Cryptographic Algorithms in Wearable Communications: an Empirical Analysis

Total Page:16

File Type:pdf, Size:1020Kb

Cryptographic Algorithms in Wearable Communications: an Empirical Analysis IEEE COMMUNICATIONS LETTERS, VOL. 23, NO. 11, NOVEMBER 2019 1931 Cryptographic Algorithms in Wearable Communications: An Empirical Analysis Kristtopher Coelho, Danilo Damião, Guevara Noubir, Alex Borges , Michele Nogueira , and José Nacif Abstract— In this letter, we assess the practical impact of tions and analytical models [5], [6]. Despite the importance of lightweight block and stream cipher algorithms on power con- those studies, an empirical study complements them offering sumption and hardware resources for wearable devices that own insights and knowledge, which can aid the design of more low computational resources. Differently from the literature, efficient and cost-effective solutions. Ours is the first to follow we present an empirical and hardware-driven evaluation of the most representative encryption algorithms with regard to the a hardware-driven and empirical evaluation, highlighting the requirements of wearable networks. We design and implement a impacts of the hardware specificity to cryptographic algo- cryptography library useful for wearable devices. Results confirm rithms in wearable devices. a strong correlation between the amount of logic/arithmetic Our analysis targets symmetric cryptography, where the operations, assembly instructions and power consumption for the communicating wearable devices share the session key used two evaluated platforms, and they highlight the need to design to encryption. Particularly, we focus our investigations on two encryption algorithms for wearable devices with high energy different classes of symmetric lightweight encryption algo- consumption efficiency, but strong security level similar to AES. rithms, as block ciphers [7], and stream cipher. For our Index Terms— Wearable devices, cryptographic algorithms, evaluation approach, we have designed and implemented a block cipher, stream cipher, and power consumption. cryptography library useful for wireless wearable devices.1 For power consumption measurements, we have designed I. INTRODUCTION an instrumentation circuit and integrated it in the evaluated ARKET forecasts that worldwide shipments of wear- platforms. Our analysis has focused on real-life, off-the- Mable computing devices will reach 929 million in 2021, shelf wearable platforms which consider the transmission having as major drivers fitness and healthcare gadgets [1]. of data and other with greater processing power abstracting Wearable computing devices are smart electronic devices communication. that can be incorporated into clothing, worn on the body, Our results confirm the strong correlation between the or implanted in the body, such as fitness trackers, smart- amount of logic/arithmetic operations required to encrypt data watches, and the “neural dust” implantable sensor. Wireless block or stream, and their respective power consumption [9]. communication is essential for advancements in this field, Results indicate that SKIPJACK algorithm can be up to once it allows the connection between devices in and around 18.76% more efficient among the evaluated algorithms in the human body, including low-rate devices like pedometers terms of power consumption, processing up to 32× fewer and high-rate devices like augmented-reality glasses. This instructions. It also consumes up to ≈ 3.5× less ROM mem- communication relies on different standards such as those from ory related to AES. Analyzing time vs. power consumption, the IEEE 802.15 family [2] or the next generation 5G cellular. the XTEA algorithm has a battery consumption almost 6× Given data sensitiveness, popularity and user-reliance on lower than AES. But, it is worth to highlight the high security wearable devices, there has been an emergence of new and level of AES, bringing us to the conclusion that it is necessary varied attack vectors targeting privacy intrusions, that so far efforts to design encryption algorithms for wearable devices cannot be addressed by classical techniques. In this letter, our with high computational efficiency and high security level. goal lies in empirically evaluating the practical impact of the most representative lightweight cryptographic algorithms with II. LIGHTWEIGHT CRYPTOGRAPHIC ALGORITHMS FOR regard to the requirements of wearable networks, such as high WEARABLE NETWORKS P security and low computational resources, considering energy A cryptosystem consists of a plaintext space , a ciphertext C K : constraints from implantable and non-implantable devices. space , and a key space , an encryption algorithm Enc K×P →C : K×C→P Existing studies have investigated wearable network require- , and a decryption algorithm Dec . ∈K ∈P ( ( ) ) = ments either from a software perspective [3], [4] or by simula- For each k and p ,itisDec Enc p k k p. In the communication model by Shannon [10], a cryptosystem Manuscript received June 19, 2019; revised July 17, 2019; accepted provides confidentiality to the information from an attacker. August 19, 2019. Date of publication August 27, 2019; date of current version Hence, a sender and a receiver communicate by a public November 11, 2019. This material was based upon work partially supported by CAPES, CNPq, FAPEMIG, the Rede Nacional de Pesquisa under grant channel, where they exchange ciphertexts. No. 99/2017, and the National Science Foundation under Grant No. 1740907. Symmetric key cryptography assumes a secure channel used The associate editor coordinating the review of this letter and approving it for by the communicating parties to establish a secret session publication was D. Ciuonzo. (Corresponding author: Michele Nogueira.) K. Coelho, D. Damião, and J. Nacif are with the Science and Technology key k, not accessible to the adversary. Given p, k,and Institute, Federal University of Viçosa, Viçosa 35690-000, Brazil. the cryptosystem, the sender can construct the ciphertext c G. Noubir is with the College of Computer and Information Science, and send it to the receiver. The receiver can reconstruct the Northeastern University, Boston, MA 02120 USA. plaintext p,givenc, k, and the cryptosystem. Symmetric key A. Borges is with the Computer Science Department, Federal University of Juiz de Fora, Juiz de Fora 36036-900, Brazil. cryptography is relevant for wearable networks, that devices M. Nogueira is with the Department of Informatics, Federal University of have severe resource constraints (e.g., energy, memory, and Paraná, Curitiba 81531-980, Brazil (e-mail: [email protected]). Digital Object Identifier 10.1109/LCOMM.2019.2937782 1https://github.com/UFV-Alumni/lib_crypto 1558-2558 © 2019 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. Authorized licensed use limited to: Northeastern University. Downloaded on November 26,2020 at 20:54:10 UTC from IEEE Xplore. Restrictions apply. 1932 IEEE COMMUNICATIONS LETTERS, VOL. 23, NO. 11, NOVEMBER 2019 processing), and applications demand for low response time. The Advanced Encryption Standard (AES) algorithm has The attacker’s main goal lies in recovering p or k and, become the primary choice for various security services due according to Kerckhoff’s principle, an attacker knows the spec- to its strong defense against known attacks. The best known ification of the cryptosystem and has access to the ciphertext c. attacks against AES are slightly faster than brute-force and While in the last decades the progress in the security require 2126.2 operations to recover an AES-128 key. In [15], cryptographic primitives was based in modeling [11], this the authors presented an optimized version of AES for devices letter focuses on power consumption analysis of established with low computational capacity and memory resources, while block and stream ciphers. A block cipher is a cryptosystem still providing low power consumption. with gf(pn),wheregf denotes the Galois field in order RC4 is a stream cipher and it comprises of a Key Scheduling n ∈Z+ and plaintext p ∈P. For each key k, the encryption Algorithm (KSA) and a Pseudo-Random Generation Algo- function Enc(p)k is a permutation. In the most general case, rithm (PRGA). KSA transforms a random key in an initial the K corresponds to the set of permutations of size 2n!, permutation, whereas PRGA uses this initial permutation to where a single k lies in a table of size 2n. The use of a generate a pseudo-random output sequence. Cryptographic subset of permutations is reasonable by generating a small key. transformations applied by the algorithm are linear and simple, To encrypt messages longer than the block size, we use a mode using permutations and sums of integer values. However, the of operation, such as Cipher Block Chaining, and integrity secure use of RC4 is non-trivial as experienced with Wi-Fi protection, such as Galois Counter Mode [11]. WEP. The recovery requires a complex process of about 213 A stream cipher encrypts binary digits of a plaintext one at algorithm operations for 256-bit key [16]. time. It follows an internal state x ∈X, an update function L : X→X, and an output function f : X→Z,whereZ is called III. EXPERIMENTS AND METHODOLOGY the keystream alphabet. An output z ∈Zis produced at time t, In this letter, the experiments rely on two platforms: according to zt = f(xt),wherext = Lt(x) and x is the initial (i) wearable devices from the Shimmer platform, model 2R state. The stream of outputs z0,z1,...is called the keystream. and (ii) a Teensy™ 3.2 microcontroller. The Shimmer devices Each output symbol is
Recommended publications
  • Atlantic Highly Migratory Species Stock Assessment and Fisheries Evaluation Report 2019
    Atlantic Highly Migratory Species Stock Assessment and Fisheries Evaluation Report 2019 U.S. Department of Commerce | National Oceanic and Atmospheric Administration | National Marine Fisheries Service 2019 Stock Assessment and Fishery Evaluation Report for Atlantic Highly Migratory Species Atlantic Highly Migratory Species Management Division May 2020 Highly Migratory Species Management Division NOAA Fisheries 1315 East-West Highway Silver Spring, MD 20910 Phone (301) 427-8503 Fax (301) 713-1917 For HMS Permitting Information and Regulations • HMS recreational fishermen, commercial fishermen, and dealer compliance guides: www.fisheries.noaa.gov/atlantic-highly-migratory-species/atlantic-hms-fishery- compliance-guides • Regulatory updates for tunas: hmspermits.noaa.gov For HMS Permit Purchase or Renewals Open Access Vessel Permits Issuer Permits Contact Information HMS Permit HMS Charter/Headboat, (888) 872-8862 Shop Atlantic Tunas (General, hmspermits.noaa.gov Harpoon, Trap), Swordfish General Commercial, HMS Angling (recreational) Southeast Commercial Caribbean Small (727) 824-5326 Regional Boat, Smoothhound Shark www.fisheries.noaa.gov/southeast/resources- Office fishing/southeast-fisheries-permits Greater Incidental HMS Squid Trawl (978) 281-9370 Atlantic www.fisheries.noaa.gov/new-england-mid- Regional atlantic/resources-fishing/vessel-and-dealer- Fisheries permitting-greater-atlantic-region Office Limited Access Vessel Permits Issuer Permits Contact Information HMS Permit Atlantic Tunas Purse Seine (888) 872-8862 Shop category hmspermits.noaa.gov
    [Show full text]
  • Optimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks
    Proceedings of the World Congress on Engineering 2008 Vol I WCE 2008, July 2 - 4, 2008, London, U.K. Optimizing the Block Cipher Resource Overhead at the Link Layer Security Framework in the Wireless Sensor Networks Devesh C. Jinwala, Dhiren R. Patel and Kankar S. Dasgupta, data collected from different sensor nodes. Since the Abstract—The security requirements in Wireless Sensor processing of the data is done on-the-fly, while being Networks (WSNs) and the mechanisms to support the transmitted to the base station; the overall communication requirements, demand a critical examination. Therefore, the costs are reduced [2]. Due to the multi-hop communication security protocols employed in WSNs should be so designed, as and the in-network processing demanding applications, the to yield the optimum performance. The efficiency of the block cipher is, one of the important factors in leveraging the conventional end-to-end security mechanisms are not performance of any security protocol. feasible for the WSN [3]. Hence, the use of the standard In this paper, therefore, we focus on the issue of optimizing end-to-end security protocols like SSH, SSL [4] or IPSec [5] the security vs. performance tradeoff in the security protocols in WSN environment is rejected. Instead, appropriate link in WSNs. As part of the exercise, we evaluate the storage layer security architecture, with low associated overhead is requirements of the block ciphers viz. the Advanced Encryption required. Standard (AES) cipher Rijndael, the Corrected Block Tiny Encryption Algorithm (XXTEA) using the Output Codebook There are a number of research attempts that aim to do so.
    [Show full text]
  • Design Development and Performance Evaluation of Low Complexity Cryptographic Algorithm for Security in IOT
    7 III March 2019 http://doi.org/10.22214/ijraset.2019.3454 International Journal for Research in Applied Science & Engineering Technology (IJRASET) ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 6.887 Volume 7 Issue III, Mar 2019- Available at www.ijraset.com Design Development and Performance Evaluation of Low Complexity Cryptographic Algorithm for Security in IOT Neha Parashar1, Rajveer Singh2 1, 2Rajasthan College of Engineering for Women Abstract: Internet of Things (IoT) is promising future technology is expected to connect billions of devices. Expected to produce more communication Data peaks and data security can be a threat. This The size of the device in this architecture is basically small, Low power consumption. Traditional encryption algorithm in general Due to its complexity and requirements, it is computationally expensive Many rounds of encryption are basically a waste of constraints Gadget energy. Less complicated algorithm, however, possible Compromise required integrity. It is a 64-bit block password that requires a 64-bit key to encrypt data. The architecture of the algorithm is a mixture of feistel and a uniform replacement - to replace the network Simulation. The results show that the algorithm provides just a substantial security five rounds of encryption. Index Terms: IoT, Security; Encryption; Wireless Sensor Network, WSN, I. INTRODUCTION Internet of Things (IoT) is turning into one Emerging research and practice areas of discussion in recent years of implementation. Internet of Things is a model including the general ability to perceive entities Communicate with other devices using the Internet [1]. Due to Broadband Internet is now generally available at its cost the connection is also reduced, with more gadgets and sensors connecting to it [2].
    [Show full text]
  • Protocol Failure in the Escrowed Encryption Standard
    Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories [email protected] August 20, 1994 Abstract The proposal, called the Escrowed Encryption Stan- dard (EES) [NIST94], includes several unusual fea- The Escrowed Encryption Standard (EES) de¯nes tures that have been the subject of considerable de- a US Government family of cryptographic processors, bate and controversy. The EES cipher algorithm, popularly known as \Clipper" chips, intended to pro- called \Skipjack", is itself classi¯ed, and implemen- tect unclassi¯ed government and private-sector com- tations of the cipher are available to the private sec- munications and data. A basic feature of key setup be- tor only within tamper-resistant modules supplied by tween pairs of EES processors involves the exchange of government-approved vendors. Software implementa- a \Law Enforcement Access Field" (LEAF) that con- tions of the cipher will not be possible. Although Skip- tains an encrypted copy of the current session key. The jack, which was designed by the US National Security LEAF is intended to facilitate government access to Agency (NSA), was reviewed by a small panel of civil- the cleartext of data encrypted under the system. Sev- ian experts who were granted access to the algorithm, eral aspects of the design of the EES, which employs a the cipher cannot be subjected to the degree of civilian classi¯ed cipher algorithm and tamper-resistant hard- scrutiny ordinarily given to new encryption systems. ware, attempt to make it infeasible to deploy the sys- By far the most controversial aspect of the EES tem without transmitting the LEAF.
    [Show full text]
  • KLEIN: a New Family of Lightweight Block Ciphers
    KLEIN: A New Family of Lightweight Block Ciphers Zheng Gong1, Svetla Nikova1;2 and Yee Wei Law3 1Faculty of EWI, University of Twente, The Netherlands fz.gong, [email protected] 2 Dept. ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Belgium 3 Department of EEE, The University of Melbourne, Australia [email protected] Abstract Resource-efficient cryptographic primitives become fundamental for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, we describe a new family of lightweight block ciphers named KLEIN, which is designed for resource-constrained devices such as wireless sensors and RFID tags. Compared to the related proposals, KLEIN has ad- vantage in the software performance on legacy sensor platforms, while its hardware implementation can be compact as well. Key words. Block cipher, Wireless sensor network, Low-resource implementation. 1 Introduction With the development of wireless communication and embedded systems, we become increasingly de- pendent on the so called pervasive computing; examples are smart cards, RFID tags, and sensor nodes that are used for public transport, pay TV systems, smart electricity meters, anti-counterfeiting, etc. Among those applications, wireless sensor networks (WSNs) have attracted more and more attention since their promising applications, such as environment monitoring, military scouting and healthcare. On resource-limited devices the choice of security algorithms should be very careful by consideration of the implementation costs. Symmetric-key algorithms, especially block ciphers, still play an important role for the security of the embedded systems.
    [Show full text]
  • Data Encryption Routines for the PIC18
    AN953 Data Encryption Routines for the PIC18 Author: David Flowers ENCRYPTION MODULE OVERVIEW Microchip Technology Inc. • Four algorithms to choose from, each with their own benefits INTRODUCTION • Advanced Encryption Standard (AES) This Application Note covers four encryption - Modules available in C, Assembly and algorithms: AES, XTEA, SKIPJACK® and a simple Assembly written for C encryption algorithm using a pseudo-random binary - Allows user to decide to include encoder, sequence generator. The science of cryptography decoder or both dates back to ancient Egypt. In today’s era of informa- - Allows user to pre-program a decryption key tion technology where data is widely accessible, into the code or use a function to calculate sensitive material, especially electronic data, needs to the decryption key be encrypted for the user’s protection. For example, a • Tiny Encryption Algorithm version 2 (XTEA) network-based card entry door system that logs the persons who have entered the building may be suscep- - Modules available in C and Assembly tible to an attack where the user information can be - Programmable number of iteration cycles stolen or manipulated by sniffing or spoofing the link • SKIPJACK between the processor and the memory storage - Module available in C device. If the information is encrypted first, it has a • Pseudo-random binary sequence generator XOR better chance of remaining secure. Many encryption encryption algorithms provide protection against someone reading - Modules available in C and Assembly the hidden data, as well as providing protection against tampering. In most algorithms, the decryption process - Allows user to change the feedback taps at will cause the entire block of information to be run-time destroyed if there is a single bit error in the block prior - KeyJump breaks the regular cycle of the to to decryption.
    [Show full text]
  • Development of the Advanced Encryption Standard
    Volume 126, Article No. 126024 (2021) https://doi.org/10.6028/jres.126.024 Journal of Research of the National Institute of Standards and Technology Development of the Advanced Encryption Standard Miles E. Smid Formerly: Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD 20899, USA [email protected] Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world. This publication discusses the development of Federal Information Processing Standards Publication (FIPS) 197, which specifies a cryptographic algorithm known as the Advanced Encryption Standard (AES). The AES was the result of a cooperative multiyear effort involving the U.S. government, industry, and the academic community. Several difficult problems that had to be resolved during the standard’s development are discussed, and the eventual solutions are presented. The author writes from his viewpoint as former leader of the Security Technology Group and later as acting director of the Computer Security Division at the National Institute of Standards and Technology, where he was responsible for the AES development. Key words: Advanced Encryption Standard (AES); consensus process; cryptography; Data Encryption Standard (DES); security requirements, SKIPJACK. Accepted: June 18, 2021 Published: August 16, 2021; Current Version: August 23, 2021 This article was sponsored by James Foti, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST). The views expressed represent those of the author and not necessarily those of NIST. https://doi.org/10.6028/jres.126.024 1. Introduction In the late 1990s, the National Institute of Standards and Technology (NIST) was about to decide if it was going to specify a new cryptographic algorithm standard for the protection of U.S.
    [Show full text]
  • State of the Art in Lightweight Symmetric Cryptography
    State of the Art in Lightweight Symmetric Cryptography Alex Biryukov1 and Léo Perrin2 1 SnT, CSC, University of Luxembourg, [email protected] 2 SnT, University of Luxembourg, [email protected] Abstract. Lightweight cryptography has been one of the “hot topics” in symmetric cryptography in the recent years. A huge number of lightweight algorithms have been published, standardized and/or used in commercial products. In this paper, we discuss the different implementation constraints that a “lightweight” algorithm is usually designed to satisfy. We also present an extensive survey of all lightweight symmetric primitives we are aware of. It covers designs from the academic community, from government agencies and proprietary algorithms which were reverse-engineered or leaked. Relevant national (nist...) and international (iso/iec...) standards are listed. We then discuss some trends we identified in the design of lightweight algorithms, namely the designers’ preference for arx-based and bitsliced-S-Box-based designs and simple key schedules. Finally, we argue that lightweight cryptography is too large a field and that it should be split into two related but distinct areas: ultra-lightweight and IoT cryptography. The former deals only with the smallest of devices for which a lower security level may be justified by the very harsh design constraints. The latter corresponds to low-power embedded processors for which the Aes and modern hash function are costly but which have to provide a high level security due to their greater connectivity. Keywords: Lightweight cryptography · Ultra-Lightweight · IoT · Internet of Things · SoK · Survey · Standards · Industry 1 Introduction The Internet of Things (IoT) is one of the foremost buzzwords in computer science and information technology at the time of writing.
    [Show full text]
  • Flare-‐On 4: Challenge 12 Solution – [Missing]
    Flare-On 4: Challenge 12 Solution – [missing] Challenge Author: Jay Smith (@jay_smif) In this challenge, the scenario presented is that we’ve been breached and an attacker has stolen the real challenge 12 binary. We’re tasked with analyzing the given malware and network packet capture (pcap) file to recover the original challenge and extract its key. This requires reverse engineering several files and then applying our knowledge to developing a tool to analyze malware network traffic. I had a lot of fun writing this challenge, incorporating a lot from malware families I’ve encountered over the years. For those who completed the challenge: congratulations! Note that in addition to this solution we’re providing a parsing script and the results of running the script over the network data. Initial Overview Looking first at the pcap in Wireshark we see that the pcap contains only two TCP streams. The first stream contains an HTTP GET request and response for /secondstage, shown in Figure 1. The contents appear to be random binary data, so it is likely encoded. Save this HTTP object (MD5 128321c4fe1dfc7ff25484d813c838b1) for later. FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | [email protected] | www.FireEye.com 1 Figure 1: HTTP Stream The second TCP stream in Figure 2 contains a binary protocol. Some obvious repetitions and possible structure are visible from simple inspection. We’ll be referring back to this during analysis to help confirm our suspicions while reversing the malware. FireEye, Inc., 1440 McCarthy Blvd., Milpitas, CA 95035 | +1 408.321.6300 | +1 877.FIREEYE (347.3393) | [email protected] | www.FireEye.com 2 Figure 2: Binary Stream We’re tasked with analyzing the pcap, which means reconstructing the TCP streams.
    [Show full text]
  • A Lightweight Encryption Algorithm for Secure Internet of Things
    Pre-Print Version, Original article is available at (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 8, No. 1, 2017 SIT: A Lightweight Encryption Algorithm for Secure Internet of Things Muhammad Usman∗, Irfan Ahmedy, M. Imran Aslamy, Shujaat Khan∗ and Usman Ali Shahy ∗Faculty of Engineering Science and Technology (FEST), Iqra University, Defence View, Karachi-75500, Pakistan. Email: fmusman, [email protected] yDepartment of Electronic Engineering, NED University of Engineering and Technology, University Road, Karachi 75270, Pakistan. Email: firfans, [email protected], [email protected] Abstract—The Internet of Things (IoT) being a promising and apply analytics to share the most valuable data with the technology of the future is expected to connect billions of devices. applications. The IoT is taking the conventional internet, sensor The increased number of communication is expected to generate network and mobile network to another level as every thing mountains of data and the security of data can be a threat. The will be connected to the internet. A matter of concern that must devices in the architecture are essentially smaller in size and be kept under consideration is to ensure the issues related to low powered. Conventional encryption algorithms are generally confidentiality, data integrity and authenticity that will emerge computationally expensive due to their complexity and requires many rounds to encrypt, essentially wasting the constrained on account of security and privacy [4]. energy of the gadgets. Less complex algorithm, however, may compromise the desired integrity. In this paper we propose a A. Applications of IoT: lightweight encryption algorithm named as Secure IoT (SIT).
    [Show full text]
  • Meet-In-The-Middle Attacks on Reduced-Round XTEA*
    Meet-in-the-Middle Attacks on Reduced-Round XTEA⋆ Gautham Sekar⋆⋆, Nicky Mouha⋆ ⋆ ⋆, Vesselin Velichkov†, and Bart Preneel 1 Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001 Heverlee, Belgium. 2 Interdisciplinary Institute for BroadBand Technology (IBBT), Belgium. {Gautham.Sekar,Nicky.Mouha,Vesselin.Velichkov, Bart.Preneel}@esat.kuleuven.be Abstract. The block cipher XTEA, designed by Needham and Wheeler, was published as a technical report in 1997. The cipher was a result of fixing some weaknesses in the cipher TEA (also designed by Wheeler and Needham), which was used in Microsoft’s Xbox gaming console. XTEA is a 64-round Feistel cipher with a block size of 64 bits and a key size of 128 bits. In this paper, we present meet-in-the-middle attacks on twelve vari- ants of the XTEA block cipher, where each variant consists of 23 rounds. Two of these require only 18 known plaintexts and a computational ef- fort equivalent to testing about 2117 keys, with a success probability of 1−2 −1025. Under the standard (single-key) setting, there is no attack re- ported on 23 or more rounds of XTEA, that requires less time and fewer data than the above. This paper also discusses a variant of the classical meet-in-the-middle approach. All attacks in this paper are applicable to XETA as well, a block cipher that has not undergone public analysis yet. TEA, XTEA and XETA are implemented in the Linux kernel. Keywords: Cryptanalysis, block cipher, meet-in-the-middle attack, Feis- tel network, XTEA, XETA.
    [Show full text]
  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
    Applications of search techniques to cryptanalysis and the construction of cipher components. James David McLaughlin Submitted for the degree of Doctor of Philosophy (PhD) University of York Department of Computer Science September 2012 2 Abstract In this dissertation, we investigate the ways in which search techniques, and in particular metaheuristic search techniques, can be used in cryptology. We address the design of simple cryptographic components (Boolean functions), before moving on to more complex entities (S-boxes). The emphasis then shifts from the construction of cryptographic arte- facts to the related area of cryptanalysis, in which we first derive non-linear approximations to S-boxes more powerful than the existing linear approximations, and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent. Contents 1 Introduction. 11 1.1 The Structure of this Thesis . 12 2 A brief history of cryptography and cryptanalysis. 14 3 Literature review 20 3.1 Information on various types of block cipher, and a brief description of the Data Encryption Standard. 20 3.1.1 Feistel ciphers . 21 3.1.2 Other types of block cipher . 23 3.1.3 Confusion and diffusion . 24 3.2 Linear cryptanalysis. 26 3.2.1 The attack. 27 3.3 Differential cryptanalysis. 35 3.3.1 The attack. 39 3.3.2 Variants of the differential cryptanalytic attack . 44 3.4 Stream ciphers based on linear feedback shift registers . 48 3.5 A brief introduction to metaheuristics . 52 3.5.1 Hill-climbing . 55 3.5.2 Simulated annealing . 57 3.5.3 Memetic algorithms . 58 3.5.4 Ant algorithms .
    [Show full text]