<<

- A Candidate Cipher for AES

Masayuki Kanda, Shiho Moriai, Kazumaro Aoki, Hiroki Ueda, Miyako Ohkubo, Youichi Takashima, Kazuo Ohta, Tsutomu Matsumoto*

[email protected] http://info.isl.ntt.co.jp/e2/

Nippon Telegraph and Telephone Corporation (NTT) *Yokohama National University

First AES Candidate Conference Copyright NTT 1998 Outline

· Overview

· Design

· Security

· Performance · Conclusion E2

First AES Candidate Conference Copyright NTT 1998 Design Goals

· A 128-bit symmetric · length of 128, 192, and 256 bits · Security : secure against all known attacks and more · Efficiency : faster than DES · Flexibility : efficient implementations on various platforms

First AES Candidate Conference Copyright NTT 1998 Security of E2 (1)

There are many attacks….

First AES Candidate Conference Copyright NTT 1998 Security of E2 (1)

BruteBrute ForceForce AttacksAttacks

There are many attacks….

First AES Candidate Conference Copyright NTT 1998 Security of E2 (1)

BruteBrute ForceForce AttacksAttacks DifferentialDifferential CryptanalysisCryptanalysis

There are many attacks….

First AES Candidate Conference Copyright NTT 1998 Security of E2 (1)

BruteBrute ForceForce AttacksAttacks DifferentialDifferential LinearLinear CryptanalysisCryptanalysis CryptanalysisCryptanalysis

There are many attacks….

First AES Candidate Conference Copyright NTT 1998 Security of E2 (1)

BruteBrute ForceForce AttacksAttacks DifferentialDifferential LinearLinear CryptanalysisCryptanalysis CryptanalysisCryptanalysis HigherHigher OrderOrder DifferentialDifferential AttackAttack

There are many attacks….

First AES Candidate Conference Copyright NTT 1998 Security of E2 (1)

BruteBrute ForceForce AttacksAttacks DifferentialDifferential LinearLinear CryptanalysisCryptanalysis CryptanalysisCryptanalysis HigherHigher OrderOrder InterpolationInterpolation DifferentialDifferential AttackAttack AttackAttack

There are many attacks….

First AES Candidate Conference Copyright NTT 1998 Security of E2 (1)

BruteBrute ForceForce AttacksAttacks DifferentialDifferential LinearLinear CryptanalysisCryptanalysis CryptanalysisCryptanalysis HigherHigher OrderOrder InterpolationInterpolation PartitioningPartitioning DifferentialDifferential AttackAttack CryptanalysisCryptanalysis AttackAttack

There are many attacks….

First AES Candidate Conference Copyright NTT 1998 Security of E2 (2)

DifferentialDifferential LinearLinear CryptanalysisCryptanalysis CryptanalysisCryptanalysis

E2 E2 is proven to have sufficient security

First AES Candidate Conference Copyright NTT 1998 Security of E2 (3)

DifferentialDifferential LinearLinear CryptanalysisCryptanalysis CryptanalysisCryptanalysis HigherHigher OrderOrder Interpolation Partitioning DifferentialDifferential Interpolation Partitioning Attack AttackAttack Attack Cryptanalysis

E2 S-box is designed to have no vulnerabilities First AES Candidate Conference Copyright NTT 1998 Security of E2 (4)

BruteBrute ForceForce AttacksAttacks

E2 E2 supports 128-bit block size and 128,192, 256-bit key sizes

First AES Candidate Conference Copyright NTT 1998 Design Goals (cont.)

· A 128-bit symmetric block cipher · Key length of 128, 192, and 256 bits · Security : secure against all known attacks and more · Efficiency : faster than DES · Flexibility : efficient implementations on various platforms

First AES Candidate Conference Copyright NTT 1998 Efficiency and Flexibility of E2

32-bit 200MHz Intel Pentium Pro CPU ANSI C Assembly (Borland C++ 5.02) 711 clocks/block 420 clocks/block 36.0 Mbits/sec 61.0 Mbits/sec 64-bit 8-bit CPU CPU 600MHz DEC 21164A 5MHz Hitachi H8/300 Assembly Assembly 600 clocks/block 6,374 clocks/block 128 Mbits/sec 100.5 k bits/sec

First AES Candidate Conference Copyright NTT 1998 Efficiency and Flexibility of E2

32-bit 200MHz Intel Pentium Pro CPU ANSI C cf. DESAssembly (RSAREF, (Borland C++ 5.02) Borland C++ 5.0) 711 clocks/block 10.610.6420 Mbitsclocks/block/sec 36.0 Mbits/sec 61.0 Mbits/sec 64-bit 8-bit CPU CPU 600MHz DEC 21164A 5MHz Hitachi H8/300 Assembly Assembly 600 clocks/block 6,374 clocks/block 128 Mbits/sec 100.5 k bits/sec

First AES Candidate Conference Copyright NTT 1998 Outline

· Overview

· Design

· Security

· Performance · Conclusion E2

First AES Candidate Conference Copyright NTT 1998 High-level Structure of E2

Plaintext P Key K

IT k13 k14 k1 F Key Scheduling Part

k2 F

k12 F k FT 15 k16

First AES Candidate Conference C Copyright NTT 1998 High-level Structure of E2

Plaintext P Key K

k IT k13 Data 14 k1 randomizing F Key Scheduling Part part k2 F

k12 F k FT 15 k16

First AES Candidate Conference Ciphertext C Copyright NTT 1998 High-level Structure of E2

Plaintext P Key K

k IT k13 Data 14 Key k1 randomizing F Key Scheduling Part scheduling part k2 F part

k12 F k FT 15 k16

First AES Candidate Conference Ciphertext C Copyright NTT 1998 Data Randomizing Part Framework

· IT-Function k (Initial Transformation) IT 13 k14 k1 · Feistel structure F

k2 · FT-Function F (Final Transformation)

k12 F k FT 15 k16

First AES Candidate Conference Copyright NTT 1998 Design Rationale of Framework

· Feistel structure w Widely known and thought to offer long-term security w Symmetric and decryption w Evaluation of security against DC and LC has been well studied

· IT-Function and FT-Function w Offer a proactive design and hinder later attacks

First AES Candidate Conference Copyright NTT 1998 Design Rationale of Framework

· Feistel structure w Widely known and thought to offer long-term security w Symmetric encryption and decryption w Evaluation of security against DC and LC has been well studied

· IT-Function and FT-Function w Offer a proactive design and hinder later attacks

First AES Candidate Conference Copyright NTT 1998 Design Rationale of F-Function (1)

· Structures for which security evaluation against DC and LC is easy w 1-round SPN structure (e.g., DES) w Recursive structure (e.g., MISTY) w 2-round SPN structure · Comparing the speed at the same level of security, we decided to adopt 2-round SPN structure

First AES Candidate Conference Copyright NTT 1998 Design Rationale of F-Function (1)

· Structures for which security evaluation against DC and LC is easy w 1-round SPN structure (e.g., DES) w Recursive structure (e.g., MISTY) w 2-round SPN structure · Comparing the speed at the same level of security, we decided to adopt 2-round SPN structure

First AES Candidate Conference Copyright NTT 1998 Design Rationale of F-Function (1)

· Structures for which security evaluation against DC and LC is easy w 1-round SPN structure (e.g., DES) w Recursive structure (e.g., MISTY) w 2-round SPN structure · Comparing the speed at the same level of security, we decided to adopt 2-round SPN structure Evaluated using practical measure

First AES Candidate Conference Copyright NTT 1998 Practical Measure for

· General case [Knudsen (FSE’93)] w Number of rounds: R = 2r, 2r + 1 (R) r (R) r w Evaluation: UDCP = p , ULCP = · Bijective case [Kanda et al. (SAC’98)] w Number of rounds: R = 3r, 3r + 1, 3r + 2 (R) 2r (R) 2r w Evaluation: UDCP = p , ULCP = q (R = 3r, 3r + 1) (R) 2r+1 (R) 2r+1 UDCP = p , ULCP = q (R = 3r + 2) Note: p, q : Maximum differential and linear prob. of round function First AES Candidate Conference Copyright NTT 1998 Practical Measure for Feistel Cipher

· General case [Knudsen (FSE’93)] w Number of rounds: R = 2r, 2r + 1 When R = 6 (R) r (R) r w Evaluation: UDCP = p , UDCP ULCP = p3 [=General] q · Bijective case [Kanda et al.UDCP (SAC =’98) p4 ][Bijective] w Number of rounds: R = 3r, 3r + 1, 3r + 2 (R) 2r (R) 2r w Evaluation: UDCP = p , ULCP = q (R = 3r, 3r + 1) (R) 2r+1 (R) 2r+1 UDCP = p , ULCP = q (R = 3r + 2) Note: p, q : Maximum differential and linear prob. of round function First AES Candidate Conference Copyright NTT 1998 Design Rationale of F-Function (2)

350 slow 42 rounds 300

250

200

150 6 rounds 9 rounds 100 Performance 1-round SPN structure Recursive structure Total number of s-boxes 50 2-round SPN structure fast 0 -32 -64 -96 -128 -160 -192 -224

Upper bounds of max differential/linear prob( log2 ) Security secure First AES Candidate Conference Copyright NTT 1998 F - Function Overview

K (2) K (1)

F - Function s s s s s s s s s s s s s s s s

S - Function P - Function S - Function

First AES Candidate Conference Copyright NTT 1998 Design Rationale of P-Function

· Maximize minimum number of active s-boxes w Minimize upper bound of maximum differential / linear prob. of round function · Use only XOR operation w Simple construction w Efficient implementations in both software and hardware · Minimize gate counts required for hardware

First AES Candidate Conference Copyright NTT 1998 Design Rationale of P-Function

· Maximize minimum number of active s-boxes w Minimize upper bound of maximum differential / linear prob. of round function · Use only XOR operation w Simple construction w Efficient implementations in both software and hardware · Minimize gate counts required for hardware

First AES Candidate Conference Copyright NTT 1998 # of Active s-boxes 3 (Bad P-Function)

K (2) K (1)

F - Function s s s s s s

D Y s s D X s s s s s s s s

P - Function Many active s-boxes mean high security against DC. First AES Candidate Conference Copyright NTT 1998 # of Active s-boxes 5 (E2 P-Function)

K (2) K (1)

F - Function s s s s s s

D Y s s D X s s s s s s s s

P - Function

First AES Candidate Conference Copyright NTT 1998 # of Active s-boxes 5 (cont.)

K (2) K (1)

F - Function s s s s s s

D Y s s D X s s s s s s s s

P - Function

First AES Candidate Conference Copyright NTT 1998 Design Rationale of s-box

1. Suitability for various platforms

2. No trap-doors

3. No vulnerability to known attacks

First AES Candidate Conference Copyright NTT 1998 Rationale 1 : Suitability for Various Platforms

· Table-lookup w efficiency does not depend on processors with various word-lengths (8, 16, 32, 64 bits)

· One 8-by-8-bit s-box w consideration for 8-bit smart card implementations

First AES Candidate Conference Copyright NTT 1998 Rationale 2 : No trap-doors

· Design principle is publicly given

· Based on well-known mathematical functions

First AES Candidate Conference Copyright NTT 1998 Candidates of s-box

· s : GF(2)8 GF(2)8 ; x s(x) = g ( f (x) ) candidates of f (x) and g(x) k 8 I. x in GF(2 ) " k ÎGF(28), k ¹ 1 x 8 II. u in Z/(2 +1)Z " u Î Z/(28+1)Z , u ¹ 0,1 k 8 III. x in Z/(2 +1)Z " k Î Z/(28+1)Z , k ¹ 1 8 IV. ax+b in Z/(2 )Z " a, b Î Z/(28)Z 8 V. ax+b in Z/(2 +1)Z " a, b Î Z/(28+1)Z 3 £ wH(a), wH(b) £ 5 Note that 256ÎZ/(28+1)Z corresponds to 0ÎGF(2)8 .

First AES Candidate Conference Copyright NTT 1998 Rationale 3 : No Vulnerability to Known Attacks

· Considered Attacks wDifferential cryptanalysis [BS90] wLinear cryptanalysis [M93] wHigher order differential attack [JK97] wInterpolation attack [JK97] wPartitioning cryptanalysis [HM97]

First AES Candidate Conference Copyright NTT 1998 How to select s-box

· s : GF(2)8 GF(2)8 ; x s(x) = g ( f (x) ) I. f (x) = x e in GF(28) IV. g(y) = ay + b in Z/(28)Z

Composition of functions from different groups

expected to be effective in thwarting algebraic attacks, e.g.,

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (1)

s : GF(2)8 GF(2)8 ; x s(x) = g ( f (x) ) f (x) = x e in GF(28) g (y) = ay + b in Z/(28)Z

a · Criteria for the considered 5 attacks · Bijectivity · Hamming weight of a, b · Differential-linear prob.

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

STARTSTART

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

0 £ e < 256 0 £ a,b < 256

3 £ wH(a) £ 5

3 £ wH(b) £ 5

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

bijective?

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

ee :: ((255,e255,e)) == 11 aa :: oddodd

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

wH (e) = 7 ?

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

qs : min ? Linear Probability

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

ps : min ? Differential Probability

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

rs : min ? Differential-linear Prob.

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

wH (e) = 7 (a, b ) ={(97,97) (97,225) (225,97) (225,225)}

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

deg s : max? Higher Order Differential Attack

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

Is ((F, G )) : small ? Partitioning Cryptanalysis

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

8 coeff2 s : large? Interpolation Attack

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

coeffp s : large ? p: prime s.t. 28 < p <29

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (2)

GOALGOAL

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (3)

s : GF(2)8 GF(2)8 ; x s(x) = g ( f (x) ) f (x) = x e in GF(28) g (y) = ay + b in Z/(28)Z

e = 127, 191, 223, 239, 247, 251, 253, 254 (a, b) = (97, 97), (97, 225), (225, 97), (225, 225)

First AES Candidate Conference Copyright NTT 1998 How to select s-box parameters (3)

s : GF(2)8 GF(2)8 ; x s(x) = g ( f (x) ) f (x) = x e in GF(28) g (y) = ay + b in Z/(28)Z

e = 127, 191, 223, 239, 247, 251, 253, 254 (a, b) = (97, 97), (97, 225), (225, 97), (225, 225)

(a, b, e) = (97, 225, 127) was selected.

First AES Candidate Conference Copyright NTT 1998 High-level Structure of E2

Plaintext P Key K

k IT k13 Data 14 Key k1 randomizing F Key Scheduling Part scheduling part k2 F part

k12 F k FT 15 k16

First AES Candidate Conference Ciphertext C Copyright NTT 1998 Design Rationale of IT / FT-Functions

Goal: To protect E2 against future advances in cryptanalysis IT-Function: avoid linking plaintext to inputs to first F-Function FT-Function: avoid linking ciphertext to outputs from last F-Function

First AES Candidate Conference Copyright NTT 1998 IT-Function and FT-Function Overview

IT FT BP-1 k13 k 14 k15 BP k16

x1 x2 x3 x4

BP BP-1

y1 y2 y3 y4 First AES Candidate Conference Copyright NTT 1998 Design Rationale of IT / FT-Functions (cont.)

· multiplication w in order for each bit of the subkey to change many bits of output w four 32-bit integer multiplications · XOR w improves the level of confusion by mixing incompatible group operations · byte permutation BP w links different subblocks

First AES Candidate Conference Copyright NTT 1998 IT-Function and FT-Function Overview

IT FT BP-1 k13 k 14 k15 BP k16

x1 x2 x3 x4

BP BP-1

y1 y2 y3 y4 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (1)

K v-1

G - Function L0 G - Function

K K K K f 1 f 2 f 3 f 4 f S - Function S - Function S - Function S - Function S - Function

P - Function P - Function P - Function P - Function P - Function

l0

f - Function l1

f - Function l2 L1

f - Function l3

G - Function L2

G - Function L8 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (1)

K v-1

G - Function L0 G - Function

K K K K f 1 f 2 f 3 f 4 f S - Function S - Function S - Function S - Function S - Function

P - Function P - Function P - Function P - Function P - Function

l0

f - Function l1

f - Function l2 L1 Simple implementationf - Function l3

G - Function L2

G - Function L8 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (1)

K v-1

G - Function L0 G - Function

K K K K f 1 f 2 f 3 f 4 f S - Function S - Function S - Function S - Function S - Function

P - Function P - Function P - Function P - Function P - Function

l0

f - Function l1

f - Function l2 L1

f - Function l Key setup time 3

< 3-block encryptionG - Function L2

G - Function L8 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (1)

K v-1

G - Function L0 G - Function

K K K K f 1 f 2 f 3 f 4 f S - Function S - Function S - Function S - Function S - Function

P - Function P - Function P - Function P - Function P - Function

l0

f - Function l1

f - Function l2 L1 No simple relationf - Function l3

G - Function L2

G - Function L8 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (1)

K v-1

G - Function L0 G - Function

K K K K f 1 f 2 f 3 f 4 f S - Function S - Function S - Function S - Function S - Function

P - Function P - Function P - Function P - Function P - Function

l0

f - Function l1

f - Function l2 L1 All bits of master key equallyf - Function l3 influence all bits of subkeys G - Function L2

G - Function L8 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (2)

Intermediate keys L1 L8

l0 l1 l2 l3 l28 l29 l30 l31

k16 k15 k14

Subkeys k4 k3 k2 k1 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (2)

Intermediate keys L1 L8

l0 l1 l2 l3 l28 l29 l30 l31

Deriving subkeys or k k 16 k 15 master key from other subkeys14 is computationally infeasibleSubkeys k4 k3 k2 k1 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (2)

Intermediate keys L1 L8

l0 l1 l2 l3 l28 l29 l30 l31

k16 k15 k14

Subkeys k4 k3 k2 k1 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (2)

Intermediate keys L1 L8

l0 l1 l2 l3 l28 l29 l30 l31

k16 k15 k14

Subkeys k4 k3 k2 k1 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (2)

Intermediate keys L1 L8

l0 l1 l2 l3 l28 l29 l30 l31

k16 k15 k14

Subkeys k4 k3 k2 k1 First AES Candidate Conference Copyright NTT 1998 Key Scheduling Part (2)

Intermediate keys L1 L8

l0 l1 l2 l3 l28 l29 l30 l31

Deriving subkeys or k k 16 k 15 master key from other subkeys14 is computationally infeasibleSubkeys k4 k3 k2 k1 First AES Candidate Conference Copyright NTT 1998 Outline

· Overview

· Design

· Security

· Performance · Conclusion E2

First AES Candidate Conference Copyright NTT 1998 Security of Data Randomizing Part

· s-box is designed to provide reasonable security against w Differential cryptanalysis

w

w Higher order differential attack

w Interpolation attack, etc.

First AES Candidate Conference Copyright NTT 1998 Properties of s-box

Criteria Value Related Attacks bijectivity OK Differential/Linear

wH(a) 3 £ wH(a) £ 5 wH(b) 3 £ wH(b) £ 5 -4.67 ps 2 Differential -4.38 qs 2 Linear rs 2 -2.59 (Differential-linear) deg s 7 Higher order differential coeff 2 8 s 254 Interpolation coeff p s 254 Interpolation p : prime, 256 < p < 512 First AES Candidate Conference Copyright NTT 1998 Security of Data Randomizing Part (cont.)

· s-box is designed to provide reasonable security against DC, LC, higher order differential attack, interpolation attack, etc. · 9-round E2 without IT / FT-Functions has sufficient security against DC and LC · IT / FT-Functions are added for “insurance policy” w E2 has 3-round margin + IT / FT-Functions

First AES Candidate Conference Copyright NTT 1998 Security of Key Scheduling Part

· No known weak keys

· No known equivalent keys

· No known complementation properties

First AES Candidate Conference Copyright NTT 1998 Outline

· Overview

· Design

· Security

· Performance · Conclusion E2

First AES Candidate Conference Copyright NTT 1998 Current Software Performance

Encryption Platform Language Key length Key setup Decryption (bits) (clocks) (clocks/block) (bits/sec) Intel 128 2,076 Pentium Pro ANSI C (Borland C++5.02) 192 2,291 711 36.0 M ( 200MHz ) 256 2,484 Assembly all 420 61.0 M Hitachi H8 / 300 128 14,041 ( 5MHz ) Assembly 192 15,284 6,374 100.5 k 8bit CPU 256 16,518 for smart card DEC 21164A Assembly all 600 128.0 M ( 600MHz ) E2 requires no algorithm setup. The results contain no API overhead.

First AES Candidate Conference Copyright NTT 1998 Current Hardware Performance

· CMOS 0.25 mm cell based library · 1 Gbits/sec (typical) · 482 Mbits/sec · Total 127k gates w including key scheduling, control logic and buffers · Not fully optimized

First AES Candidate Conference Copyright NTT 1998 Outline

· Overview

· Design

· Security

· Performance · Conclusion E2

First AES Candidate Conference Copyright NTT 1998 Conclusion

E2 is

First AES Candidate Conference Copyright NTT 1998 Conclusion

E2 is

· Secure : secure against all known attacks with enough margin

First AES Candidate Conference Copyright NTT 1998 Conclusion

E2 is

· Secure : secure against all known attacks with enough margin

· Fast : faster than DES

First AES Candidate Conference Copyright NTT 1998 Conclusion

E2 is

· Secure : secure against all known attacks with enough margin

· Fast : faster than DES

· Flexible: efficient implementations on various platforms

First AES Candidate Conference Copyright NTT 1998 E2 Home Page

http://info.isl.ntt.co.jp/e2/

Latest information is available.

e-mail: [email protected]

First AES Candidate Conference Copyright NTT 1998