S-Box Decompositions and some Applications L eo Perrin January 28, - - PowerPoint PPT Presentation

s box decompositions and some applications
SMART_READER_LITE
LIVE PREVIEW

S-Box Decompositions and some Applications L eo Perrin January 28, - - PowerPoint PPT Presentation

S-Box Decompositions and some Applications L eo Perrin January 28, 2019, Nancy My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Curriculum Currently : post-doc at SECRET in Inria Paris


slide-1
SLIDE 1

S-Box Decompositions and some Applications

L´ eo Perrin January 28, 2019, Nancy

slide-2
SLIDE 2

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Curriculum

Currently: post-doc at SECRET in Inria Paris PhD: University of Luxembourg (symmetric cryptography) Masters: double degree Centrale Lyon/KTH (discrete math/theoretical CS)

1 / 44

slide-3
SLIDE 3

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Outline

1 My Area of Research: Symmetric Cryptography 2 From Russia With Love 3 Cryptanalysis of a Theorem 4 Conclusion

1 / 44

slide-4
SLIDE 4

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Outline

1 My Area of Research: Symmetric Cryptography 2 From Russia With Love 3 Cryptanalysis of a Theorem 4 Conclusion

1 / 44

slide-5
SLIDE 5

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Symmetric Cryptography

We assume that a secret key has already been shared!

2 / 44

slide-6
SLIDE 6

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Symmetric Cryptography

We assume that a secret key has already been shared!

Definition (Block Cipher)

Input: n-bit block x Parameter: k-bit key κ Output: n-bit block Eκ(x) Symmetry: E and E −1 use the same κ E x Eκ(x) κ

2 / 44

slide-7
SLIDE 7

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Symmetric Cryptography

We assume that a secret key has already been shared!

Definition (Block Cipher)

Input: n-bit block x Parameter: k-bit key κ Output: n-bit block Eκ(x) Symmetry: E and E −1 use the same κ E x Eκ(x) κ No Key Recovery. Given many pairs (x, Eκ(x)), it must be impossible to recover κ.

2 / 44

slide-8
SLIDE 8

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Symmetric Cryptography

We assume that a secret key has already been shared!

Definition (Block Cipher)

Input: n-bit block x Parameter: k-bit key κ Output: n-bit block Eκ(x) Symmetry: E and E −1 use the same κ E x Eκ(x) κ No Key Recovery. Given many pairs (x, Eκ(x)), it must be impossible to recover κ.

  • Indistinguishability. Given an n permutation P, it must be impossible to

figure out if P = Eκ for some κ.

2 / 44

slide-9
SLIDE 9

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Security Arguments

The Specification

Contains a full design rationale, meaning we can trust the cipher because: we trust the security arguments of the designer we have a starting point for cryptanalysis

3 / 44

slide-10
SLIDE 10

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Security Arguments

The Specification

Does not contain a full design rationale, meaning we cannot trust the cipher because: we have to start cryptanalysis from scratch what are they trying to hide?

3 / 44

slide-11
SLIDE 11

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

To Build a Cipher

Iterated Construction

4 / 44

slide-12
SLIDE 12

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

To Build a Cipher

Iterated Construction Two different sub-components for f

Linear layer (diffusion) S-box layer (non-linearity)

4 / 44

slide-13
SLIDE 13

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

The S-box

5 / 44

slide-14
SLIDE 14

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

The S-box

Importance of the S-box

If S is such that the maximum number of x such that S(x) ⊕ S(x ⊕ a) = b is low for all a ̸= 0 and b then the cipher may be proved secure against differential attacks.

5 / 44

slide-15
SLIDE 15

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

S-box Design

6 / 44

slide-16
SLIDE 16

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

S-box Design

6 / 44

slide-17
SLIDE 17

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

S-box Design

Khazad... iScream... Grøstl...

6 / 44

slide-18
SLIDE 18

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

S-box Reverse-Engineering

S

7 / 44

slide-19
SLIDE 19

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

S-box Reverse-Engineering

S

? ? ?

7 / 44

slide-20
SLIDE 20

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Why Reverse-Engineer S-boxes? (1/3)

A malicious designer can hide a structure in an S-box.

8 / 44

slide-21
SLIDE 21

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Why Reverse-Engineer S-boxes? (1/3)

A malicious designer can hide a structure in an S-box. To keep an advantage in implementation (white-box crypto)...

8 / 44

slide-22
SLIDE 22

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Why Reverse-Engineer S-boxes? (1/3)

A malicious designer can hide a structure in an S-box. To keep an advantage in implementation (white-box crypto)... ... or an advantage in cryptanalysis (backdoor). eprint report 2015/767

8 / 44

slide-23
SLIDE 23

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Why Reverse-Engineer S-boxes? (2/3)

S-box based backdoors in the literature

Rijmen, V., & Preneel, B. (1997). A family of trapdoor ciphers. FSE’97. Paterson, K. (1999). Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. FSE’99. Blondeau, C., Civino, R., & Sala, M. (2017). Differential Attacks: Using Alternative Operations. eprint report 2017/610. Bannier, A., & Filiol, E. (2017). Partition-based trapdoor ciphers. In Partition-Based Trapdoor Ciphers. InTech’17.

9 / 44

slide-24
SLIDE 24

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Why Reverse-Engineer S-boxes? (3/3)

Even without malicious intent, an unexpected structure can be a problem. = ⇒ We need tools to reverse-engineer S-boxes!

10 / 44

slide-25
SLIDE 25

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

Design and Analysis

Analysis

GLUON-64 hash function (FSE’14) PRINCE block cipher (FSE’15) TWINE block cipher (FSE’15)

Design

SPARX block cipher (Asiacrypt’16) SPARKLE permutation, ESCH hash function, SCHWAEMM authenticated cipher (NIST submission) Purposefully hard functions (Asiacrypt’17) MOE block cipher (submitted to EC)

11 / 44

slide-26
SLIDE 26

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

S-box Reverse-Engineering

When the S-box has a BC structure

Feistel network (SAC’15, FSE’16), SPN (ToSC’17)

When it doesn’t

Analysis of Skipjack (Crypto’15) Structures in the Russian S-box (Eurocrypt’16, ToSC’17, ToSC’19) Cryptanalysis of a Theorem (Crypto’16, IEEE Trans. Inf. Th.’17, FFA’19, CC’19)

12 / 44

slide-27
SLIDE 27

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion Symmetric Cryptography 101 My Contributions

S-box Reverse-Engineering

When the S-box has a BC structure

Feistel network (SAC’15, FSE’16), SPN (ToSC’17)

When it doesn’t

Analysis of Skipjack (Crypto’15) Structures in the Russian S-box (Eurocrypt’16, ToSC’17, ToSC’19) Cryptanalysis of a Theorem (Crypto’16, IEEE Trans. Inf. Th.’17, FFA’19, CC’19)

12 / 44

slide-28
SLIDE 28

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Outline

1 My Area of Research: Symmetric Cryptography 2 From Russia With Love 3 Cryptanalysis of a Theorem 4 Conclusion

12 / 44

slide-29
SLIDE 29

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Outline

We can recover an actual decomposition using patterns in the LAT.

1 TU-decomposition: what is it and how to apply it? 2 First results on the Russian S-box 3 Its intended decomposition (I think)

13 / 44

slide-30
SLIDE 30

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Kuznyechik/Streebog

Streebog

Type Hash function Publication 2012

Kuznyechik

Type Block cipher Publication 2015

14 / 44

slide-31
SLIDE 31

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Kuznyechik/Streebog

Streebog

Type Hash function Publication 2012

Kuznyechik

Type Block cipher Publication 2015

Common ground

Both are standard symmetric primitives in Russia. Both were designed by the FSB (TC26). Both use the same 8 × 8 S-box, π.

14 / 44

slide-32
SLIDE 32

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Basic Tools for Analysing S-boxes

Let S : Fn

2 → Fn 2 be an S-box.

15 / 44

slide-33
SLIDE 33

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Basic Tools for Analysing S-boxes

Let S : Fn

2 → Fn 2 be an S-box.

Definition (DDT)

The Difference Distribution Table of S is a matrix of size 2n × 2n such that DDT[a, b] = #{x ∈ Fn

2 | S (x ⊕ a) ⊕ S(x) = b}.

15 / 44

slide-34
SLIDE 34

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Basic Tools for Analysing S-boxes

Let S : Fn

2 → Fn 2 be an S-box.

Definition (DDT)

The Difference Distribution Table of S is a matrix of size 2n × 2n such that DDT[a, b] = #{x ∈ Fn

2 | S (x ⊕ a) ⊕ S(x) = b}.

Definition (LAT)

The Linear Approximations Table of S is a matrix of size 2n × 2n such that LAT[a, b] = ∑︂

x∈Fn

2

(−1)x·a⊕S(x)·b .

15 / 44

slide-35
SLIDE 35

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Example

S = [4, 2, 1, 6, 0, 5, 7, 3] The DDT of S. ⎡ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣

8 2 2 2 2 2 2 2 2 4 4 2 2 2 2 4 4 4 4 2 2 2 2

⎤ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ #{x ∈ Fn

2 | S (x ⊕ a)⊕S(x) = b}

The LAT of S. ⎡ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣

8 4 4 4 −4 4 4 4 −4 4 4 −4 4 4 −4 −4 −4 −4 4 −4 −4 −4 4 −4 −4 −8

⎤ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ ∑︂

x∈Fn

2

(−1)x·a⊕S(x)·b .

16 / 44

slide-36
SLIDE 36

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The LAT of π

17 / 44

slide-37
SLIDE 37

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The LAT of π (reordered columns)

18 / 44

slide-38
SLIDE 38

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The LAT of η ∘ π ∘ µ

19 / 44

slide-39
SLIDE 39

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The TU-Decomposition

Definition

The TU-decomposition is a decomposition algorithm working against S-boxes with vector spaces of zeroes in their LAT.

Theorem

“Square of zeroes” in the LAT. ⇔ T U T and U are mini-block ciphers µ and η are linear permutations.

20 / 44

slide-40
SLIDE 40

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

First Complete Decomposition of π [BPU16]

ω α σ φ ⊙ ν1 ν0 ℐ ⊙ ⊙ Multiplication in F24 ℐ Inversion in F24 ν0, ν1, σ 4 × 4 permutations φ 4 × 4 function α, ω Linear permutations

21 / 44

slide-41
SLIDE 41

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

First Complete Decomposition of π [BPU16]

ω α σ φ ⊙ ν1 ν0 ℐ ⊙ ⊙ Multiplication in F24 ℐ Inversion in F24 ν0, ν1, σ 4 × 4 permutations φ 4 × 4 function α, ω Linear permutations Ugly, but it would not be there if π were random.

21 / 44

slide-42
SLIDE 42

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Hardware Performance

Structure Area (µm2) Delay (ns) Naive implementation 3889.6 362.52 With TU-decomposition 1530.1 46.11 Knowledge of this decomposition divides: the area by 2.5, and the delay by 8

22 / 44

slide-43
SLIDE 43

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Conclusion for Kuznyechik/Streebog?

The Russian S-box was built with a TU-decomposition...

23 / 44

slide-44
SLIDE 44

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Conclusion for Kuznyechik/Streebog?

The Russian S-box was built with a TU-decomposition... ... or was it?

23 / 44

slide-45
SLIDE 45

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Reopening a Cold Case (Twice)

Detour through Belarus [PU16]

We identified some similar properties between π and the S-box of the standard of Belarus... Which turned out to be based on a discrete logarithm.

24 / 44

slide-46
SLIDE 46

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Reopening a Cold Case (Twice)

Detour through Belarus [PU16]

We identified some similar properties between π and the S-box of the standard of Belarus... Which turned out to be based on a discrete logarithm.

New Patterns [Per18]

π (0 ⊕ ⟨01, 0a, 44, 92⟩) = c8 ⊕ ⟨02, 04, 10, 20⟩ π (0 ⊕ ⟨05, 22, 49, 8b⟩) = 20 ⊕ ⟨01, 0a, 44, 92⟩ .

24 / 44

slide-47
SLIDE 47

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Reopening a Cold Case (Twice)

Detour through Belarus [PU16]

We identified some similar properties between π and the S-box of the standard of Belarus... Which turned out to be based on a discrete logarithm.

New Patterns [Per18]

π (0 ⊕ ⟨01, 0a, 44, 92⟩) = c8 ⊕ ⟨02, 04, 10, 20⟩ π (0 ⊕ ⟨05, 22, 49, 8b⟩) = 20 ⊕ ⟨01, 0a, 44, 92⟩ . ⟨01, 0a, 44, 92⟩ ⊕ ⟨05, 22, 49, 8b⟩ = F8

2

(c8 ⊕ ⟨05, 22, 49, 8b⟩) ⊕ (20 ⊕ ⟨01, 0a, 44, 92⟩) = F8

2

(c8 ⊕ ⟨05, 22, 49, 8b⟩) ∩ (20 ⊕ ⟨01, 0a, 44, 92⟩) = π(0) = fc

24 / 44

slide-48
SLIDE 48

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Cosets to Cosets

GF(28) π(GF(28)) = GF(28)

{0} {fc}

25 / 44

slide-49
SLIDE 49

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Cosets to Cosets

GF(28) π(GF(28)) = GF(28)

{0} {fc}

GF(24)∗ κ(0) ⊕ GF(24)∗

25 / 44

slide-50
SLIDE 50

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Cosets to Cosets

GF(28) π(GF(28)) = GF(28)

{0} {fc}

GF(24)∗ κ(0) ⊕ GF(24)∗ α16 ⊙ GF(24)∗ κ((F4

2)∗)

25 / 44

slide-51
SLIDE 51

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Cosets to Cosets

GF(28) π(GF(28)) = GF(28)

{0} {fc}

GF(24)∗ κ(0) ⊕ GF(24)∗ α16 ⊙ GF(24)∗ κ((F4

2)∗)

... α2 ⊙ GF(24)∗ α1 ⊙ GF(24)∗ κ(15) ⊕ GF(24)∗ κ(14) ⊕ GF(24)∗ ...

25 / 44

slide-52
SLIDE 52

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Cosets to Cosets

GF(28) π(GF(28)) = GF(28)

{0} {fc}

GF(24)∗ κ(0) ⊕ GF(24)∗ α16 ⊙ GF(24)∗ κ((F4

2)∗)

... α2 ⊙ GF(24)∗ α1 ⊙ GF(24)∗ κ(15) ⊕ GF(24)∗ κ(14) ⊕ GF(24)∗ ... ...

25 / 44

slide-53
SLIDE 53

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The TKlog [Per18]

A TKlog operates on GF(22m) and uses: α: a generator of GF(22m), κ: an affine function Fm

2 → GF(22m) with

κ(Fm

2 ) ⊕ GF(2m) = GF(22m),

s: a permutation of Z/(2m − 1)Z. The corresponding TKlog is denoted Tκ,s and it works as follows: ⎧ ⎪ ⎨ ⎪ ⎩ Tκ,s(0) = κ(0) , Tκ,s (︁ (α2m+1)j)︁ = κ(2m − j), for 1 ≤ j ≤ 2m − 1 , Tκ,s (︁ αi+(2m+1)j)︁ = κ(2m − i) ⊕ (︁ α2m+1)︁s(j) , for 0 < i, 0 ≤ j < 2m − 1 .

26 / 44

slide-54
SLIDE 54

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Case of π

p = X 8 + X 4 + X 3 + X 2 + 1, s = [0, 12, 9, 8, 7, 4, 14, 6, 5, 10, 2, 11, 1, 3, 13], κ(x) = Λ(x) ⊕ 0xfc, Λ(1) = 0x12, Λ(2) = 0x26, Λ(4) = 0x24, Λ(8) = 0x30

27 / 44

slide-55
SLIDE 55

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

Case of π

p = X 8 + X 4 + X 3 + X 2 + 1, s = [0, 12, 9, 8, 7, 4, 14, 6, 5, 10, 2, 11, 1, 3, 13], κ(x) = Λ(x) ⊕ 0xfc, Λ(1) = 0x12, Λ(2) = 0x26, Λ(4) = 0x24, Λ(8) = 0x30 #TKlogs = 16 ⏟ ⏞

p

× 15! ⏟ ⏞

s

×

7

∏︂

i=4

(28 − 2i) ⏟ ⏞

Λ

× 28 ⏟ ⏞

κ(0)

≈ 282.6 #8-bit perm. = 21684 ; #Affine perm. = 28 ⏟ ⏞

cstte

×

7

∏︂

i=0

(28 − 2i) ⏟ ⏞

linear part

≈ 270.2 .

27 / 44

slide-56
SLIDE 56

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The Linear Layer of Streebog (1/2)

28 / 44

slide-57
SLIDE 57

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The Linear Layer of Streebog (2/2)

It is actually a matrix multiplication in GF(28): ⎡ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ 83 47 8b 07 b2 46 87 64 46 b6 0f 01 1a 83 98 8e ac cc 9c a9 32 8a 89 50 03 21 65 8c ba 93 c1 38 5b 06 8c 65 18 10 a8 9e f 9 7d 86 d9 8a 32 77 28 a4 8b 47 4f 9e f 5 dc 18 64 1c 31 4b 2b 8e e0 83 ⎤ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ .

29 / 44

slide-58
SLIDE 58

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The Linear Layer of Streebog (2/2)

It is actually a matrix multiplication in GF(28): ⎡ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ 83 47 8b 07 b2 46 87 64 46 b6 0f 01 1a 83 98 8e ac cc 9c a9 32 8a 89 50 03 21 65 8c ba 93 c1 38 5b 06 8c 65 18 10 a8 9e f 9 7d 86 d9 8a 32 77 28 a4 8b 47 4f 9e f 5 dc 18 64 1c 31 4b 2b 8e e0 83 ⎤ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ . The polynomial used is the same as in π.

29 / 44

slide-59
SLIDE 59

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The Linear Layer of Streebog (2/2)

It is actually a matrix multiplication in GF(28): ⎡ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ 83 47 8b 07 b2 46 87 64 46 b6 0f 01 1a 83 98 8e ac cc 9c a9 32 8a 89 50 03 21 65 8c ba 93 c1 38 5b 06 8c 65 18 10 a8 9e f 9 7d 86 d9 8a 32 77 28 a4 8b 47 4f 9e f 5 dc 18 64 1c 31 4b 2b 8e e0 83 ⎤ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ . The polynomial used is the same as in π. A new security analysis is badly needed!

29 / 44

slide-60
SLIDE 60

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion TU-Decomposition Decomposing a Mysterious S-box The Plot Thickens

The Linear Layer of Streebog (2/2)

It is actually a matrix multiplication in GF(28): ⎡ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎢ ⎣ 83 47 8b 07 b2 46 87 64 46 b6 0f 01 1a 83 98 8e ac cc 9c a9 32 8a 89 50 03 21 65 8c ba 93 c1 38 5b 06 8c 65 18 10 a8 9e f 9 7d 86 d9 8a 32 77 28 a4 8b 47 4f 9e f 5 dc 18 64 1c 31 4b 2b 8e e0 83 ⎤ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎥ ⎦ . The polynomial used is the same as in π. A new security analysis is badly needed! Reverse-engineering works!

29 / 44

slide-61
SLIDE 61

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Outline

1 My Area of Research: Symmetric Cryptography 2 From Russia With Love 3 Cryptanalysis of a Theorem 4 Conclusion

29 / 44

slide-62
SLIDE 62

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Outline

We can obtain new mathematical results using decompositions.

1 The big APN problem and its only known solutions 2 Decomposing and generalizing this solution as butterflies 3 Generalizing a property of butterflies

30 / 44

slide-63
SLIDE 63

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

The Big APN Problem

Definition (APN function)

A function S : Fn

2 → Fn 2 is Almost Perfect Non-linear (APN) if

S(x ⊕ a) ⊕ S(x) = b has 0 or 2 solutions for all a ̸= 0 and for all b.

31 / 44

slide-64
SLIDE 64

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

The Big APN Problem

Definition (APN function)

A function S : Fn

2 → Fn 2 is Almost Perfect Non-linear (APN) if

S(x ⊕ a) ⊕ S(x) = b has 0 or 2 solutions for all a ̸= 0 and for all b.

Big APN Problem

Are there APN permutations operating on Fn

2 where n is even? [NK95]

31 / 44

slide-65
SLIDE 65

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Dillon et al.’s Permutation

Only One Known Solution!

For n = 6, Dillon et al. [BDKM09] found an APN permutation.

32 / 44

slide-66
SLIDE 66

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Dillon et al.’s Permutation

Only One Known Solution!

For n = 6, Dillon et al. [BDKM09] found an APN permutation.

32 / 44

slide-67
SLIDE 67

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Dillon et al.’s Permutation

Only One Known Solution!

For n = 6, Dillon et al. [BDKM09] found an APN permutation.

32 / 44

slide-68
SLIDE 68

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Dillon et al.’s Permutation

Only One Known Solution!

For n = 6, Dillon et al. [BDKM09] found an APN permutation. It is possible to make a TU-decomposition! [PUB16]

32 / 44

slide-69
SLIDE 69

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

On the Butterfly Structure

βx3 x1/3 ⊙ α ⊕ ⊕ βx3 x3 ⊙ α ⊕ ⊕

Definition (Open Butterfly H3

α,β)

This permutation is an open butterfly

[PUB16].

33 / 44

slide-70
SLIDE 70

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

On the Butterfly Structure

βx3 x1/3 ⊙ α ⊕ ⊕ βx3 x3 ⊙ α ⊕ ⊕ U−1 U

Definition (Open Butterfly H3

α,β)

This permutation is an open butterfly

[PUB16].

Lemma

Dillon’s permutation is affine-equivalent to H3

w,1, where Tr (w) = 0.

33 / 44

slide-71
SLIDE 71

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Closed Butterflies

⊙ α ⊕ x3 βx3 ⊕ ⊙ α ⊕ x3 βx3 ⊕

Definition (Closed butterfly V3

α,β)

This quadratic function is a closed butterfly.

34 / 44

slide-72
SLIDE 72

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Closed Butterflies

⊙ α ⊕ x3 βx3 ⊕ ⊙ α ⊕ x3 βx3 ⊕ U U

Definition (Closed butterfly V3

α,β)

This quadratic function is a closed butterfly.

Lemma (Equivalence)

Open and closed butterflies with the same parameters are CCZ-equivalent.

34 / 44

slide-73
SLIDE 73

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Properties of Butterflies

Let n ≤ 3 be odd. Butterflies... ... are APN but only for n = 3 [CDP17, CPT18] ... are differentially-4 (the best) for n > 3 ... have the best non-linearity ... are rather cheap to implement

Open Butterfly

U−1 U 2n-bit permutation. Algebraic degree n (or n + 1).

Closed Butterfly

U U 2n-bit function for n ≤ 3 odd. Algebraic degree 2.

35 / 44

slide-74
SLIDE 74

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Equivalence Relations (1/2)

Definition (Affine-Equivalence)

F and G are affine equivalent if G(x) = (B ∘ F ∘ A)(x), where A, B are affine permutations.

36 / 44

slide-75
SLIDE 75

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Equivalence Relations (1/2)

Definition (Affine-Equivalence)

F and G are affine equivalent if G(x) = (B ∘ F ∘ A)(x), where A, B are affine permutations. Equivalently, we need to have {︂ (x, G(x)), ∀x ∈ Fn

2

}︂ = [︃ A−1 B ]︃ (︂{︂ (x, F(x)), ∀x ∈ Fn

2

}︂)︂ .

36 / 44

slide-76
SLIDE 76

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Equivalence Relations (2/2)

Definition (CCZ-Equivalence [CCZ98])

F : Fn

2 → Fm 2 and G : Fn 2 → Fm 2 are C(arlet)-C(harpin)-Z(inoviev)

equivalent if ΓG = {︁ (x, G(x)), ∀x ∈ Fn

2

}︁ = ℒ (︁{︁ (x, F(x)), ∀x ∈ Fn

2

}︁)︁ = ℒ(ΓF) , where ℒ : Fn+m

2

→ Fn+m

2

is an affine permutation. For example, F and F −1 are CCZ-equivalent.

37 / 44

slide-77
SLIDE 77

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Equivalence Relations (2/2)

Definition (CCZ-Equivalence [CCZ98])

F : Fn

2 → Fm 2 and G : Fn 2 → Fm 2 are C(arlet)-C(harpin)-Z(inoviev)

equivalent if ΓG = {︁ (x, G(x)), ∀x ∈ Fn

2

}︁ = ℒ (︁{︁ (x, F(x)), ∀x ∈ Fn

2

}︁)︁ = ℒ(ΓF) , where ℒ : Fn+m

2

→ Fn+m

2

is an affine permutation. For example, F and F −1 are CCZ-equivalent. CCZ-equivalence preserves some properties (differential and linear) but not others (algebraic degree).

37 / 44

slide-78
SLIDE 78

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Equivalence Relations (2/2)

Definition (CCZ-Equivalence [CCZ98])

F : Fn

2 → Fm 2 and G : Fn 2 → Fm 2 are C(arlet)-C(harpin)-Z(inoviev)

equivalent if ΓG = {︁ (x, G(x)), ∀x ∈ Fn

2

}︁ = ℒ (︁{︁ (x, F(x)), ∀x ∈ Fn

2

}︁)︁ = ℒ(ΓF) , where ℒ : Fn+m

2

→ Fn+m

2

is an affine permutation. For example, F and F −1 are CCZ-equivalent. CCZ-equivalence preserves some properties (differential and linear) but not others (algebraic degree). The TU-decomposition plays a crucial role in CCZ-equivalence.

37 / 44

slide-79
SLIDE 79

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Twist

Any function F : Fn

2 → Fm 2 can be projected on Ft 2 × Fm−t 2

. T U x y u v t n − t t m − t

38 / 44

slide-80
SLIDE 80

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

Twist

Any function F : Fn

2 → Fm 2 can be projected on Ft 2 × Fm−t 2

. T U x y u v t n − t t m − t F T −1 U u y x v t n − t t m − t G If T is a permutation for all secondary inputs, then we define the t-twist equivalent of F as G, where G(x, y) = (︁ T −1

y (x), UT −1

y

(x)(y)

)︁ for all (x, y) ∈ Ft

2 × Fn−t 2

.

38 / 44

slide-81
SLIDE 81

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

TU-Decomposition and CCZ-Equivalence

Theorem ([CP19])

If F and G are CCZ-equivalent then either their equivalence is trivial or it involves a t-twist.

39 / 44

slide-82
SLIDE 82

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion The Big APN Problem and its Only Known Solution On Butterflies CCZ-Equivalence

TU-Decomposition and CCZ-Equivalence

Theorem ([CP19])

If F and G are CCZ-equivalent then either their equivalence is trivial or it involves a t-twist. In other words, if F is non-trivially CCZ-equivalent to something else then it must have a TU-decomposition!

39 / 44

slide-83
SLIDE 83

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Outline

1 My Area of Research: Symmetric Cryptography 2 From Russia With Love 3 Cryptanalysis of a Theorem 4 Conclusion

39 / 44

slide-84
SLIDE 84

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Conclusion

Decompositions play a crucial role in cryptography! When designing When implementing When attacking

40 / 44

slide-85
SLIDE 85

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Conclusion

Decompositions play a crucial role in cryptography! When designing When implementing When attacking They allow us to bring cryptographic techniques to other fields of mathematics.

40 / 44

slide-86
SLIDE 86

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Open Problems (Symmetric Cryptography)

Russian Shenanigans

Is it possible to use the latest decomposition of the Russian S-box to attack the corresponding algorithms?

41 / 44

slide-87
SLIDE 87

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Open Problems (Symmetric Cryptography)

Russian Shenanigans

Is it possible to use the latest decomposition of the Russian S-box to attack the corresponding algorithms?

DES

What are the decompositions in the S-boxes of the DES (that we don’t know of)? Could we use them in attacks?

41 / 44

slide-88
SLIDE 88

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Open Problems (Discrete Mathematics)

TU-decomposition in GF

The TU-decomposition and the twist are defined over Fn

  • 2. Can we find a

nice representation over GF(2n)?

42 / 44

slide-89
SLIDE 89

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Open Problems (Discrete Mathematics)

TU-decomposition in GF

The TU-decomposition and the twist are defined over Fn

  • 2. Can we find a

nice representation over GF(2n)?

Big APN Problem

Is there an APN permutation of an even number of bits (n ≥ 8)?

42 / 44

slide-90
SLIDE 90

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

Open Problems (Discrete Mathematics)

TU-decomposition in GF

The TU-decomposition and the twist are defined over Fn

  • 2. Can we find a

nice representation over GF(2n)?

Big APN Problem

Is there an APN permutation of an even number of bits (n ≥ 8)?

Other Decomposition

Are there other decompositions as general as the TU-decomposition? Are

  • ther mathematical structures explained by an underlying decomposition?

42 / 44

slide-91
SLIDE 91

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion

The Last S-Box

14 11 60 6d e9 10 e3 2 b 90 d 17 c5 b0 9f c5 d8 da be 22 8 f3 4 a9 fe f3 f5 fc bc 30 be 26 bb 88 85 46 f4 2e e fd 76 fe b0 11 4e de 35 bb 30 4b 30 d6 dd df df d4 90 7a d8 8c 6a 89 30 39 e9 1 da d2 85 87 d3 d4 ba 2b d4 9f 9c 38 8c 55 d3 86 bb db ec e0 46 48 bf 46 1b 1c d7 d9 1b e0 23 d4 d7 7f 16 3f 3 3 44 c3 59 10 2a da ed e9 8e d8 d1 db cb cb c3 c7 38 22 34 3d db 85 23 7c 24 d1 d8 2e fc 44 8 38 c8 c7 39 4c 5f 56 2a cf d0 e9 d2 68 e4 e3 e9 13 e2 c 97 e4 60 29 d7 9b d9 16 24 94 b3 e3 4c 4c 4f 39 e0 4b bc 2c d3 94 81 96 93 84 91 d0 2e d6 d2 2b 78 ef d6 9e 7b 72 ad c4 68 92 7a d2 5 2b 1e d0 dc b1 22 3f c3 c3 88 b1 8d b5 e3 4e d7 81 3 15 17 25 4e 65 88 4e e4 3b 81 81 fa 1 1d 4 22 6 1 27 68 27 2e 3b 83 c7 cc 25 9b d8 d5 1c 1f e5 59 7f 3f 3f ef

43 / 44

slide-92
SLIDE 92

My Area of Research: Symmetric Cryptography From Russia With Love Cryptanalysis of a Theorem Conclusion 44 / 44

slide-93
SLIDE 93

Appendix Details on CCZ-Equivalence

Swap Matrices

The swap matrix permuting Fn+m

2

is defined for t ≤ min(n, m) as Mt = ⎡ ⎢ ⎢ ⎣ It In−t It Im−t ⎤ ⎥ ⎥ ⎦ . It has a simple interpretation: t n − t t m − t For all t ≤ min(n, m), Mt is an orthogonal and symmetric involution.

1 / 4

slide-94
SLIDE 94

Appendix Details on CCZ-Equivalence

Swap Matrices and Twisting

F : Fn

2 → Fm 2

T U t n − t t m − t t-twist G : Fn

2 → Fm 2

T −1 U t n − t t m − t ΓF = {︁ (x, F(x)) , ∀x ∈ Fn

2

}︁ Mt ΓG = {︁ (x, G(x)) , ∀x ∈ Fn

2

}︁ 𝒳F(u) = 𝒳G (Mt(u))

2 / 4

slide-95
SLIDE 95

Appendix Details on CCZ-Equivalence

Twisting and CCZ-Class

Lemma

Twisting preserves the CCZ-equivalence class.

3 / 4

slide-96
SLIDE 96

Appendix Details on CCZ-Equivalence

Main Result

Theorem

If F : Fn

2 → Fm 2 and G : Fn 2 → Fm 2 are CCZ-equivalent, then

ΓG = (B × Mt × A)(ΓF) , where A and B are EA-mappings and where t = dim (︁ projV⊥ (︁ (AT × Mt × BT)(𝒲) )︁)︁ .

Corollary

If a function is CCZ-equivalent but not EA-equivalent to another function, then they have to be EA-equivalent to functions for which a t-twist is possible.

4 / 4

slide-97
SLIDE 97

Appendix Details on CCZ-Equivalence

  • K. A. Browning, J.F. Dillon, R.E. Kibler, and M. T. McQuistan.

APN Polynomials and Related Codes.

  • J. of Combinatorics, Information and System Sciences,

34(1-4):135–159, 2009. Alex Biryukov, L´ eo Perrin, and Aleksei Udovenko. Reverse-engineering the S-box of streebog, kuznyechik and STRIBOBr1. In Marc Fischlin and Jean-S´ ebastien Coron, editors, EUROCRYPT 2016, Part I, volume 9665 of LNCS, pages 372–402. Springer, Heidelberg, May 2016. Claude Carlet, Pascale Charpin, and Victor Zinoviev. Codes, bent functions and permutations suitable for DES-like cryptosystems. Designs, Codes and Cryptography, 15(2):125–156, 1998. Anne Canteaut, S´ ebastien Duval, and L´ eo Perrin. A generalisation of Dillon’s APN permutation with the best known differential and nonlinear properties for all fields of size 24k+2.

4 / 4

slide-98
SLIDE 98

Appendix Details on CCZ-Equivalence

IEEE Transactions on Information Theory, 63(11):7575–7591, Nov 2017. Anne Canteaut and L´ eo Perrin. On CCZ-equivalence, extended-affine equivalence, and function twisting. Finite Fields and Their Applications, 56:209–246, 2019. Anne Canteaut, L´ eo Perrin, and Shizhu Tian. If a generalised butterfly is APN then it operates on 6 bits. Cryptology ePrint Archive, Report 2018/1036, 2018. https://eprint.iacr.org/2018/1036. Kaisa Nyberg and Lars R. Knudsen. Provable security against a differential attack. Journal of Cryptology, 8(1):27–37, 1995. L´ eo Perrin. Partitions in the S-box of Streebog and Kuznyechik. To appear (IACR ToSC), 2018. L´ eo Perrin and Aleksei Udovenko.

4 / 4

slide-99
SLIDE 99

Appendix Details on CCZ-Equivalence

Exponential s-boxes: a link between the s-boxes of BelT and Kuznyechik/Streebog. IACR Trans. Symm. Cryptol., 2016(2):99–124, 2016. http://tosc.iacr.org/index.php/ToSC/article/view/567. L´ eo Perrin, Aleksei Udovenko, and Alex Biryukov. Cryptanalysis of a theorem: Decomposing the only known solution to the big APN problem. In Matthew Robshaw and Jonathan Katz, editors, CRYPTO 2016, Part II, volume 9815 of LNCS, pages 93–122. Springer, Heidelberg, August 2016.

4 / 4