p olynomial used to construct the nite eld on the degree of the resulting p olynomial . Another question is whether or not there exists a simple linear transformation on the input or output bits of the S-b oxes (or the round function) such that the resulting p olynomial has a less degree or smaller numb er of non-zero co ecients. In this pap er we give an answer to these questions. We also present an explicit relation between the Lagrange interp olation formula and the Galois Field Fourier Transform. Keywords: Blo ck cipher, cryptanalysis, interp olation attack, nite elds, Ga- lois Field Fourier Transform 1 Intro duction Gong and Golomb[7]intro duced a new criterion for the S-b ox design.
    [Show full text]
  • Integral Cryptanalysis
    Chapter 5 - integral cryptanalysis. James McLaughlin 1 Introduction. The history of integral cryptanalysis is a little complicated, and the most important papers to study regarding it are not in fact the ones in which it was first defined. We give a brief recap here: In 1997, Daemen, Knudsen, and Rijmen published a paper [3] describing a new cipher. This cipher, SQUARE, was a forerunner of Rijndael [10], the eventual AES, and was designed using the same wide trail strategy to provide security against differential and linear cryptanalysis. However, while working on the paper, the authors discovered a new kind of chosen-plaintext attack which broke six rounds of SQUARE. Since SQUARE had originally been designed with this many rounds, the authors were forced to add more rounds and to publish details of the attack as well as the cipher. The attack - not at the time given a name, but later referred to as the “Square attack” - did not scale well to attack more rounds, and also bore certain similarities to linear and differential cryptanalysis. Because of this, and because of the level of diffusion stipulated by the wide trail strategy, the authors decided that only two extra rounds needed to be added to the cipher to defeat the attack. Although specific to SQUARE, the similarities between SQUARE and Rijndael, as also the cipher CRYPTON [8], meant that it could easily be adapted to these ciphers. Again, it broke six rounds of Rijndael, in an attack much the same as the attack against SQUARE, and the creator of CRYPTON conjectured [8] that it would not break more than six rounds of that either.
    [Show full text]
  • Impossible Differential Cryptanalysis of ARIA and Camellia
    Impossible Di®erential Cryptanalysis of ARIA and Camellia Wenling Wu, Wentao Zhang, Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, P. R. China [email protected] Abstract. This paper studies the security of the block ciphers ARIA and Camellia against impossible di®erential cryptanalysis. Our work im- proves the best impossible di®erential cryptanalysis of ARIA and Camel- lia known so far. The designers of ARIA expected no impossible di®eren- tials exist for 4-round ARIA. However, we found some nontrivial 4-round impossible di®erentials, which may lead to a possible attack on 6-round ARIA. Moreover, we found some nontrivial 8-round impossible di®er- entials for Camellia, whereas only 7-round impossible di®erentials were previously known. By using the 8-round impossible di®erentials, we pre- sented an attack on 12-round Camellia without F L=F L¡1 layers. Key words. Block cipher, ARIA, Camellia, Data complexity, Time com- plexity, Impossible Di®erential Cryptanalysis. 1 Introduction Both ARIA[1] and Camellia[2] support 128-bit block size and 128-,192-, and 256- bit key lengths, i.e. the same interface speci¯cations as the Advanced Encryption Standard(AES). Camellia was jointly developed in 2000 by Nippon Telegraph and Telephone Corporation (NTT) and Mitsubishi Electric Corporation (Mit- subishi). It has now been selected as an international standard by ISO/IEC, and also been adopted by cryptographic evaluation projects such as NESSIE and CRYPTREC, as well as the standardization activities at IETF. It means Camellia gradually become one of the most worldwide used block ciphers.
    [Show full text]
  • The Rijndael Block Cipher, Other Than Encryption
    Joan Daemen Vincent Rijmen Note on naming Rijndael Note on naming 1. Introduction After the selection of Rijndael as the AES, it was decided to change the names of some of its component functions in order to improve the readability of the standard. However, we see that many recent publications on Rijndael and the AES still use the old names, mainly because the original submission documents using the old names, are still available on the Internet. In this note we repeat quickly the new names for the component functions. Additionally, we remind the reader on the difference between AES and Rijndael and present an overview of the most important references for Rijndael and the AES. 2. References [1] Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, June 1998. [2] Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, Version 2, September 1999. http://csrc.nist.gov/CryptoToolkit/aes/rijndael/Rijndael.pdf [3] FIPS PUB 197, Advanced Encryption Standard (AES), National Institute of Standards and Technology, U.S. Department of Commerce, November 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf [4] Joan Daemen and Vincent Rijmen, The Design of Rijndael, AES - The Advanced Encryption Standard, Springer-Verlag 2002 (238 pp.) 3. Naming The names of the component functions of Rijndael have been modified between the publication of [2] and that of [3]. Table 1 lists the two versions of names. We recommend using the new names. Old naming New naming ByteSub SubBytes ShiftRow ShiftRows MixColumn MixColumns AddRoundKey AddRoundKey Table 1: Old and new names of the Rijndael component functions 4.
    [Show full text]