Guidance for Submissions(104

Total Page:16

File Type:pdf, Size:1020Kb

Guidance for Submissions(104 Guidance for Submissions in 2001 (Provisional Translation) Information-technology Promotion Agency, Japan Telecommunications Advancement Organization of Japan August 1, 2001 Contents 1. Objective ............................................................................................................ 1 2. Outline and schedule ........................................................................................ 2 2.1 Outline of the project ................................................................................ 2 2.2 Schedule .................................................................................................... 2 3. The Categories of Solicited Cryptographic Technique .................................... 3 3.1 Follow-up evaluation candidate and newly submitted technique ......... 3 3.2 Classification of cryptographic technologies ........................................... 4 4. Evaluation Items .............................................................................................. 6 4.1 Asymmetric Cryptographic Schemes ....................................................... 6 4.2 Symmetric Ciphers ................................................................................... 7 4.3 Hash Functions ......................................................................................... 8 4.4 Pseudo-Random Number Generators ...................................................... 8 5. Documents for Submission .............................................................................. 9 6. Remarks .......................................................................................................... 18 7. How to make the submission .......................................................................... 19 Reference ............................................................................................................. 20 Appendix A Application Form ......................................................................... 24 Appendix B Information on the public availability status of specification .... 25 Appendix C Self checklist ................................................................................ 26 Guidance for Submissions (Provisional translation) August 1, 2001 Information-technology Promotion Agency, Japan(IPA) Telecommunications Advancement Organization of Japan(TAO) 1. Objective The Japanese government aims at joining in the most advanced IT nations in the world within the next 5 years as a consequence of executing e-Japan Strategy. We have to ensure the security and reliability of the advanced info-communications networks in Japan for realization of our target. In particular, unbiased evaluation and standardization of cryptographic techniques are required as a basic item for the spread of digital authentication schemes like digital signatures and consequently for the construction of the electronic government, which is the governmental execution of e-Japan Strategy. For this reason, following the last year project, we call for submitting cryptographic techniques, scrutinize the submitted cryptographic techniques, evaluate their security and performance and publicize the results as the CRYPTREC report 2001. The CRYPTREC report 2001 is supposed to be employed by Japanese government in many ways for their selection of cryptographic techniques used for constructing the electronic government. 1/27 2. Outline and schedule 2.1 Outline of the project (1) Requested by the CRYPTREC Advisory Committee, which is held by the ministry of public management, home affairs, posts and telecommunications and the ministry of economy, trade and industry, the secretariat of the CRYPTREC project consisting of TAO and IPA organizes the CRYPTREC Evaluation Committee consisting of experts in cryptology and evaluate the submitted cryptographic techniques. (2) Some of the cryptographic techniques that were evaluated last year and judged to deserve further evaluation will be advanced to the full evaluation phase this year. Newly submitted cryptographic techniques in 2001 will be a subject of the screening evaluation. Only cryptographic techniques that pass the screening evaluation will advance to the full evaluation phase executed after April of 2002. (3) We evaluate security and software and hardware implementation of the submitted cryptographic techniques referring the existing academic literature in cryptology and investigation carried out by the experts nominated by the CRYPTREC Evaluation Committee. The results will be publicized even though these may disadvantage some applicants. (4) Besides evaluation of the submitted cryptographic techniques, the activity of CRYPTREC in this year contains the investigation of the cryptographic techniques that are judged to deserve evaluation by the CRYPTREC evaluation committee. No public submission is solicited for this special evaluation. 2.2 Schedule The tentative schedule is set as follows. - Deadline for submissions: September 27, 2001 17:00 (Japan Standard Time) *A submission should be received by the CRYPTREC secretariat before September 27, 17:00 (JST). Only a postal mail or parcel delivery will be accepted. - Screening evaluation and follow-up evaluation: October, 2001 ~ March, 2002 - CRYPTREC submission explanation meeting: October 9 and 10, 2001 9th of October: Symmetric key cryptographic techniques 10th of October: Asymmetric key cryptographic techniques *This will be open to the public. All applicants shall present their submissions. - CRYPTREC workshop: January 2002 - Publication of CRYPTREC Report 2001: March 2002 2/27 3. The Categories of Solicited Cryptographic Techniques 3.1 Follow-up evaluation candidate and newly submitted technique Any submitted cryptographic technique shall be supplied by the applicant or another developer not later than March 2003 for construction of the electronic government. The evaluation policy will be announced and the evaluation will be carried out based on the policy. The results will be publicized. (1) Remarks on new submissions i) The specification and other information on the submitted cryptographic techniques shall be disclosed to the public by the deadline for the submission (September/27). Please inform the secretariat of any obstacle to make the submission public by the 10th of September if any. ii) A submission shall be a cryptographic technique that can be implemented by third parties in and out of Japan. In addition, the submission should be restricted to the one whose specification and information is public and possible to be evaluated. iii) The submitted cryptographic technique should possess certain features (for security or performance) that make itself superior or equal to the existing cryptographic techniques fully evaluated for CRYPTREC project in the year 2000*. *Refer to “CRYPTREC report 2000” given in http://www.ipa.go.jp/security/enc/CRYPTREC/index.html iv) Only one cryptographic technique shall be submitted for one category. If you submit more than one technique belonging to one category, those techniques should be designed using distinct principles. Moreover, if a submission has more than one function in several categories of the classification described in Section 3.2, the applicant is asked to choose one category that is most appropriate to the submission for the submission. v) Newly submitted cryptographic techniques in 2001 will be in the screening evaluation phase this year. Only cryptographic techniques that pass screening evaluation phase will advance to the full evaluation phase executed after April of 2002. (2) Remarks on follow-up evaluation i) The subjects of the full evaluation this year will be the cryptographic techniques which were fully evaluated in 2000 and the CRYPTREC evaluation committee judged to deserve further evaluation*. Moreover, the applicant should express their will to continue follow-up evaluation process, and the status of availability should be clarified. *The CRYPTREC evaluation committee will notice to each applicant that the submission will be advanced to the follow-up evaluation. ii) The applicant of the subject of the follow-up evaluation is asked to give in the 3/27 materials described in Section 5. iii) The CRYPTREC evaluation committee may regard a submission as new if the specifications are substantially updated (change of parameters, algorithms, auxiliary functions and so on). 3.2 Classification of cryptographic technologies A submitted cryptographic technique shall belong to one of the categories. (1) Asymmetric Cryptographic Schemes We solicit asymmetric cryptographic schemes possessing one of the following objectives; confidentiality, authentication, signature, and key agreement. A scheme shall have at least one software implementation. An asymmetric cryptographic scheme here means a synthetic algorithm consisting of a cryptographic primitive and several auxiliary functions. Requirements of the cryptographic primitives, the auxiliary functions and the description of the comprehensive algorithm are required to be presented. A cryptographic primitive is a mathematical assumption that a submitted cryptographic technique is based on. For example, a primitive may be an algorithmic problem related to the integer factoring problem, the discrete logarithm problem of the multiplicative group of finite fields or the group of rational points on an elliptic curve, or another intractable problem. An auxiliary function is a necessary element to construct a scheme such as a hash function or a pseudorandom number generator. If a submission employs
Recommended publications
  • Vector Boolean Functions: Applications in Symmetric Cryptography
    Vector Boolean Functions: Applications in Symmetric Cryptography José Antonio Álvarez Cubero Departamento de Matemática Aplicada a las Tecnologías de la Información y las Comunicaciones Universidad Politécnica de Madrid This dissertation is submitted for the degree of Doctor Ingeniero de Telecomunicación Escuela Técnica Superior de Ingenieros de Telecomunicación November 2015 I would like to thank my wife, Isabel, for her love, kindness and support she has shown during the past years it has taken me to finalize this thesis. Furthermore I would also liketo thank my parents for their endless love and support. Last but not least, I would like to thank my loved ones such as my daughter and sisters who have supported me throughout entire process, both by keeping me harmonious and helping me putting pieces together. I will be grateful forever for your love. Declaration The following papers have been published or accepted for publication, and contain material based on the content of this thesis. 1. [7] Álvarez-Cubero, J. A. and Zufiria, P. J. (expected 2016). Algorithm xxx: VBF: A library of C++ classes for vector Boolean functions in cryptography. ACM Transactions on Mathematical Software. (In Press: http://toms.acm.org/Upcoming.html) 2. [6] Álvarez-Cubero, J. A. and Zufiria, P. J. (2012). Cryptographic Criteria on Vector Boolean Functions, chapter 3, pages 51–70. Cryptography and Security in Computing, Jaydip Sen (Ed.), http://www.intechopen.com/books/cryptography-and-security-in-computing/ cryptographic-criteria-on-vector-boolean-functions. (Published) 3. [5] Álvarez-Cubero, J. A. and Zufiria, P. J. (2010). A C++ class for analysing vector Boolean functions from a cryptographic perspective.
    [Show full text]
  • Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security
    Towards the Generation of a Dynamic Key-Dependent S-Box to Enhance Security 1 Grasha Jacob, 2 Dr. A. Murugan, 3Irine Viola 1Research and Development Centre, Bharathiar University, Coimbatore – 641046, India, [email protected] [Assoc. Prof., Dept. of Computer Science, Rani Anna Govt College for Women, Tirunelveli] 2 Assoc. Prof., Dept. of Computer Science, Dr. Ambedkar Govt Arts College, Chennai, India 3Assoc. Prof., Dept. of Computer Science, Womens Christian College, Nagercoil, India E-mail: [email protected] ABSTRACT Secure transmission of message was the concern of early men. Several techniques have been developed ever since to assure that the message is understandable only by the sender and the receiver while it would be meaningless to others. In this century, cryptography has gained much significance. This paper proposes a scheme to generate a Dynamic Key-dependent S-Box for the SubBytes Transformation used in Cryptographic Techniques. Keywords: Hamming weight, Hamming Distance, confidentiality, Dynamic Key dependent S-Box 1. INTRODUCTION Today communication networks transfer enormous volume of data. Information related to healthcare, defense and business transactions are either confidential or private and warranting security has become more and more challenging as many communication channels are arbitrated by attackers. Cryptographic techniques allow the sender and receiver to communicate secretly by transforming a plain message into meaningless form and then retransforming that back to its original form. Confidentiality is the foremost objective of cryptography. Even though cryptographic systems warrant security to sensitive information, various methods evolve every now and then like mushroom to crack and crash the cryptographic systems. NSA-approved Data Encryption Standard published in 1977 gained quick worldwide adoption.
    [Show full text]
  • Cryptographic Sponge Functions
    Cryptographic sponge functions Guido B1 Joan D1 Michaël P2 Gilles V A1 http://sponge.noekeon.org/ Version 0.1 1STMicroelectronics January 14, 2011 2NXP Semiconductors Cryptographic sponge functions 2 / 93 Contents 1 Introduction 7 1.1 Roots .......................................... 7 1.2 The sponge construction ............................... 8 1.3 Sponge as a reference of security claims ...................... 8 1.4 Sponge as a design tool ................................ 9 1.5 Sponge as a versatile cryptographic primitive ................... 9 1.6 Structure of this document .............................. 10 2 Definitions 11 2.1 Conventions and notation .............................. 11 2.1.1 Bitstrings .................................... 11 2.1.2 Padding rules ................................. 11 2.1.3 Random oracles, transformations and permutations ........... 12 2.2 The sponge construction ............................... 12 2.3 The duplex construction ............................... 13 2.4 Auxiliary functions .................................. 15 2.4.1 The absorbing function and path ...................... 15 2.4.2 The squeezing function ........................... 16 2.5 Primary aacks on a sponge function ........................ 16 3 Sponge applications 19 3.1 Basic techniques .................................... 19 3.1.1 Domain separation .............................. 19 3.1.2 Keying ..................................... 20 3.1.3 State precomputation ............................ 20 3.2 Modes of use of sponge functions .........................
    [Show full text]
  • Security Evaluation of the K2 Stream Cipher
    Security Evaluation of the K2 Stream Cipher Editors: Andrey Bogdanov, Bart Preneel, and Vincent Rijmen Contributors: Andrey Bodganov, Nicky Mouha, Gautham Sekar, Elmar Tischhauser, Deniz Toz, Kerem Varıcı, Vesselin Velichkov, and Meiqin Wang Katholieke Universiteit Leuven Department of Electrical Engineering ESAT/SCD-COSIC Interdisciplinary Institute for BroadBand Technology (IBBT) Kasteelpark Arenberg 10, bus 2446 B-3001 Leuven-Heverlee, Belgium Version 1.1 | 7 March 2011 i Security Evaluation of K2 7 March 2011 Contents 1 Executive Summary 1 2 Linear Attacks 3 2.1 Overview . 3 2.2 Linear Relations for FSR-A and FSR-B . 3 2.3 Linear Approximation of the NLF . 5 2.4 Complexity Estimation . 5 3 Algebraic Attacks 6 4 Correlation Attacks 10 4.1 Introduction . 10 4.2 Combination Generators and Linear Complexity . 10 4.3 Description of the Correlation Attack . 11 4.4 Application of the Correlation Attack to KCipher-2 . 13 4.5 Fast Correlation Attacks . 14 5 Differential Attacks 14 5.1 Properties of Components . 14 5.1.1 Substitution . 15 5.1.2 Linear Permutation . 15 5.2 Key Ideas of the Attacks . 18 5.3 Related-Key Attacks . 19 5.4 Related-IV Attacks . 20 5.5 Related Key/IV Attacks . 21 5.6 Conclusion and Remarks . 21 6 Guess-and-Determine Attacks 25 6.1 Word-Oriented Guess-and-Determine . 25 6.2 Byte-Oriented Guess-and-Determine . 27 7 Period Considerations 28 8 Statistical Properties 29 9 Distinguishing Attacks 31 9.1 Preliminaries . 31 9.2 Mod n Cryptanalysis of Weakened KCipher-2 . 32 9.2.1 Other Reduced Versions of KCipher-2 .
    [Show full text]
  • Fast Correlation Attacks: Methods and Countermeasures
    Fast Correlation Attacks: Methods and Countermeasures Willi Meier FHNW, Switzerland Abstract. Fast correlation attacks have considerably evolved since their first appearance. They have lead to new design criteria of stream ciphers, and have found applications in other areas of communications and cryp- tography. In this paper, a review of the development of fast correlation attacks and their implications on the design of stream ciphers over the past two decades is given. Keywords: stream cipher, cryptanalysis, correlation attack. 1 Introduction In recent years, much effort has been put into a better understanding of the design and security of stream ciphers. Stream ciphers have been designed to be efficient either in constrained hardware or to have high efficiency in software. A synchronous stream cipher generates a pseudorandom sequence, the keystream, by a finite state machine whose initial state is determined as a function of the secret key and a public variable, the initialization vector. In an additive stream cipher, the ciphertext is obtained by bitwise addition of the keystream to the plaintext. We focus here on stream ciphers that are designed using simple devices like linear feedback shift registers (LFSRs). Such designs have been the main tar- get of correlation attacks. LFSRs are easy to implement and run efficiently in hardware. However such devices produce predictable output, and cannot be used directly for cryptographic applications. A common method aiming at destroy- ing the predictability of the output of such devices is to use their output as input of suitably designed non-linear functions that produce the keystream. As the attacks to be described later show, care has to be taken in the choice of these functions.
    [Show full text]
  • Stream Cipher Designs: a Review
    SCIENCE CHINA Information Sciences March 2020, Vol. 63 131101:1–131101:25 . REVIEW . https://doi.org/10.1007/s11432-018-9929-x Stream cipher designs: a review Lin JIAO1*, Yonglin HAO1 & Dengguo FENG1,2* 1 State Key Laboratory of Cryptology, Beijing 100878, China; 2 State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China Received 13 August 2018/Accepted 30 June 2019/Published online 10 February 2020 Abstract Stream cipher is an important branch of symmetric cryptosystems, which takes obvious advan- tages in speed and scale of hardware implementation. It is suitable for using in the cases of massive data transfer or resource constraints, and has always been a hot and central research topic in cryptography. With the rapid development of network and communication technology, cipher algorithms play more and more crucial role in information security. Simultaneously, the application environment of cipher algorithms is in- creasingly complex, which challenges the existing cipher algorithms and calls for novel suitable designs. To accommodate new strict requirements and provide systematic scientific basis for future designs, this paper reviews the development history of stream ciphers, classifies and summarizes the design principles of typical stream ciphers in groups, briefly discusses the advantages and weakness of various stream ciphers in terms of security and implementation. Finally, it tries to foresee the prospective design directions of stream ciphers. Keywords stream cipher, survey, lightweight, authenticated encryption, homomorphic encryption Citation Jiao L, Hao Y L, Feng D G. Stream cipher designs: a review. Sci China Inf Sci, 2020, 63(3): 131101, https://doi.org/10.1007/s11432-018-9929-x 1 Introduction The widely applied e-commerce, e-government, along with the fast developing cloud computing, big data, have triggered high demands in both efficiency and security of information processing.
    [Show full text]
  • Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt
    Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt Nicolas T. Courtois Cryptography research, Schlumberger Smart Cards, 36-38 rue de la Princesse, BP 45, 78430 Louveciennes Cedex, France http://www.nicolascourtois.net [email protected] Abstract. Many stream ciphers are built of a linear sequence generator and a non-linear output function f. There is an abundant literature on (fast) correlation attacks, that use linear approximations of f to attack the cipher. In this paper we explore higher degree approximations, much less studied. We reduce the cryptanalysis of a stream cipher to solv- ing a system of multivariate equations that is overdefined (much more equations than unknowns). We adapt the XL method, introduced at Eurocrypt 2000 for overdefined quadratic systems, to solving equations of higher degree. Though the exact complexity of XL remains an open problem, there is no doubt that it works perfectly well for such largely overdefined systems as ours, and we confirm this by computer simula- tions. We show that using XL, it is possible to break stream ciphers that were known to be immune to all previously known attacks. For exam- ple, we cryptanalyse the stream cipher Toyocrypt accepted to the second phase of the Japanese government Cryptrec program. Our best attack on Toyocrypt takes 292 CPU clocks for a 128-bit cipher. The interesting feature of our XL-based higher degree correlation attacks is, their very loose requirements on the known keystream needed. For example they may work knowing ONLY that the ciphertext is in English. Key Words: Algebraic cryptanalysis, multivariate equations, overde- fined equations, Reed-Muller codes, correlation immunity, XL algorithm, Gr¨obner bases, stream ciphers, pseudo-random generators, nonlinear fil- tering, ciphertext-only attacks, Toyocrypt, Cryptrec.
    [Show full text]
  • Development of a Model for Applying Correlation Cryptanalysis to Filtering Generators
    NOVATEUR PUBLICATIONS JournalNX- A Multidisciplinary Peer Reviewed Journal ISSN No: 2581 - 4230 VOLUME 6, ISSUE 5, May -2020 DEVELOPMENT OF A MODEL FOR APPLYING CORRELATION CRYPTANALYSIS TO FILTERING GENERATORS ABDURAKHIMOV BAKHTIYOR FAYZIEVICH Professor, Doctor of Physics and Mathematics, National university of Uzbekistan, +998935143137, [email protected] BOYKUZIEV ILKHOM MARDANAKULOVICH PhD Student, National university of Uzbekistan, +998909779300, [email protected] SHONAZAROV SOATMUROD KULMURODOVICH Teacher, Termez state university, +998996760166, [email protected] ZIYAKULOVA SHAKHNOZA ABDURASULOVNA Teacher, Termez state university, +998905208923, [email protected] ABSTRACT: Proposed mathematical model and This article is devoted to problems of software can be used for estimation of cryptanalysis. Cryptographic analysis stability of the algorithm of the flow crypto results, got from using of correlation operation to correlation cryptanalysis, as cryptanalysis method to algorithm of the well as in scholastic purpose. flow crypto operation, founded on register of KEYWORDS: cryptanalysis, stream ciphers, the shift with feedback, were presented in shift registers, LILI-128, filtering, work. For estimation of the flow crypto correlation operation algorithm’s crypto stability by correlation cryptanalysis method, number INTRODUCTION: of important tasks was defined, purposes and problems of the study were determined. Ensuring information security requires As a result of defined tasks decision, relatively fast cryptographic tools, not only as mathematical model and software of the exchange of documentary information correlation cryptanalysis method to flow transmitted over the network increases, but crypto operation to filtering LILI-128 – were also as the exchange of multimedia, that is, video developed. Results has shown, that and audio, increases. Therefore, the use of characteristic of correlation immunity of stream encryption algorithms in local and global filtering functions, used in filtering networks has become an urgent problem[1,2].
    [Show full text]
  • Applications of Search Techniques to Cryptanalysis and the Construction of Cipher Components. James David Mclaughlin Submitted F
    Applications of search techniques to cryptanalysis and the construction of cipher components. James David McLaughlin Submitted for the degree of Doctor of Philosophy (PhD) University of York Department of Computer Science September 2012 2 Abstract In this dissertation, we investigate the ways in which search techniques, and in particular metaheuristic search techniques, can be used in cryptology. We address the design of simple cryptographic components (Boolean functions), before moving on to more complex entities (S-boxes). The emphasis then shifts from the construction of cryptographic arte- facts to the related area of cryptanalysis, in which we first derive non-linear approximations to S-boxes more powerful than the existing linear approximations, and then exploit these in cryptanalytic attacks against the ciphers DES and Serpent. Contents 1 Introduction. 11 1.1 The Structure of this Thesis . 12 2 A brief history of cryptography and cryptanalysis. 14 3 Literature review 20 3.1 Information on various types of block cipher, and a brief description of the Data Encryption Standard. 20 3.1.1 Feistel ciphers . 21 3.1.2 Other types of block cipher . 23 3.1.3 Confusion and diffusion . 24 3.2 Linear cryptanalysis. 26 3.2.1 The attack. 27 3.3 Differential cryptanalysis. 35 3.3.1 The attack. 39 3.3.2 Variants of the differential cryptanalytic attack . 44 3.4 Stream ciphers based on linear feedback shift registers . 48 3.5 A brief introduction to metaheuristics . 52 3.5.1 Hill-climbing . 55 3.5.2 Simulated annealing . 57 3.5.3 Memetic algorithms . 58 3.5.4 Ant algorithms .
    [Show full text]
  • Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,”
    Reference Papers [S1] Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,” FSE2000 [S2] Canteaut, Filiol, “Ciphertext Only Reconstruction of Stream Ciphers based on Combination Generator,” FSE2000 [S3] Chepyzhov, Johansson, Smeets, “A simple algorithm for fast correlation attacks on stream ciphers,” FSE2000 [S4] Ding, “The Differential Cryptanalysis and Design of Natural Stream Ciphers,” Fast Software Encryption, Cambridge Security Workshop, December 1993, LNCS 809 [S5] Ding, Xiao, Sham, “The Stability Theory of Stream Ciphers,” LNCS 561 [S6] Johansson, Jonsson, “Fast correlation attacks based on Turbo code techniques,” CRYPTO’99, August 99, 19th Annual International Cryptology Conference, LNCS 1666 [S7] Fossorier, Mihaljevic, Imai, “Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications,” LNCS 1719. [S8] Golic, “Linear Cryptanalysis of Stream Ciphers,” Fast Software Encryption, Second International Workshop, December 1994, LNCS 1008. [S9] Johansson, Jonsson, “Improved Fast Correlation Attacks in Stream Ciphers via Convolutional codes,” EUROCRYPT’99, International Conference on the Theory and Application of Cryptographic Techniques, May 1999, LNCS 1592 [S10] Meier, Staffelbach, “Correlation Properties of Comniners with Memory in Stream Ciphers,” Journal of Cryptology 5(1992) [S11] Palit, Roy, “Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining,” LNCS 1716 [S12] Ruppel, “Correlation Immunity and Summation Generator,” CRYPTO’85 Proceedings, August 85, LNCS 218. [S13] Sigenthalar, “Decrypting a class of Ciphers using Ciphertext only,” IEEE C-34. [S14] Tanaka, Ohishi, Kaneko, “An Optimized Linear Attack on Pseudorandom Generators using a Non-Linear Combiner, Information Security,” First International Workshop, ISW’97 Proceedings, September 1997, LNCS 1396 [S15] Zeng, Huang, “On the Linear Syndrome Method in Cryptanalysis,” CRYPTO’88 Proceedings, August 1988, LNCS 403.
    [Show full text]
  • Affine-Power S-Boxes Over Galois Fields with Area-Optimized Logic Implementations
    Affine-Power S-Boxes over Galois Fields with Area-Optimized Logic Implementations Christopher A. Wood12, Stanis law P. Radziszowski2, Marcin Lukowiak3 1 Department of Computer Science, UC Irvine 2 Department of Computer Science, Rochester Institute of Technology 3 Department of Computer Engineering, Rochester Institute of Technology Abstract. Cryptographic S-boxes are fundamental in key-iterated sub- stitution permutation network (SPN) designs for block ciphers. As a natural way for realizing Shannon's confusion and diffusion properties in cryptographic primitives through nonlinear and linear behavior, re- spectively, SPN designs served as the basis for the Advanced Encryption Standard and a variety of other block ciphers. In this work we present a methodology for minimizing the logic resources for n-bit affine-power S- boxes over Galois fields based on measurable security properties and find- ing corresponding area-efficient combinational implementations in hard- ware. Motivated by the potential need for new and larger S-boxes, we use our methodology to find area-optimized circuits for 8- and 16-bit S-boxes. Our methodology is capable of finding good upper bounds on the number of XOR and AND gate equivalents needed for these circuits, which can be further optimized using modern CAD tools. Keywords: S-box design and construction, 16-bit S-boxes, composite Galois fields, S-box combinational circuits 1 Introduction In order to enable area-efficient hardware implementations of block ci- phers based on the key-iterated substitution permutation network (SPN) design principle, such as the Advanced Encryption Standard (AES) [13], the logic resources for each component or operation in the algorithm must be reduced as much as feasible.
    [Show full text]
  • Fast Correlation Attacks on Certain Stream Ciphers
    FSE 2011, February 14 -16, Lyngby, Denmark Fast correlation attacks on certain stream ciphers Willi Meier FHNW Switzerland 1 Overview • A decoding problem • LFSR-based stream ciphers • Correlation attacks • Fast correlation attacks • Towards correlation immunity • Combiners with memory • Linear attacks (correlations everywhere?) • Conclusions 2 A decoding problem Given: A noisy version of the output sequence of length L of a LFSR with known length n and known feedback connection. Problem: Find the initial state of the LFSR Solution: Decoding of a linear [ n,L]-code. 3 Statistical Model: BAS zm am LFSR ⊕ bm BAS: Binary asymmetric source, Prob (zm = 0 ) = p > 0.5 4 For given L digits of b and structure of the LFSR of length n: Find correct output sequence a of LFSR Known solution: By exhaustive search over all initial states of LFSR find a such that = = ≤ ≤ T # { j | b j a j 1, j L } is maximum. Complexity: O(2 n) Feasible for n up to about 50 . 5 Efficient solution of this problem of interest in: • Satellite communications • Correlation attacks on LFSR-based stream ciphers • TCHo: An efficient trapdoor stream cipher (M. Finiasz, S. Vaudenay, 2006) • Digital watermarking (D. Wang. P. Lu, 2006) • ε-Biased Generators in NC 0 (E. Mossel, A. Shpilka, L. Trevisan, 2007) 6 LFSR-based stream ciphers Output sequences of linear feedback shift registers (LFSR's): Have desirable statistical properties and large period. Readily analyzable using algebraic techniques, via feedback polynomial. For cryptographic properties, their linearity has to be destroyed. 7 Nonlinear filter generator Generate keystream bits b0, b 1, b2 ,..., as some nonlinear function f of the stages of a single LFSR.
    [Show full text]