
Extended Cubes: Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations Shekh Faisal∗ Mohammad Reza Willy Susilo Abdul-Latip Reyhanitabar School of Computer Science School of Computer Science School of Computer Science and Software Engineering and Software Engineering and Software Engineering University of Wollongong, University of Wollongong, University of Wollongong, Australia Australia Australia [email protected] [email protected] [email protected] Jennifer Seberry School of Computer Science and Software Engineering University of Wollongong, Australia [email protected] ABSTRACT to PRESENT-128 (i.e. 128-bit key variant) with time com- 64 13 In this paper, we propose an efficient method for extracting plexity of 2 and the same data complexity of 2 chosen simple low-degree equations (e.g. quadratic ones) in addi- plaintexts. tion to the linear ones, obtainable from the original cube attack by Dinur and Shamir at EUROCRYPT 2009. This Categories and Subject Descriptors extended cube attack can be successfully applied even to cryptosystems in which the original cube attack may fail due E.3 [Data Encryption]: Code Breaking to the attacker's inability in finding sufficiently many inde- pendent linear equations. As an application of our extended General Terms method, we exhibit a side channel cube attack against the PRESENT block cipher using the Hamming weight leakage Security model. Our side channel attack improves upon the previ- ous work of Yang, Wang and Qiao at CANS 2009 from two Keywords aspects. First, we use the Hamming weight leakage mod- el which is a more relaxed leakage assumption, supported Algebraic cryptanalysis, cube attacks, extended cube, by many previously known practical results on side channel PRESENT, side channel attacks attacks, compared to the more challenging leakage assump- tion that the adversary has access to the \exact" value of 1. INTRODUCTION the internal state bits as used by Yang et al. Thanks to The cube attack, put forth by Dinur and Shamir at EU- applying the extended cube method, our attack has also a ROCRYPT 2009 [16], is a generic type of algebraic attacks reduced complexity compared to that of Yang et al. Name- that may be applied against any cryptosytem, provided that ly, for PRESENT-80 (80-bit key variant) as considered by the attacker has access to a bit of information that can be Yang et al., our attack has a time complexity 216 and data represented by a \low-degree" multivariate polynomial over complexity of about 213 chosen plaintexts; whereas, that of GF(2) of the secret and public variables of the target cryp- Yang et al. has time complexity of 232 and needs about 215 tosytem. Dinur and Shamir in [16] compared the cube attack chosen plaintexts. Furthermore, our method directly applies to some of the previously known similar techniques and s- ∗ tated that the attack generalizes and improves some of those Shekh Faisal Abdul-Latip is currently with the Faculty of Information and Communication Technology, Universiti methods. As some of the previously known similar attacks, Teknikal Malaysia Melaka. which exploit the vulnerability of ciphers with low-degree polynomials, we refer to [36, 35]. The cube attack aims to derive low-degree (especially lin- ear) implicit equations that can be exploited for constructing Permission to make digital or hard copies of all or part of this work for distinguishers, e.g. [4], and/or key recovery attacks, e.g. [16, personal or classroom use is granted without fee provided that copies are 4]. An interesting feature of the cube attack is that it on- not made or distributed for profit or commercial advantage and that copies ly requires a black-box access to a target cryptosystem and bear this notice and the full citation on the first page. To copy otherwise, to may be applied even if only a few output bits can be accessed republish, to post on servers or to redistribute to lists, requires prior specific by an adversary. When using the original cube attack [16, permission and/or a fee. ASIACCS ’11, March 22–24, 2011, Hong Kong, China. 37], one tries to derive independent linear equations over Copyright 2011 ACM 978-1-4503-0564-8/11/03 ...$10.00. secret variables of the cryptosystem. This system of linear 296 equations can be easily solved to recover the value of the se- recorded. To relax the leakage model, in contrast, we as- cret variables by using the well-known Gaussian elimination sume the Hamming weight leakage as a more common side method. channel leakage model, e.g. see [2, 7, 13, 14, 28]. From time and data complexity viewpoints, we show that, This Paper. Our work is motivated by the observation for PRESENT-80 (80-bit key variant of PRESENT), our that in most cases, for properly designed cryptographic algo- attack has time complexity of 216 and data complexity of rithms, it may not be possible to extract a sufficient number about 213 chosen plaintexts; whereas, the attack of Yang et of independent `linear' equations using the (preprocessing al. has time complexity of 232 and needs about 215 chosen phase of the) original cube attack. In fact various potential plaintexts. Also our method directly applies to PRESENT- extensions of the cube attack were suggested to be consid- 128 (i.e. 128-bit key variant) with time complexity of 264 and ered for future research in [16]. One of the methods to gen- the same data complexity of 213 chosen plaintexts, and is the eralize the original cube attack, left in [16] for future work only attack in this model considered against PRESENT-128. without further elaboration, is that one should try to find We should stress that both of these side channel cube at- and employ some additional low degree nonlinear equations, tacks against PRESENT, provided by Yang et al. in [37] e.g. equations of degree 2 or 3, provided that the system of e- and our attack in this paper, need clean leaked data values quations is simple (sparse and low degree) and solvable using (i.e. the exact value of some internal state bits in the case existing methods. In this paper we elaborate this idea and of [37] and the Hamming weight of the internal state in our develop an extension of the cube attack to extract such (low case). Hence, to the best of our knowledge these are only degree) nonlinear equations. To demonstrate the applica- of a theoretical interest, at the moment, and do not directly tion of our extended cube method, we provide a side channel impose any real threat to the security of PRESENT imple- cube attack against the PRESENT block cipher [10], which mentations in practice, where the side channel information improves upon the previous work of Yang, Wang and Qiao measurements (e.g. power traces, EM radiations, or timing) at CANS 2009. are almost always noisy. We refer to [17, 33] for some relat- Side Channel Cube Attack. In attempting to apply ed discussions on the possibility of handling the noisy data cube attacks to block ciphers, the main problem is that obtained from side channels when combined with the alge- the degree of the polynomial representing a ciphertext bit braic attacks. We note that, the current issue is that these grows exponentially with the number of rounds in the cipher. methods are very sensitive to measurement noise levels and Hence, the cube attack usually becomes ineffective after a can only handle very low error rates than what may happen few rounds if one considers only the standard attack mod- in practice. el that is used in the well-known statistical attacks, such Organization of the Paper. as the Differential and Linear attacks. Nevertheless, con- In Section 2 and 4, respec- sidering the practical implementations of the block cipher, tively, we review the cube attack and the construction of the especially in resource limited systems such as smart cards, PRESENT block cipher. Section 3 and 5 contain the main there is a stronger attack model, namely the side channel contribution of this paper, where we provide the notion of attack model, where the adversary is given more power by an extended cube for extracting nonlinear equation of low having access to some\limited"information leaked about the degree and the details of the improved side channel cube internal state of the cipher. This information leakage can be attack on PRESENT. Section 6 concludes the paper. via physical side channels, such as timing, electrical power consumption, electromagnetic radiation, probing, etc. 2. A REVIEW ON THE CUBE ATTACK We note that the idea of combining algebraic cryptanal- The main point of the cube attack is that, the multivariate ysis with side channel attacks was already introduced by \master" polynomial p(v1; ··· ; vm; k1; ··· ; kn), representing Bogdanov, Kizhvatov and Pyshkin at INDOCRYPT 2008 an output bit of a cryptosystem over GF(2) of secret vari- [8], and also recently investigated in several other works such ables ki (key bits) and public variables vi (i.e. plaintext or as [33, 17, 37]. Compared to the recent side channel cube initial values), may induce algebraic equations of lower de- attack of Yang et al. [37], our attack in this paper offers two grees, in particular linear equations. The cube attack pro- improvements: it is based on a more relaxed leakage model; vides a method to derive such lower degree (especially linear) namely, the Hamming weight leakage model, and it has a equations, given the master polynomial only as a black-box better (i.e. reduced) complexity as well. The improved com- which can be evaluated on the secret and public variables.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages10 Page
-
File Size-