History and Modern Cryptanalysis of Enigma's Pluggable Reflector
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher Florian Mendel1, Thomas Peyrin2, Christian Rechberger1, and Martin Schl¨affer1 1 IAIK, Graz University of Technology, Austria 2 Ingenico, France [email protected],[email protected] Abstract. In this paper, we propose two new ways to mount attacks on the SHA-3 candidates Grøstl, and ECHO, and apply these attacks also to the AES. Our results improve upon and extend the rebound attack. Using the new techniques, we are able to extend the number of rounds in which available degrees of freedom can be used. As a result, we present the first attack on 7 rounds for the Grøstl-256 output transformation3 and improve the semi-free-start collision attack on 6 rounds. Further, we present an improved known-key distinguisher for 7 rounds of the AES block cipher and the internal permutation used in ECHO. Keywords: hash function, block cipher, cryptanalysis, semi-free-start collision, known-key distinguisher 1 Introduction Recently, a new wave of hash function proposals appeared, following a call for submissions to the SHA-3 contest organized by NIST [26]. In order to analyze these proposals, the toolbox which is at the cryptanalysts' disposal needs to be extended. Meet-in-the-middle and differential attacks are commonly used. A recent extension of differential cryptanalysis to hash functions is the rebound attack [22] originally applied to reduced (7.5 rounds) Whirlpool (standardized since 2000 by ISO/IEC 10118-3:2004) and a reduced version (6 rounds) of the SHA-3 candidate Grøstl-256 [14], which both have 10 rounds in total. -
Key-Dependent Approximations in Cryptanalysis. an Application of Multiple Z4 and Non-Linear Approximations
KEY-DEPENDENT APPROXIMATIONS IN CRYPTANALYSIS. AN APPLICATION OF MULTIPLE Z4 AND NON-LINEAR APPROXIMATIONS. FX Standaert, G Rouvroy, G Piret, JJ Quisquater, JD Legat Universite Catholique de Louvain, UCL Crypto Group, Place du Levant, 3, 1348 Louvain-la-Neuve, standaert,rouvroy,piret,quisquater,[email protected] Linear cryptanalysis is a powerful cryptanalytic technique that makes use of a linear approximation over some rounds of a cipher, combined with one (or two) round(s) of key guess. This key guess is usually performed by a partial decryp- tion over every possible key. In this paper, we investigate a particular class of non-linear boolean functions that allows to mount key-dependent approximations of s-boxes. Replacing the classical key guess by these key-dependent approxima- tions allows to quickly distinguish a set of keys including the correct one. By combining different relations, we can make up a system of equations whose solu- tion is the correct key. The resulting attack allows larger flexibility and improves the success rate in some contexts. We apply it to the block cipher Q. In parallel, we propose a chosen-plaintext attack against Q that reduces the required number of plaintext-ciphertext pairs from 297 to 287. 1. INTRODUCTION In its basic version, linear cryptanalysis is a known-plaintext attack that uses a linear relation between input-bits, output-bits and key-bits of an encryption algorithm that holds with a certain probability. If enough plaintext-ciphertext pairs are provided, this approximation can be used to assign probabilities to the possible keys and to locate the most probable one. -
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, Newdes, RC2, and TEA
Related-Key Cryptanalysis of 3-WAY, Biham-DES,CAST, DES-X, NewDES, RC2, and TEA John Kelsey Bruce Schneier David Wagner Counterpane Systems U.C. Berkeley kelsey,schneier @counterpane.com [email protected] f g Abstract. We present new related-key attacks on the block ciphers 3- WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. Differen- tial related-key attacks allow both keys and plaintexts to be chosen with specific differences [KSW96]. Our attacks build on the original work, showing how to adapt the general attack to deal with the difficulties of the individual algorithms. We also give specific design principles to protect against these attacks. 1 Introduction Related-key cryptanalysis assumes that the attacker learns the encryption of certain plaintexts not only under the original (unknown) key K, but also under some derived keys K0 = f(K). In a chosen-related-key attack, the attacker specifies how the key is to be changed; known-related-key attacks are those where the key difference is known, but cannot be chosen by the attacker. We emphasize that the attacker knows or chooses the relationship between keys, not the actual key values. These techniques have been developed in [Knu93b, Bih94, KSW96]. Related-key cryptanalysis is a practical attack on key-exchange protocols that do not guarantee key-integrity|an attacker may be able to flip bits in the key without knowing the key|and key-update protocols that update keys using a known function: e.g., K, K + 1, K + 2, etc. Related-key attacks were also used against rotor machines: operators sometimes set rotors incorrectly. -
INFORMATION to USERS the Most Advanced Technology Has Been Used to Photo Graph and Reproduce This Manuscript from the Microfilm Master
. INFORMATION TO USERS The most advanced technology has been used to photo graph and reproduce this manuscript from the microfilm master. UMI films the original text directly from the copy submitted. Thus, some dissertation copies are in typewriter face, while others may be from a computer printer. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyrighted material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are re produced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each oversize page is available as one exposure on a standard 35 mm slide or as a 17" x 23" black and white photographic print for an additional charge. Photographs included in the original manuscript have been reproduced xerographically in this copy. 35 mm slides or 6"X 9" black and white photographic prints are available for any photographs or illustrations appearing in this copy for an additional charge. Contact UMI directly to order. Accessing theUMI World’s Information since 1938 300 North Z eeb Road, Ann Arbor, Ml 48106-1346 USA Order Number 8820321 Operational art and the German command system in World War I Meyer, Bradley John, Ph.D. The Ohio State University, 1988 Copyright ©1088 by Meyer, Bradley John. All rights reserved. UMI 300 N. ZeebRd. Ann Arbor, Ml 48106 OPERATIONAL ART AND THE GERMAN COMMAND SYSTEM IN WORLD WAR I DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of the Ohio State University By Bradley J. -
Impossible Differential Cryptanalysis of TEA, XTEA and HIGHT
Preliminaries Impossible Differential Attacks on TEA and XTEA Impossible Differential Cryptanalysis of HIGHT Conclusion Impossible Differential Cryptanalysis of TEA, XTEA and HIGHT Jiazhe Chen1;2 Meiqin Wang1;2 Bart Preneel2 1Shangdong University, China 2KU Leuven, ESAT/COSIC and IBBT, Belgium AfricaCrypt 2012 July 10, 2012 1 / 27 Preliminaries Impossible Differential Attacks on TEA and XTEA Impossible Differential Cryptanalysis of HIGHT Conclusion Preliminaries Impossible Differential Attack TEA, XTEA and HIGHT Impossible Differential Attacks on TEA and XTEA Deriving Impossible Differentials for TEA and XTEA Key Recovery Attacks on TEA and XTEA Impossible Differential Cryptanalysis of HIGHT Impossible Differential Attacks on HIGHT Conclusion 2 / 27 I Pr(∆A ! ∆B) = 1, Pr(∆G ! ∆F) = 1, ∆B 6= ∆F, Pr(∆A ! ∆G) = 0 I Extend the impossible differential forward and backward to attack a block cipher I Guess subkeys in Part I and Part II, if there is a pair meets ∆A and ∆G, then the subkey guess must be wrong P I A B F G II C Preliminaries Impossible Differential Attacks on TEA and XTEA Impossible Differential Cryptanalysis of HIGHT Conclusion Impossible Differential Attack Impossible Differential Attack 3 / 27 I Pr(∆A ! ∆B) = 1, Pr(∆G ! ∆F) = 1, ∆B 6= ∆F, Pr(∆A ! ∆G) = 0 I Extend the impossible differential forward and backward to attack a block cipher I Guess subkeys in Part I and Part II, if there is a pair meets ∆A and ∆G, then the subkey guess must be wrong P I A B F G II C Preliminaries Impossible Differential Attacks on TEA and XTEA Impossible -
A War of Reputation and Pride
A War of reputation and pride - An examination of the memoirs of German generals after the Second World War. HIS 4090 Peter Jørgen Sager Fosse Department of Archaeology, Conservation and History University of Oslo Spring 2019 1 “For the great enemy of truth is very often not the lie -- deliberate, contrived and dishonest -- but the myth -- persistent, persuasive, and unrealistic.” – John F. Kennedy, 19621 1John F. Kennedy, Yale University Commencement Address, https://www.americanrhetoric.com/speeches/jfkyalecommencement.htm, [01.05.2019]. 2 Acknowledgments This master would not have been written without the help and support of my mother, father, friends and my better half, thank you all for your support. I would like to thank the University Library of Oslo and the British Library in London for providing me with abundant books and articles. I also want to give huge thanks to the Military Archive in Freiburg and their employees, who helped me find the relevant materials for this master. Finally, I would like to thank my supervisor at the University of Oslo, Professor Kim Christian Priemel, who has guided me through the entire writing process from Autumn 2017. Peter Jørgen Sager Fosse, Oslo, 01.05.2019 3 Contents: Introduction………………………………………………………………………...………... 7 Chapter 1, Theory and background………………………………………………..………17 1.1 German Military Tactics…………………………………………………..………. 17 1.1.1 Blitzkrieg, Kesselschlacht and Schwerpunkt…………………………………..……. 17 1.1.2 Examples from early campaigns……………………………………………..……… 20 1.2 The German attack on the USSR (1941)……………………………..…………… 24 1.2.1 ‘Vernichtungskrieg’, war of annihilation………………………………...………….. 24 1.2.2 Operation Barbarossa………………………………………………..……………… 28 1.2.3 Operation Typhoon…………………………………………………..………………. 35 1.2.4 The strategic situation, December 1941…………………………….………………. -
Polish Mathematicians Finding Patterns in Enigma Messages
Fall 2006 Chris Christensen MAT/CSC 483 Machine Ciphers Polyalphabetic ciphers are good ways to destroy the usefulness of frequency analysis. Implementation can be a problem, however. The key to a polyalphabetic cipher specifies the order of the ciphers that will be used during encryption. Ideally there would be as many ciphers as there are letters in the plaintext message and the ordering of the ciphers would be random – an one-time pad. More commonly, some rotation among a small number of ciphers is prescribed. But, rotating among a small number of ciphers leads to a period, which a cryptanalyst can exploit. Rotating among a “large” number of ciphers might work, but that is hard to do by hand – there is a high probability of encryption errors. Maybe, a machine. During World War II, all the Allied and Axis countries used machine ciphers. The United States had SIGABA, Britain had TypeX, Japan had “Purple,” and Germany (and Italy) had Enigma. SIGABA http://en.wikipedia.org/wiki/SIGABA 1 A TypeX machine at Bletchley Park. 2 From the 1920s until the 1970s, cryptology was dominated by machine ciphers. What the machine ciphers typically did was provide a mechanical way to rotate among a large number of ciphers. The rotation was not random, but the large number of ciphers that were available could prevent depth from occurring within messages and (if the machines were used properly) among messages. We will examine Enigma, which was broken by Polish mathematicians in the 1930s and by the British during World War II. The Japanese Purple machine, which was used to transmit diplomatic messages, was broken by William Friedman’s cryptanalysts. -
Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK
cryptography Article Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPECK Sarah A. Alzakari * and Poorvi L. Vora Department of Computer Science, The George Washington University, 800 22nd St. NW, Washington, DC 20052, USA; [email protected] * Correspondence: [email protected] Abstract: We apply McKay’s pseudo-linear approximation of addition modular 2n to lightweight ARX block ciphers with large words, specifically the SPECK family. We demonstrate that a pseudo- linear approximation can be combined with a linear approximation using the meet-in-the-middle attack technique to recover several key bits. Thus we illustrate improvements to SPECK linear distinguishers based solely on Cho–Pieprzyk approximations by combining them with pseudo-linear approximations, and propose key recovery attacks. Keywords: SPECK; pseudo-linear cryptanalysis; linear cryptanalysis; partly-pseudo-linear attack 1. Introduction ARX block ciphers—which rely on Addition-Rotation-XOR operations performed a number of times—provide a common approach to lightweight cipher design. In June 2013, a group of inventors from the US’s National Security Agency (NSA) proposed two families of lightweight block ciphers, SIMON and SPECK—each of which comes in a variety of widths and key sizes. The SPECK cipher, as an ARX cipher, provides efficient software implementations, while SIMON provides efficient hardware implementations. Moreover, both families perform well in both hardware and software and offer the flexibility across Citation: Alzakari, S.; Vora, P. different platforms that will be required by future applications [1,2]. In this paper, we focus Partly-Pseudo-Linear Cryptanalysis on the SPECK family as an example lightweight ARX block cipher to illustrate our attack. -
The Betrayal Belgium and Germany 1931
1 The Betrayal Belgium and Germany 1931 On Sunday 1 November 1931 Hans Thilo Schmidt, a forty-three-year- old executive at the German Defence Ministry Cipher Office in Berlin, took a step from which there was no turning back. He booked into the Grand Hotel in Verviers, a small Belgium town on the border with Germany, for his first meeting with a French Secret Service agent. Schmidt had been contemplating making this move for months. During June 1931 he had paid a visit to the French Embassy in Berlin to find out who he should contact in Paris if he wanted to sell some secret documents to the French government.1 Three weeks later he had followed up the advice given by the Em- bassy staff and had written a letter to the French Deuxième Bureau, the umbrella organisation which on France’s behalf carried out many of the task performed in Britain by MI 5 and MI 6.2 In his letter he ex- plained that he had access to documents which might be of interest to France, and he specifically mentioned that he was in a position to hand over the manuals for a coding machine which had been used in Germany since June 1930. If the Deuxième Bureau was interested he was happy to meet up with its representative in Belgium or Holland, he wrote. It was in response to this letter that the meeting in Verviers had been arranged, and the scene was set for Schmidt’s first act of treachery. In normal circumstances Schmidt would probably never have considered becoming a traitor. -
Kiev 1941: Hitler's Battle for Supremacy in the East
Kiev 1941 In just four weeks in the summer of 1941 the German Wehrmacht wrought unprecedented destruction on four Soviet armies, conquering central Ukraine and killing or capturing three-quarters of a million men. This was the battle of Kiev – one of the largest and most decisive battles of World War II and, for Hitler and Stalin, a battle of crucial importance. For the first time, David Stahel charts the battle’s dramatic course and after- math, uncovering the irreplaceable losses suffered by Germany’s ‘panzer groups’ despite their battlefield gains, and the implications of these losses for the German war effort. He illuminates the inner workings of the German army as well as the experiences of ordinary soldiers, showing that with the Russian winter looming and Soviet resistance still unbroken, victory came at huge cost and confirmed the turning point in Germany’s war in the east. David Stahel is an independent researcher based in Berlin. His previous publications include Operation Barbarossa and Germany’s Defeat in the East (Cambridge, 2009). Downloaded from Cambridge Books Online by IP 210.212.129.125 on Sat Dec 22 18:00:30 WET 2012. http://ebooks.cambridge.org/ebook.jsf?bid=CBO9781139034449 Cambridge Books Online © Cambridge University Press, 2012 Kiev 1941 Hitler’s Battle for Supremacy in the East David Stahel Downloaded from Cambridge Books Online by IP 210.212.129.125 on Sat Dec 22 18:00:30 WET 2012. http://ebooks.cambridge.org/ebook.jsf?bid=CBO9781139034449 Cambridge Books Online © Cambridge University Press, 2012 cambridge university press Cambridge, New York, Melbourne, Madrid, Cape Town, Singapore, Sao˜ Paulo, Delhi, Tokyo, Mexico City Cambridge University Press The Edinburgh Building, Cambridge cb2 8ru,UK Published in the United States of America by Cambridge University Press, New York www.cambridge.org Information on this title: www.cambridge.org/9781107014596 c David Stahel 2012 This publication is in copyright. -
Applying Differential Cryptanalysis for XTEA Using a Genetic Algorithm
Applying Differential Cryptanalysis for XTEA using a Genetic Algorithm Pablo Itaima and Mar´ıa Cristina Riffa aDepartment of Computer Science, Universidad Tecnica´ Federico Santa Mar´ıa, Casilla 110-V, Valpara´ıso, Chile, {pitaim,mcriff}@inf.utfsm.cl Keywords: Cryptanalysis, XTEA, Genetic Algorithms. Abstract. Differential Cryptanalysis is a well-known chosen plaintext attack on block ciphers. One of its components is a search procedure. In this paper we propose a genetic algorithm for this search procedure. We have applied our approach to the Extended Tiny Encryption Algorithm. We have obtained encouraging results for 4, 7 and 13 rounds. 1 Introduction In the Differential Cryptanalysis, Biham and Shamir (1991), we can identify many problems to be solved in order to complete a successful attack. The first problem is to define a differential characteristic, with a high probability, which will guide the attack. The second problem is to generate a set of plaintexts pairs, with a fixed difference, which follows the differential charac- teristic of the algorithm. Other problem is related to the search of the correct subkey during the partial deciphering process made during the attack. For this, many possible subkeys are tested and the algorithm selects the subkey that, most of the time, generates the best results. This is evaluated, in the corresponding round, by the number of plaintext pairs that have the same difference respect to the characteristic. Our aim is to improve this searching process using a ge- netic algorithm. Roughly speaking, the key idea is to quickly find a correct subkey, allowing at the same time to reduce the computational resources required. -
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt Nicolas T. Courtois Cryptography research, Schlumberger Smart Cards, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France http://www.nicolascourtois.net [email protected] Abstract. Many stream ciphers are built of a linear sequence generator and a non-linear output function f. There is an abundant literature on (fast) correlation attacks, that use linear approximations of f to attack the cipher. In this paper we explore higher degree approximations, much less studied. We reduce the cryptanalysis of a stream cipher to solv- ing a system of multivariate equations that is overdefined (much more equations than unknowns). We adapt the XL method, introduced at Eurocrypt 2000 for overdefined quadratic systems, to solving equations of higher degree. Though the exact complexity of XL remains an open problem, there is no doubt that it works perfectly well for such largely overdefined systems as ours, and we confirm this by computer simula- tions. We show that using XL, it is possible to break stream ciphers that were known to be immune to all previously known attacks. For exam- ple, we cryptanalyse the stream cipher Toyocrypt accepted to the second phase of the Japanese government Cryptrec program. Our best attack on Toyocrypt takes 292 CPU clocks for a 128-bit cipher. The interesting feature of our XL-based higher degree correlation attacks is, their very loose requirements on the known keystream needed. For example they may work knowing ONLY that the ciphertext is in English. Key Words: Algebraic cryptanalysis, multivariate equations, overde- fined equations, Reed-Muller codes, correlation immunity, XL algorithm, Gr¨obner bases, stream ciphers, pseudo-random generators, nonlinear fil- tering, ciphertext-only attacks, Toyocrypt, Cryptrec.