Impossible Differential Attacks on 4-Round DES-Like Ciphers

Impossible Differential Attacks on 4-Round DES-Like Ciphers

INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS Volume 9, 2015 Impossible differential attacks on 4-round DES-like ciphers Pavol Zajac Thus, design of lightweight ciphers is mostly influenced by the Abstract—Data Encryption Standard was a main public known standard cipher designs, including the DES. There are encryption standard for more than 20 years, but now it is considered many promising lightweight variants of DES such as DESL insecure. However, there are still numerous proposals of new [9]. lightweight cipher designs similar to DES, some of them only In [13], an extremely lightweight version of DES is consisting of 4 Feistel rounds. It is known that there exist generic distinguishers for 4-round Feistel cipher, but their complexity scales proposed with only 4 rounds of Feistel encryption. It is already exponentially with the cipher size. In the theoretical analysis, an ideal known that such a design is insecure from the theoretical point round function is considered. In this article we focus on a model of of view [14], due to collision attacks. However, the complexity Feistel ciphers with design similar to DES. The round function n/4 of these attacks is , where is the block size. Thus, consists of bit expansion, S-box application, and permutation of bits. O(2 ) n We show that practical DES-like designs cannot have only 4-rounds, it might seem that problems with 4-round DES-like cipher can even if the S-boxes are key-dependent, due to the impossible be avoided by large enough block size. In this paper we show a differential attacks. practical key-reconstruction attack on generalized 4-round DES-like cipher. Its complexity depends on the S-box size and Keywords—Feistel cipher, cryptanalysis, DES. expansion factor, both of which cannot be increased too much (due to implementation constraints). This leads to a conclusion I. INTRODUCTION that 4-round DES-like cipher constructions are inherently ATA Data Encryption Standard (DES) [4] was a public insecure and should not be used in practice. D symmetric encryption standard for more than 20 years. Now it is considered insecure due to short 56-bit keys and only II. PRELIMINARIES 64-bit block size, and due to linear [11] and differential [2] In this section we summarize basic notations and definitions. attacks. It was replaced by the Advanced Encryption Standard First, we introduce the DES-like ciphers as a generalization of (AES) [12], but in many legacy applications it is still in use, the design of the original Data Encryption Standard. Then we either in the original form, or as TDEA, known also as Triple provide basic preliminaries on differential cryptanalysis and DES. impossible differential attacks. Many applications in the areas of mobile computing, e-health services, wireless sensor networks, etc. require a A. DES-like ciphers simple way to secure communication channels. AES, as a nnBK n B Let eZ: 22×→ Z Z 2 be a block cipher operating on current symmetric encryption standard provides robust and secure encryption. Its nice mathematical description provides nB -bit blocks and having nK bit key. We construct function alternative variants that can be adapted where public standard e as a composition of partial functions that denote the is not suitable [5]. However, AES and its variants can be too individual steps of the encryption algorithm. complex and costly for some applications, e.g., when only We call e a generalized DES cipher, if it has a Feistel 80-bit security is required. The balancing issues between structure, and its round function consists of bit expansion, key cipher security and implementation costs are the main object addition, S-box evaluation and bit permutation layers. of study of the lightweight cryptography. Lightweight A cipher with Feistel structure works as follows: cryptography focuses on a simple cipher designs that provides enough security with lower costs in hardware or software 1. Split the input string into left and right half, implementations. 2. Transform right part with a (key-dependent) round The question of general lower bounds on implementation of function F and XOR it into the left part, ciphers with given security criteria is an open problem, 3. Swap the two parts. although some results are known for specific types of Boolean functions that are important building blocks of the ciphers [6]. This is repeated r times, where each repetition of this process will be denoted as a round (of encryption). Mathematically, let = denote the input string. The research was supported by the Science Grant Agency - project VEGA x(| lr ) 1/0173/13. ISSN: 2074-1294 56 INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS Volume 9, 2015 B. Differential cryptanalysis Then y=( rl | ⊕ Frk ( )) is an output string of one Feistel Differential cryptanalysis was introduced by Biham and round ( ⊕ denotes XOR operation on bit strings). Shamir in 1991 [2]. They attack DES-like ciphers by studying Let nmB = 2 for some positive integer m , and let the statistical distribution of differences during the encryption nm≥ , and let s be an integer that divides both m , and n . process. Classical differential cryptanalysis requires the Let KS: ZnK → () Z nr denote a key schedule algorithm. knowledge of S-boxes to produce a statistical model of S-box 22 differential response, i.e., the probability that a given change 12 r This algorithm provides r subkeys kk,,,… k given a of S-box input produces a particular S-box output difference. 12 r A good overview of the standard differential cryptanalysis is master key k . I.e., KS() k= ( k , k , … , k ). Subkeys are provided in [7]. The first step in the attack is the study of used to define key dependent round functions for Feistel S-boxes. The attacker computes a differential profile of the cipher. nm ns// ms S-box SZ: 22× Z by computing probabilities Let σ i : ZZ22× denote any Boolean function. We =n ⊕ ⊕= define S-box layer (containing s parallel S-boxes) as a pab, 1/2 { xSx ; ( ) Sx ( a ) b }, nm for each ≠ . Here is a probability that for a function SZ: 22× Z, where ab,0 pab, random input of the S-box and given input difference a the Sx(,,0… xns /1−− , x ns / ,, …= x n 1 ) S-box produces output difference b . The attacker examines the linear parts of the cipher (in DES-like cipher these are just σσ…… … ( 1(,,xx 0ns /1− ),,(s x n −− ns/ ,, x n 1 ).) expansions and bit permutations, and the Feistel scheme itself), and identifies differential trajectories. A differential trajectory I.e., we apply s S-boxes in parallel on (/)ns-bit is a path of some selected difference through the encryption scheme under condition that some specific input-output substrings of the input, producing corresponding (ms /)-bit difference pairs are realized on S-boxes in this path. substrings of the output. Multiplying differential probabilities gives a good estimate for Let ε : ZZnm→ , nm> , such that for every yZ∈ m , the probability pd that given input difference of the cipher there is at least one xZ∈ n such that yx= ε . Bit expansion causes the expected output difference (corresponding to the mn studied trajectory). If p is significantly higher than the function EZ: 22× Z is defined as d probability that such an output difference can occur randomly, …= … Ex(,,,0 x 1 xmn−−1 )( xεε (0) , x (1) ,, x ε ( 1) ) . it can be exploited in the distinguishing attack, or even in key This means that each input bit is copied into output bits (in recovery attacks. any order), and some of the input bits can occur in the output A traditional differential cryptanalysis requires the multiple times (are duplicated, triplicated, etc.). knowledge of S-boxes and the structure of the cipher to Let π : ZZ→ be a bijection. Bit permutation function compute the differential profiles and to search for suitable mm differential trajectories. When S-boxes are key dependent, or mm PZ: 22× Z is defined as kept secret in other way, the standard techniques of differential cryptanalysis are thwarted (or at least they are not so …= … Ex(,,,0 x 1 xmn−−1 )( xππ (0) , x (1) ,, x π ( 1) ) . straightforward). Still, in the later section we will show that in This means that each input bit is copied into output bits in generalized DES we can adapt a method of impossible the order prescribed by permutation π . differentials [3], in a way that does not require the knowledge Round function FZ: mn×→ Z Z m of a generalized DES of concrete S-boxes. 22 2 Impossible differential cryptanalysis is based on those cipher can be written as differences which have zero probability to occur. In this case ii F( xk , )= PSEx ( ( ( ) ⊕ k )), we do not work with individual trajectories and differences, nm mnbut instead focus on the sets of differences. The attacker must where SZ: × Z denotes the S-box layer, EZ: × Z 22 22identify a large set of impossible differences. E.g., suppose mm is the bit expansion, and PZ: 22× Z is the bit permutation. that some specific input difference can only change the even In non-mathematical terms, generalized DES is a Feistel number of bits in the output. Then every output difference with cipher, with round function that first performs bit expansion odd Hamming weight becomes impossible, and the set of all (takes m input bits, and reorders/copies them to n output output differences with odd Hamming weight becomes a set of bits), XORs the expanded input with the round key, applies impossible differences. This creates a distinguisher for the S-boxes in parallel, and finally mixes the output bits with bit cipher, because in ideal case (a random permutation) half of the differences can have odd Hamming weight.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    6 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us