PRACTICAL COLLISIONS FOR WIDEA-8
Kerem Varıcı KU Leuven / COSIC
Session ID: CRYP-R31 Session Classification: Advanced OUTLINE
► Introduction ► Collisions for the WIDEA-8 ► Results and Remarks
▶ Presenter Logo OUTLINE
► Introduction ► Collisions for the WIDEA-8 ► Results and Remarks
▶ Presenter Logo Introduction ( WIDEA )
► Widea - a family of block ciphers ► Inspired by IDEA block cipher ► Designed by Junod and Macchetti ► Presented in FSE’09 ► Suggested to use as compression function for hash function in Davies - Mayer mode ► Competitive efciency with most of the hash functions
▶ Presenter Logo IDEA X1 X2 X3 X4 (1) (1) (1) (1) Z1 Z2 Z3 Z4 ► Designed by Lai and Massey
in 1991 (1) Z5
► 64-bit block size (1) Z6 ► 128-bit key size ► 8.5 rounds ► Widely implemented
► 20+ security analysis ( 7 more rounds ) ► Secure except weak keys
(9) (9) (9) (9) Z1 Z2 Z3 Z4
Y1 Y2 Y3 Y4
▶ Presenter Logo (i) (i) (i) (i) x0,1 x1,1 x2,1 x3,1
WIDEA-n (i) (i) (i) (i) x0,n x1,n x2,n x3,n
Z0,1 Z1,1 Z2,1 Z3,1
► Composed of n parallel Z0,n Z1,n Z2,n Z3,n applications of IDEA connected with an MDS matrix. Z4,1 MA-Box Z4,n
► 64×n bits block size MDS Z5,1 ► 64×2n key size Z5,n ► 8.5 rounds
(i+1) (i+1) x2,1 x3,1
(i+1) (i+1) (i+1) (i+1) x0,n x1,n x2,n x3,n
▶ Presenter Logo Davies-Meyer Mode
► Proposed to construct hash functions from block ciphers ► Most widely used hash functions, including MD5, SHA-1 and mi SHA-2 use this construction
hi 1 hi
▶ Presenter Logo OUTLINE
► Introduction ► Collisions for the WIDEA-8 ► Attack strategy ► Application of theory to practice ► Extending the attack to full WIDEA-8 ► Results and Remarks
▶ Presenter Logo Attack strategy - I
I I 0 I
▶ Presenter Logo Attack strategy - II
Characteristic Z1 Z4 Z5 Z6 (0,0,0,△) ⇒ (△,△,△,0) - ±1 - ±1 X1 X2 X3 X4 (0,0,△,0) ⇒ (△,0,0,0) - - ±1 ±1 (1) (1) (1) (1) (0,0,△,△) ⇒ (0,△,△,0) - ±1 ±1 - Z1 Z2 Z3 Z4 (0,△,0,0) ⇒ (△,△,0,△) - - - ±1 (0,△,0,△) ⇒ (0,0,△,△) - ±1 - - (0,△,△,0) ⇒ (0,△,0,△) - - ±1 - (1) Z5 (0,△,△,△) ⇒ (△,0,△,△) - ±1 ±1 ±1 (△,0,0,0) ⇒) (0,△,0,0) ±1 - ±1 ±1 Z(1) 6 (△,0,0,△) ⇒ (△,0,△,0) ±1 ±1 ±1 - (△,0,△,0) ⇒ (△,△,0,0) ±1 - - - (△,0,△,△) ⇒ (0,0,△,0) ±1 ±1 - ±1 (△,△,0,0) ⇒ (△,0,0,△) ±1 - ±1 - (△,△,0,△) ⇒ (0,△,△,△) ±1 ±1 ±1 ±1
( 7 more rounds ) (△,△,△,0) ⇒ (0,0,0,△) ±1 - - ±1 (△,△,△,△) ⇒ (△,△,△,△) ±1 ±1 - -
▶ Presenter (9) (9) (9) (9) Z1 Z2 Z3 Z4 Logo
Y1 Y2 Y3 Y4 Attack strategy - III
Observation 1 The parallel instances of IDEA are only connected by the MDS matrix in the MA- box and hence if we can find a characteristic for one lane where the MA-box is never active, the attack is reduced of attacking only
MDS one lane instead of all eight.
Observation 2
Given any eight consecutive subkeys {Zi+1,
Zi+2, ..., Zi+8} it is possible to construct the whole set of subkeys.
▶ Presenter Logo Theory to practice