Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen**

Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen**

NoekeonNoekeon Joan Daemen*, Gilles Van Assche*, Michael Peeters* and Vincent Rijmen** *Proton World, Brussels **COSIC, Leuven OutlineOutline l Noekeon design philosophy and properties l Round transformation and components l Key schedule modes l Resistance against cryptanalysis l Propagation analysis l Implementation aspects l The inverse cipher l Surprising properties of Noekeon l Conclusions 13/11/2000 Nessie Workshop 2000 2 NoekeonNoekeon DesignDesign PhilosophyPhilosophy l Security: resistance against known types of cryptanalysis and implementation attacks l and Efficiency: fast and compact in software and dedicated hardware l through Symmetry: l iterated cipher with one single, round transformation l bit-wise Boolean operations and cyclic shifts only l same round key for each round: working key l inverse cipher is (almost) equal to the cipher 13/11/2000 Nessie Workshop 2000 3 NoekeonNoekeon PropertiesProperties l Block Cipher l 128-bit key l 128-bit block l Substitution-linear transformation network in bit-slice mode l inspired by 3-Way [Da93] and BaseKing [Da95] l very similar to Serpent [BAK98] l Optional key schedule l key schedule only needed when related-key attacks can be mounted 13/11/2000 Nessie Workshop 2000 4 RoundRound TransformationTransformation l Noekeon has 16 equal rounds l Round transformation consists of 5 steps: l Round constant addition l Theta: diffusion and key addition l Pi1: permutation l Gamma: non-linearity l Pi2: permutation l Output transformation: l Theta 13/11/2000 Nessie Workshop 2000 5 TheThe NoekeonNoekeon StateState l All round transformations operate on a state consisting of 4 32-bit words: a0,a1,a2,a3 13/11/2000 Nessie Workshop 2000 6 RoundRound ConstantConstant AdditionAddition l Break symmetry between the words and between the rounds constant 13/11/2000 Nessie Workshop 2000 7 ThetaTheta l Linear transformation in 3 steps: l modification of odd words l addition of working key l modification of even words l Symmetry within the state words: l all bits are treated in the same way l High average diffusion l Involution 13/11/2000 Nessie Workshop 2000 8 ThetaTheta IllustratedIllustrated working key … 13/11/2000 Nessie Workshop 2000 9 Pi1Pi1 andand Pi2Pi2 l Cyclic shift of words a1,a2,a3 l Symmetry within the state words: l all bits in a word are treated in the same way l Give high multiple-round diffusion in combination with Theta and Gamma l Pi1 and Pi2 are each others inverse: l Pi1 shifts are 1, 5 and 2 to the left l Pi2 shifts are 1, 5 and 2 to the right 13/11/2000 Nessie Workshop 2000 10 Pi1Pi1 andand Pi2Pi2 Pi1 2 5 1 0 Pi2 2 5 1 0 13/11/2000 Nessie Workshop 2000 11 GammaGamma l Nonlinear transformation in 3 steps: l simple nonlinear transformation l simple linear transformation l simple nonlinear transformation l Symmetry within the state words: l 32 times the same 4-bit S-box l Good nonlinear properties l Involution 13/11/2000 Nessie Workshop 2000 12 GammaGamma IllustratedIllustrated AND NOR Nonlinear Linear AND NOR Nonlinear 13/11/2000 Nessie Workshop 2000 13 KeyKey ScheduleSchedule ModesModes Direct-Key Indirect-Key input input Working Working Key Noekeon Key Noekeon output output ”0” Noekeon Cipher Key Cipher Key 13/11/2000 Nessie Workshop 2000 14 ResistanceResistance AgainstAgainst CryptanalysisCryptanalysis l Linear and differential cryptanalysis: propagation analysis l Truncated differentials l Interpolation attacks l Symmetry properties and slide attacks l Weak keys l Related-key attacks l use indirect-key mode l Hidden weaknesses and Trapdoors 13/11/2000 Nessie Workshop 2000 15 PropagationPropagation AnalysisAnalysis l Identification of all 4-round trails with less than 24 active S-boxes (“<24” ) l differential trails: characteristics l linear trails: linear approximations l In the small set of 4-round trails found: l no differential trails with prob. > 2–48 l no linear trails with correlation > 2–24 l For the full cipher this means: l DC: no 12-round differential trails with prob. > 2–144 l LC:no12-roundlineartrailswithcorrelation>2–72 13/11/2000 Nessie Workshop 2000 16 PropagationPropagation AnalysisAnalysis l Step 1: recording all 2-round trails (< 18) l non-trivial exercise! l made feasible by exploiting symmetry properties in component transformations l Step 2: covering space of 4-round trails (< 24) l by chaining pairs of recorded 2-round trails (≥ 6) l the few 2-round trails (< 6) are treated separately 13/11/2000 Nessie Workshop 2000 17 TableTable ofof 2-round2-round TrailsTrails 12 3 4 5 6 7 8 1 4 22 144 8 3 6 28 12 70 108 4 163 32 178 328 1,493 5 28 32 617 1,283 3,762 6,261 6 14 12 179 1,283 9,101 15,341 54,660 7 4 4 70 328 3,762 15,341 93,668 273,344 8 8 108 1,493 6,261 54,660 273,344 1,249,658 9 1 357 1,972 21,036 129,640 838,646 4,378,578 10 41 305 5,038 44,593 353,545 2,380,721 ? 11 1 52 899 9,356 97,629 853,003 ? ? 12 113 1,273 18,489 205,194 2,085,751 ? ? 13 5 66 1,947 33,605 444,745 4,827,996 ? ? 14 149 3,338 63,611 897,923 ? ? ? 15 109 5,852 112,168 ? ? ? ? 16 199 8,222 ? ? ? ? ? X: number of active S-boxes in round 1, Y: number of active S-boxes in round 2 13/11/2000 Nessie Workshop 2000 18 HardwareHardware SuitabilitySuitability l Ultra compact: small number of gates l 1050 XOR l 64 AND l 64 NOR l 128 MUX l High speed: small gate delay l 7XOR l 1AND l 1MUX 13/11/2000 Nessie Workshop 2000 19 SoftwareSoftware PerformancePerformance l Very well suited for 32-bit processors l Pentium II: 525 cycles (49 Mbit/s @ 200 MHz) l Well suited to other word lengths of form 2m l ARM7 (RISC core): code size #cycles bitrate@ (bytes) 28.56MHz Min. size 332 712 5.1 Mbit/s Max speed 3688 475 7.7 Mbit/s No RAM usage 13/11/2000 Nessie Workshop 2000 20 ProtectionProtection AgainstAgainst DPADPA l Noekeon is a fixed sequence of operations l counters timing attack and SPA l State splitting as applied to BaseKing in our FSE 2000 paper l counters first-order DPA (extendable to also counter higher-order DPA) ... l at relatively low CPU cost, thanks to few non-linear operations l In direct-key mode: l counters key schedule attacks 13/11/2000 Nessie Workshop 2000 21 TheThe InverseInverse CipherCipher l The inverse cipher is equal to the cipher l with the exception of the round constant addition l Because l Theta and Gamma are involutions l Pi1 and Pi2 are each others inverses l Cipher and inverse use same hardware circuit or program 13/11/2000 Nessie Workshop 2000 22 TheThe UnbearableUnbearable WeaknessWeakness ofof NoekeonNoekeon l All round keys are the same! l The linear part of the round has order 2! l The nonlinear part of the round has order 2! l If the round constants are removed: l all rounds are equal! l there is a symmetry within the words! l the cipher and its inverse are equal! l The only non-linearity is provided by some binary ANDs (order 2)! è Actual weaknesses? We don’tthinkso… 13/11/2000 Nessie Workshop 2000 23 Noekeon:Noekeon: l is ultra compact and fast in hardware, l runs fast even in DPA-resistant implementations, l has very low RAM usage in software, l takes very small amount of code, l is very efficient on a wide range of platforms, l so simple that it can be memorized by an average person! 13/11/2000 Nessie Workshop 2000 24.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    24 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us