The Improbable Differential Attack: Cryptanalysis Of

The Improbable Differential Attack: Cryptanalysis Of

Outline Introduction The Improbable Differential Attack CLEFIA Conclusion The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA Cihangir TEZCAN Ecole´ Polytechnique F´ed´eralede Lausanne, Switzerland (This work was done at) Institute of Applied Mathematics Middle East Technical University, Ankara, Turkey INDOCRYPT 2010 December 14, 2010, Hyderabad, India Cihangir TEZCAN The Improbable Differential Attack Outline Introduction The Improbable Differential Attack CLEFIA Conclusion Outline 1 Introduction 2 The Improbable Differential Attack Introduction Two Techniques to Obtain Improbable Differentials 3 CLEFIA Specifications 13-round Improbable Differential Attack 4 Conclusion Cihangir TEZCAN The Improbable Differential Attack Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Find a path (differential) so that when the input difference is α, output difference is β with high probability Only parts of the differences α and β are specified Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Find a path (impossible differential) so that when the input difference is α, the output difference is never β And others (Higher-order Differential, Boomerang,...) Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Cihangir TEZCAN The Improbable Differential Attack Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Find a path (differential) so that when the input difference is α, output difference is β with high probability Only parts of the differences α and β are specified Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Find a path (impossible differential) so that when the input difference is α, the output difference is never β And others (Higher-order Differential, Boomerang,...) Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Cihangir TEZCAN The Improbable Differential Attack Find a path (differential) so that when the input difference is α, output difference is β with high probability Only parts of the differences α and β are specified Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Find a path (impossible differential) so that when the input difference is α, the output difference is never β And others (Higher-order Differential, Boomerang,...) Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Cihangir TEZCAN The Improbable Differential Attack Only parts of the differences α and β are specified Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Find a path (impossible differential) so that when the input difference is α, the output difference is never β And others (Higher-order Differential, Boomerang,...) Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Find a path (differential) so that when the input difference is α, output difference is β with high probability Cihangir TEZCAN The Improbable Differential Attack Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Find a path (impossible differential) so that when the input difference is α, the output difference is never β And others (Higher-order Differential, Boomerang,...) Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Find a path (differential) so that when the input difference is α, output difference is β with high probability Only parts of the differences α and β are specified Cihangir TEZCAN The Improbable Differential Attack Find a path (impossible differential) so that when the input difference is α, the output difference is never β And others (Higher-order Differential, Boomerang,...) Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Find a path (differential) so that when the input difference is α, output difference is β with high probability Only parts of the differences α and β are specified Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Cihangir TEZCAN The Improbable Differential Attack And others (Higher-order Differential, Boomerang,...) Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Find a path (differential) so that when the input difference is α, output difference is β with high probability Only parts of the differences α and β are specified Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Find a path (impossible differential) so that when the input difference is α, the output difference is never β Cihangir TEZCAN The Improbable Differential Attack Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Differential Cryptanalysis Discovered by E. Biham and A. Shamir, early 1980s Find a path (characteristic) so that when the input difference is α, output difference is β with high probability Truncated Differential Cryptanalysis Discovered by L. Knudsen, 1994 Find a path (differential) so that when the input difference is α, output difference is β with high probability Only parts of the differences α and β are specified Impossible Differential Cryptanalysis Discovered by E. Biham, A. Biryukov, A. Shamir, 1998 Find a path (impossible differential) so that when the input difference is α, the output difference is never β And others (Higher-order Differential, Boomerang,...) Cihangir TEZCAN The Improbable Differential Attack Probability of the probability of the Attack Type incident for incident for Note a wrong key the correct key Statistical Attacks p p0 p0 > p (Differential, Truncated,...) Impossible Differential p 0 p0 = 0 Improbable Differential p p0 p0 < p Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Statistical attacks on block ciphers make use of a property of the cipher so that an incident (characteristic, differential,...) occurs with different probabilities depending on whether the correct key is used or not. Cihangir TEZCAN The Improbable Differential Attack Impossible Differential p 0 p0 = 0 Improbable Differential p p0 p0 < p Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Statistical attacks on block ciphers make use of a property of the cipher so that an incident (characteristic, differential,...) occurs with different probabilities depending on whether the correct key is used or not. Probability of the probability of the Attack Type incident for incident for Note a wrong key the correct key Statistical Attacks p p0 p0 > p (Differential, Truncated,...) Cihangir TEZCAN The Improbable Differential Attack Improbable Differential p p0 p0 < p Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Statistical attacks on block ciphers make use of a property of the cipher so that an incident (characteristic, differential,...) occurs with different probabilities depending on whether the correct key is used or not. Probability of the probability of the Attack Type incident for incident for Note a wrong key the correct key Statistical Attacks p p0 p0 > p (Differential, Truncated,...) Impossible Differential p 0 p0 = 0 Cihangir TEZCAN The Improbable Differential Attack Outline Introduction The Improbable Differential Attack CLEFIA Conclusion A (Very) Short Introduction to Differential Cryptanalysis Statistical attacks on block ciphers make use of a property of

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    42 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us