Differential Factors: Improved Attacks on Serpent

Differential Factors: Improved Attacks on Serpent

Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Differential Factors: Improved Attacks on Serpent Cihangir TEZCAN and Ferruh Ozbudak¨ Department of Mathematics Middle East Technical University Institute of Applied Mathematics Department of Cryptography Middle East Technical University LightSEC 2014 Istanbul,_ Turkey Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Outline 1 Cryptographic Properties of S-boxes 2 Differential Factors 3 Improved Attacks on Serpent 4 Conclusion Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion S-box Properties and Cryptanalysis Confusion layer of cryptographic algorithms mostly consists of S-boxes. S-box Properties and Cryptanalysis 1 Differential Uniformity => Differential Cryptanalysis 2 Non-linear Uniformity => Linear Cryptanalysis 3 Branch Number => Algebraic and Cube Attacks 4 Number of Shares => Side-Channel Attacks, DPA 5 Undisturbed Bits => Truncated, Impossible, Improbable Differential Cryptanalysis Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Example (Serpent S1) 1 Input: 4x => Output: ?1?? 2 Input: 8x => Output: ?1?? 3 Input: Cx => Output: ?0?? 4 Output: 1x => Input: 1??? 5 Output: 4x => Input: 1??? 6 Output: 5x => Input: 0??? Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Undisturbed Bits Definition For a specific input difference of an S-box, if some bits of the output difference remain invariant, then we call such bits undisturbed. Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Undisturbed Bits Definition For a specific input difference of an S-box, if some bits of the output difference remain invariant, then we call such bits undisturbed. Example (Serpent S1) 1 Input: 4x => Output: ?1?? 2 Input: 8x => Output: ?1?? 3 Input: Cx => Output: ?0?? 4 Output: 1x => Input: 1??? 5 Output: 4x => Input: 1??? 6 Output: 5x => Input: 0??? Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent For more information on undisturbed bits see tomorrow's talk [4]. References 1 C. Tezcan, Improbable Differential Attacks on Present using Undisturbed Bits, Journal of Computational and Applied Mathematics, 259, Part B(0), pp. 503-511, 2014. 2 C. Tezcan, H. K. Ta¸skın,M. Demircio˘glu,Improbable Differential Attacks on Serpent using Undisturbed Bits, to appear at SIN'14, 10 September 2014. 3 C. Tezcan, F. Ozbudak,¨ Differential Factors: Improved Attacks on Serpent, Lightsec 2014. 4 R. H. Makarim, C. Tezcan, Relating Undisturbed Bits to Other Properties of Substitution Boxes, Lightsec 2014. Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Undisturbed Bits and Cryptanalysis Undisturbed Bits and Cryptanalysis Improbable differential attack on 13-round Present by Tezcan [1] Improbable differential attack on 7-round Serpent by Tezcan, Ta¸skın,Demircio˘glu[2] Differential-linear attack on 11, 12, 13-round Serpent-128, Serpent-192, Serpent-256 [3] (this talk) Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Undisturbed Bits and Cryptanalysis Undisturbed Bits and Cryptanalysis Improbable differential attack on 13-round Present by Tezcan [1] Improbable differential attack on 7-round Serpent by Tezcan, Ta¸skın,Demircio˘glu[2] Differential-linear attack on 11, 12, 13-round Serpent-128, Serpent-192, Serpent-256 [3] (this talk) For more information on undisturbed bits see tomorrow's talk [4]. References 1 C. Tezcan, Improbable Differential Attacks on Present using Undisturbed Bits, Journal of Computational and Applied Mathematics, 259, Part B(0), pp. 503-511, 2014. 2 C. Tezcan, H. K. Ta¸skın,M. Demircio˘glu,Improbable Differential Attacks on Serpent using Undisturbed Bits, to appear at SIN'14, 10 September 2014. 3 C. Tezcan, F. Ozbudak,¨ Differential Factors: Improved Attacks on Serpent, Lightsec 2014. 4 R. H. Makarim, C. Tezcan, Relating Undisturbed Bits to Other Properties of Substitution Boxes, Lightsec 2014. Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Alternative Definition n m n A function F : F ! F2 is said to have a linear factor, if for all x 2 F2, 2 n m there exists a nonzero α 2 F2 and a nonzero b 2 F2 such that b · F (x ⊕ α) = for a fixed 2 F2. Note An S-box does not have linear factors. Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Linear Factors Definition (Linear Factor) A block cipher is said to have a linear factor if, for all plaintexts and keys, there is a fixed non-empty set of key bits whose simultaneous complementation leaves the XOR sum of a fixed non-empty set of ciphertext bits unchanged. Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Note An S-box does not have linear factors. Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Linear Factors Definition (Linear Factor) A block cipher is said to have a linear factor if, for all plaintexts and keys, there is a fixed non-empty set of key bits whose simultaneous complementation leaves the XOR sum of a fixed non-empty set of ciphertext bits unchanged. Alternative Definition n m n A function F : F ! F2 is said to have a linear factor, if for all x 2 F2, 2 n m there exists a nonzero α 2 F2 and a nonzero b 2 F2 such that b · F (x ⊕ α) = for a fixed 2 F2. Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Linear Factors Definition (Linear Factor) A block cipher is said to have a linear factor if, for all plaintexts and keys, there is a fixed non-empty set of key bits whose simultaneous complementation leaves the XOR sum of a fixed non-empty set of ciphertext bits unchanged. Alternative Definition n m n A function F : F ! F2 is said to have a linear factor, if for all x 2 F2, 2 n m there exists a nonzero α 2 F2 and a nonzero b 2 F2 such that b · F (x ⊕ α) = for a fixed 2 F2. Note An S-box does not have linear factors. Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Example (Serpent's S1) (λ = F , µ = E) x 5 A 8 0 2 1 ED F 7 6 9 CB 3 4 S(x) 0 E 1 F 2 C 3 D 4 A 5 B 6 8 7 9 Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Differential Factors Definition (Differential Factor) n m n Let S be a function from F2 to F2 . For all x; y 2 F2 that satisfy S(x) ⊕ S(y) = µ, if we also have S(x ⊕ λ) ⊕ S(y ⊕ λ) = µ, then we say that the S-box has a differential factor λ for the output difference µ. (i.e. µ remains invariant for λ). Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Differential Factors Definition (Differential Factor) n m n Let S be a function from F2 to F2 . For all x; y 2 F2 that satisfy S(x) ⊕ S(y) = µ, if we also have S(x ⊕ λ) ⊕ S(y ⊕ λ) = µ, then we say that the S-box has a differential factor λ for the output difference µ. (i.e. µ remains invariant for λ). Example (Serpent's S1) (λ = F , µ = E) x 5 A 8 0 2 1 ED F 7 6 9 CB 3 4 S(x) 0 E 1 F 2 C 3 D 4 A 5 B 6 8 7 9 Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Proof Let us assume that S has a differential factor λ for an output difference −1 −1 µ. If S (c1) ⊕ S (c2) = λ for some c1 and c2, then we need to show −1 −1 that S (c1 ⊕ µ) ⊕ S (c2 ⊕ µ) = λ. Let c1 ⊕ µ = S(p1) for some p1, −1 then we have S(S (c1) ⊕ λ) ⊕ S(p1 ⊕ λ) = µ since λ is a differential factor of S for µ. Thus, we have −1 −1 −1 −1 −1 S (c1 ⊕ µ) ⊕ S (c2 ⊕ µ) = S (S(p1)) ⊕ S (S(S (c1) ⊕ λ) ⊕ µ) −1 = p1 ⊕ S (S(p1 ⊕ λ)) = p1 ⊕ p1 ⊕ λ = λ Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Differential Factors Theorem 1 If a bijective S-box S has a differential factor λ for an output difference µ, then S −1 has a differential factor µ for the output difference λ. Cihangir TEZCAN and Ferruh Ozbudak¨ Differential Factors: Improved Attacks on Serpent Cryptographic Properties of S-boxes Differential Factors Improved Attacks on Serpent Conclusion Differential Factors Theorem 1 If a bijective S-box S has a differential factor λ for an output difference µ, then S −1 has a differential factor µ for the output difference λ. Proof Let us assume that S has a differential factor λ for an output difference −1 −1 µ. If S (c1) ⊕ S (c2) = λ for some c1 and c2, then we need to show −1 −1 that S (c1 ⊕ µ) ⊕ S (c2 ⊕ µ) = λ. Let c1 ⊕ µ = S(p1) for some p1, −1 then we have S(S (c1) ⊕ λ) ⊕ S(p1 ⊕ λ) = µ since λ is a differential factor of S for µ.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    32 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us