The Phantom of Differential Characteristics Yunwen Liu joint work - - PowerPoint PPT Presentation

the phantom of differential characteristics
SMART_READER_LITE
LIVE PREVIEW

The Phantom of Differential Characteristics Yunwen Liu joint work - - PowerPoint PPT Presentation

The Phantom of Differential Characteristics Yunwen Liu joint work with Bing Sun, Guoqiang Liu, Chao Li and Shaojing Fu ESAT/COSIC, KU Leuven, and imec, Belgium National University of Defense Technology, China ASK, December 2017 1 Motivation 2


slide-1
SLIDE 1

The Phantom of Differential Characteristics

Yunwen Liu

joint work with Bing Sun, Guoqiang Liu, Chao Li and Shaojing Fu

ESAT/COSIC, KU Leuven, and imec, Belgium National University of Defense Technology, China

ASK, December 2017

1

slide-2
SLIDE 2

Motivation

2

slide-3
SLIDE 3

Motivation

Distinguisher

+

2

slide-4
SLIDE 4

Motivation

Distinguisher

+

Attack

2

slide-5
SLIDE 5

Motivation

Distinguisher

+

Attack

For various application scenarios, we often assume the ability of an attacker to control the keys:

2

slide-6
SLIDE 6

Motivation

Distinguisher

+

Attack

For various application scenarios, we often assume the ability of an attacker to control the keys: Single-key model

2

slide-7
SLIDE 7

Motivation

Distinguisher

+

Attack

For various application scenarios, we often assume the ability of an attacker to control the keys: Single-key model Open-key model

2

slide-8
SLIDE 8

Motivation

Distinguisher

+

Attack

For various application scenarios, we often assume the ability of an attacker to control the keys: Single-key model Open-key model

◮ related-key attack ◮ weak-key attack ◮ known-key attack

2

slide-9
SLIDE 9

Motivation

Differential cryptanalysis

3

slide-10
SLIDE 10

Motivation

Differential cryptanalysis One of the most extensively studied cryptanalytic techniques Ek Ek x ⊕ δ x y ⊕ ∆ y

3

slide-11
SLIDE 11

Motivation

Differential cryptanalysis One of the most extensively studied cryptanalytic techniques Track probabilistic difference propagation Ek Ek x ⊕ δ x y ⊕ ∆ y

3

slide-12
SLIDE 12

Motivation

Differential cryptanalysis One of the most extensively studied cryptanalytic techniques Track probabilistic difference propagation Differential characteristics and differentials Ek Ek x ⊕ δ x y ⊕ ∆ y

3

slide-13
SLIDE 13

Motivation

Differential cryptanalysis One of the most extensively studied cryptanalytic techniques Track probabilistic difference propagation Differential characteristics and differentials Distinguish from random and key recovery Ek Ek x ⊕ δ x y ⊕ ∆ y

3

slide-14
SLIDE 14

Motivation

An attacker wants to know probability of a differential (δ, ∆) under a secret key k

4

slide-15
SLIDE 15

Motivation

An attacker wants to know probability of a differential (δ, ∆) under a secret key k

4

slide-16
SLIDE 16

Motivation

An attacker wants to know probability of a differential (δ, ∆) under a secret key k expected probabilities of a differential (δ, ∆) over all master keys

4

slide-17
SLIDE 17

Motivation

An attacker wants to know probability of a differential (δ, ∆) under a secret key k expected probabilities of a differential (δ, ∆) over all master keys

4

slide-18
SLIDE 18

Motivation

An attacker wants to know probability of a differential (δ, ∆) under a secret key k expected probabilities of a differential (δ, ∆) over all master keys sum on the expected probabilities of all or some characteristics in a differential (δ, ∆) over all random round keys

4

slide-19
SLIDE 19

Motivation

An attacker wants to know probability of a differential (δ, ∆) under a secret key k expected probabilities of a differential (δ, ∆) over all master keys sum on the expected probabilities of all or some characteristics in a differential (δ, ∆) over all random round keys

Assumptions

Markov cipher Independently random round keys Hypothesis of stochastic equivalence

4

slide-20
SLIDE 20

Motivation

With the assumptions, it allows to

5

slide-21
SLIDE 21

Motivation

With the assumptions, it allows to estimate the averaged strength of a distinguisher

5

slide-22
SLIDE 22

Motivation

With the assumptions, it allows to estimate the averaged strength of a distinguisher provable resistance against differential cryptanalysis

5

slide-23
SLIDE 23

Motivation

With the assumptions, it allows to estimate the averaged strength of a distinguisher provable resistance against differential cryptanalysis guideline for designs

5

slide-24
SLIDE 24

Motivation

With the assumptions, it allows to estimate the averaged strength of a distinguisher provable resistance against differential cryptanalysis guideline for designs However, an attacker targets on one secret key.

5

slide-25
SLIDE 25

Motivation

With the assumptions, it allows to estimate the averaged strength of a distinguisher provable resistance against differential cryptanalysis guideline for designs However, an attacker targets on one secret key. The probability of a differential distinguisher determines the attack complexity

5

slide-26
SLIDE 26

Motivation

With the assumptions, it allows to estimate the averaged strength of a distinguisher provable resistance against differential cryptanalysis guideline for designs However, an attacker targets on one secret key. The probability of a differential distinguisher determines the attack complexity Differential or impossible differential?

5

slide-27
SLIDE 27

Motivation

Discrepancy observed in previous works:

6

slide-28
SLIDE 28

Motivation

Discrepancy observed in previous works: ARX ciphers:

6

slide-29
SLIDE 29

Motivation

Discrepancy observed in previous works: ARX ciphers:

◮ Differential cryptanalysis on ARX-based hash functions, see for

instance [Leu12]

6

slide-30
SLIDE 30

Motivation

Discrepancy observed in previous works: ARX ciphers:

◮ Differential cryptanalysis on ARX-based hash functions, see for

instance [Leu12]

◮ Rotational cryptanalysis [KNP+15]

6

slide-31
SLIDE 31

Motivation

Discrepancy observed in previous works: ARX ciphers:

◮ Differential cryptanalysis on ARX-based hash functions, see for

instance [Leu12]

◮ Rotational cryptanalysis [KNP+15]

Plateau characteristics [DR07]

6

slide-32
SLIDE 32

Motivation

Discrepancy observed in previous works: ARX ciphers:

◮ Differential cryptanalysis on ARX-based hash functions, see for

instance [Leu12]

◮ Rotational cryptanalysis [KNP+15]

Plateau characteristics [DR07] Refined differential probability with key being zero [CLN+17]

6

slide-33
SLIDE 33

Motivation

Discrepancy observed in previous works: ARX ciphers:

◮ Differential cryptanalysis on ARX-based hash functions, see for

instance [Leu12]

◮ Rotational cryptanalysis [KNP+15]

Plateau characteristics [DR07] Refined differential probability with key being zero [CLN+17] . . .

[Leu12] G. Leurant. Analysis of differential attacks in ARX constructions. ASIACRYPT 2012 [KNP+15] D. Khovratovich, I. Nikoli´ c, J. Pieprzyk, P. Soko lowski, R. Steinfeld. Rotational cryptanalysis of ARX

  • revisited. FSE 2015

[DR07] J. Daemen, V. Rijmen. Plateau characteristics. IET information security, 2007 [CLN+17] A. Canteaut, E. Lambooij, S. Neves, S. Rasoolzadeh, Y. Sasaki, M. Stevens. Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds. IACR ToSC 2017 (2)

6

slide-34
SLIDE 34

Motivation

EDP

Independently random keys Probability

7

slide-35
SLIDE 35

Motivation

EDP

Independently random keys Probability To what extent can we rely on the Assumptions?

7

slide-36
SLIDE 36

Motivation

Enumerate characteristics under the Assumptions:

8

slide-37
SLIDE 37

Motivation

Enumerate characteristics under the Assumptions: S S . . . S k k k

8

slide-38
SLIDE 38

Motivation

Enumerate characteristics under the Assumptions: S S . . . S k k k For a fixed key, # characteristics = 215

8

slide-39
SLIDE 39

Motivation

Enumerate characteristics under the Assumptions: S S . . . S k k k For a fixed key, # characteristics = 215 Under the Assumptions, # characteristics = 28 × 27 × · · · × 27 = 27r+8

8

slide-40
SLIDE 40

Motivation

Enumerate characteristics under the Assumptions: S S . . . S k k k For a fixed key, # characteristics = 215 Under the Assumptions, # characteristics = 28 × 27 × · · · × 27 = 27r+8 A characteristic generated under the Assumptions is “almost” impossible in reality.

8

slide-41
SLIDE 41

Motivation

To study differential probability in fixed-key block ciphers and permutations It is crucial to ask:

9

slide-42
SLIDE 42

Motivation

To study differential probability in fixed-key block ciphers and permutations It is crucial to ask: EDP= 0 while DP = 0 for all keys?

9

slide-43
SLIDE 43

Motivation

To study differential probability in fixed-key block ciphers and permutations It is crucial to ask: EDP= 0 while DP = 0 for all keys? Differential characteristics enumeration?

9

slide-44
SLIDE 44

Motivation

To study differential probability in fixed-key block ciphers and permutations It is crucial to ask: EDP= 0 while DP = 0 for all keys? Differential characteristics enumeration? Characteristics-based attacks?

9

slide-45
SLIDE 45

Motivation

To study differential probability in fixed-key block ciphers and permutations It is crucial to ask: EDP= 0 while DP = 0 for all keys? Differential characteristics enumeration? Characteristics-based attacks? Compute DP under any given key?

9

slide-46
SLIDE 46

Motivation

To study differential probability in fixed-key block ciphers and permutations It is crucial to ask: EDP= 0 while DP = 0 for all keys? Differential characteristics enumeration? Characteristics-based attacks? Compute DP under any given key? Design better key schedules and/or constants?

9

slide-47
SLIDE 47

Effective Keys and Singular Characteristics

10

slide-48
SLIDE 48

Effective Keys and Singular Characteristics

Differential probability is dependent on the key

10

slide-49
SLIDE 49

Effective Keys and Singular Characteristics

Differential probability is dependent on the key Characteristics with zero or nonzero probability

10

slide-50
SLIDE 50

Effective Keys and Singular Characteristics

Differential probability is dependent on the key Characteristics with zero or nonzero probability

Effective keys

A key is effective for a characteristic if the characteristic is of nonzero probability under the key.

10

slide-51
SLIDE 51

Effective Keys and Singular Characteristics

Differential probability is dependent on the key Characteristics with zero or nonzero probability

Effective keys

A key is effective for a characteristic if the characteristic is of nonzero probability under the key. If no effective key exists, it is called a singular characteristic.

10

slide-52
SLIDE 52

Effective Keys

S P S k SPN cipher with keys XORed after the linear layer

slide-53
SLIDE 53

Effective Keys

S P S k x y SPN cipher with keys XORed after the linear layer Right output and right input of the Sboxes

11

slide-54
SLIDE 54

Effective Keys

S P S k x y SPN cipher with keys XORed after the linear layer Right output and right input of the Sboxes Effective key candidates: k = Px ⊕ y

11

slide-55
SLIDE 55

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

12

slide-56
SLIDE 56

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1

12

slide-57
SLIDE 57

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3

12

slide-58
SLIDE 58

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k

12

slide-59
SLIDE 59

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k When the difference propagation is legal, the effective key set

  • f a 2-round characteristic is non-empty.

12

slide-60
SLIDE 60

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k When the difference propagation is legal, the effective key set

  • f a 2-round characteristic is non-empty.

Effective keys derived from two consecutive rounds may not be compatible with the key schedule.

12

slide-61
SLIDE 61

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k Procedure:

13

slide-62
SLIDE 62

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k Procedure:

  • 1. Conditions on Ki to be effective

13

slide-63
SLIDE 63

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k Procedure:

  • 1. Conditions on Ki to be effective
  • 2. Conditions based on a specific key schedule

13

slide-64
SLIDE 64

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k Procedure:

  • 1. Conditions on Ki to be effective
  • 2. Conditions based on a specific key schedule
  • 3. Key schedule details

13

slide-65
SLIDE 65

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k Procedure:

  • 1. Conditions on Ki to be effective
  • 2. Conditions based on a specific key schedule
  • 3. Key schedule details
  • 4. Linear equation systems

13

slide-66
SLIDE 66

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k Procedure:

  • 1. Conditions on Ki to be effective
  • 2. Conditions based on a specific key schedule
  • 3. Key schedule details
  • 4. Linear equation systems

◮ No solution found → singular

13

slide-67
SLIDE 67

Singular Characteristics

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k Procedure:

  • 1. Conditions on Ki to be effective
  • 2. Conditions based on a specific key schedule
  • 3. Key schedule details
  • 4. Linear equation systems

◮ No solution found → singular ◮ Key candidates found → Further filter by nonlinear constraints

13

slide-68
SLIDE 68

Singular Characteristics in the AES

Find singular characteristics in AES-128:

<< S

Picture credit: TikZ for Cryptographers

14

slide-69
SLIDE 69

Singular Characteristics in the AES

Find singular characteristics in AES-128: Subspaces of effective keys in every two consecutive rounds

<< S

Picture credit: TikZ for Cryptographers

14

slide-70
SLIDE 70

Singular Characteristics in the AES

Find singular characteristics in AES-128: Subspaces of effective keys in every two consecutive rounds Build equation systems with key schedule

<< S

Picture credit: TikZ for Cryptographers

14

slide-71
SLIDE 71

Singular Characteristics in the AES

Find singular characteristics in AES-128: Subspaces of effective keys in every two consecutive rounds Build equation systems with key schedule 3 out of 4 columns in AES-128 key schedule are linear relations

<< S

Picture credit: TikZ for Cryptographers

14

slide-72
SLIDE 72

Singular Characteristics in the AES

Find singular characteristics in AES-128: Subspaces of effective keys in every two consecutive rounds Build equation systems with key schedule 3 out of 4 columns in AES-128 key schedule are linear relations Simplify and solve the equation system

<< S

Picture credit: TikZ for Cryptographers

14

slide-73
SLIDE 73

Singular Characteristics in the AES

Examples of 5-round singular characteristics can be found in the AES-128.

    1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0    

S

→     1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0    

P

→     2 0 0 0 1 0 0 0 1 0 0 0 3 0 0 0    

S

→     3 0 0 0 1 0 0 0 1 0 0 0 2 0 0 0    

P

→     6 2 1 3 3 2 3 2 3 6 2 1 5 4 1 1    

S

→     24 27 39 9d 45 36 36 27 36 f1 2e 2d 39 2d 1f 3a    

P

→     6 0 0 0 5 0 0 0 5 0 0 0 36    

S

→     e 0 0 0 0 9 0 0 0 0 d 0 0 0 0 b    

P

→     1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0    

S

→     1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0     .

15

slide-74
SLIDE 74

Singular Characteristics in the AES

Examples of 5-round singular characteristics can be found in the AES-128.

    ∗ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0    

S

→     ∗ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0    

P

→     ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

S

→     ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

P

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

S

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

P

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

S

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗    

P

→     ∗ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0    

S

→     ∗ 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0     MITM attack

15

slide-75
SLIDE 75

Singular Characteristics in the AES

Density of singular characteristics:

16

slide-76
SLIDE 76

Singular Characteristics in the AES

Density of singular characteristics:

    ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

S

→     ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

P

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

S

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

P

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗    

S

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗    

16

slide-77
SLIDE 77

Singular Characteristics in the AES

Density of singular characteristics:

    ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

S

→     ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

P

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

S

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

P

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗    

S

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗     Enumerate all characteristics given a 3-round differential

16

slide-78
SLIDE 78

Singular Characteristics in the AES

Density of singular characteristics:

    ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

S

→     ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

P

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

S

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

P

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗    

S

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗     Enumerate all characteristics given a 3-round differential More than 98.47% of all the characteristics are singular

16

slide-79
SLIDE 79

Singular Characteristics in the AES

Density of singular characteristics:

    ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

S

→     ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

P

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

S

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

P

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗    

S

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗     Enumerate all characteristics given a 3-round differential More than 98.47% of all the characteristics are singular For the remaining characteristics, we consider the nonlinear constraints from the key schedule and get their effective keys

16

slide-80
SLIDE 80

Singular Characteristics in the AES

Density of singular characteristics:

    ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

S

→     ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0    

P

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

S

→     ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗    

P

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗    

S

→     ∗ 0 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 ∗     Enumerate all characteristics given a 3-round differential More than 98.47% of all the characteristics are singular For the remaining characteristics, we consider the nonlinear constraints from the key schedule and get their effective keys

◮ some of them may also be singular ◮ the number of effective keys is around 27 to 210

16

slide-81
SLIDE 81

Singular Characteristics in the AES

Different key schedules affect the singularity of a characteristic

17

slide-82
SLIDE 82

Singular Characteristics in the AES

Different key schedules affect the singularity of a characteristic

◮ Encrypt a pair of plaintexts under some key with AES-128,

track the characteristic

17

slide-83
SLIDE 83

Singular Characteristics in the AES

Different key schedules affect the singularity of a characteristic

◮ Encrypt a pair of plaintexts under some key with AES-128,

track the characteristic

◮ Change the key schedule into AES-192

17

slide-84
SLIDE 84

Singular Characteristics in the AES

Different key schedules affect the singularity of a characteristic

◮ Encrypt a pair of plaintexts under some key with AES-128,

track the characteristic

◮ Change the key schedule into AES-192 ◮ A valid characteristic in AES-128 is highly probable to be

singular in AES-192

17

slide-85
SLIDE 85

Singular Characteristics in the AES

Different key schedules affect the singularity of a characteristic

◮ Encrypt a pair of plaintexts under some key with AES-128,

track the characteristic

◮ Change the key schedule into AES-192 ◮ A valid characteristic in AES-128 is highly probable to be

singular in AES-192

Differential enumeration + key schedule constraints

17

slide-86
SLIDE 86

Singular Characteristics in the AES

Different key schedules affect the singularity of a characteristic

◮ Encrypt a pair of plaintexts under some key with AES-128,

track the characteristic

◮ Change the key schedule into AES-192 ◮ A valid characteristic in AES-128 is highly probable to be

singular in AES-192

Differential enumeration + key schedule constraints Extension to AES-like, Feistel-SP, Feistel

17

slide-87
SLIDE 87

Singular Characteristics in Prince

18

slide-88
SLIDE 88

Singular Characteristics in Prince

    8 0 4 0 0 0 0 0 4 0 8 0 0 0 0 0    

S

→     8 0 4 0 0 0 0 0 8 0 4 0 0 0 0 0    

M′

→     8 0 4 0 0 0 0 0 8 0 4 0 0 0 0 0    

SR

→     8 0 4 0 0 0 0 0 4 0 8 0 0 0 0 0    

S

→     8 0 5 0 0 0 0 0 8 0 5 0 0 0 0 0    

M′

→     8 0 5 0 0 0 0 0 8 0 5 0 0 0 0 0    

SR

→     8 0 5 0 0 0 0 0 5 0 8 0 0 0 0 0    

S

→     2 0 5 0 0 0 0 0 2 0 5 0 0 0 0 0    

18

slide-89
SLIDE 89

Singular Characteristics in Prince

    8 0 4 0 0 0 0 0 4 0 8 0 0 0 0 0    

S

→     8 0 4 0 0 0 0 0 8 0 4 0 0 0 0 0    

M′

→     8 0 4 0 0 0 0 0 8 0 4 0 0 0 0 0    

SR

→     8 0 4 0 0 0 0 0 4 0 8 0 0 0 0 0    

S

→     8 0 5 0 0 0 0 0 8 0 5 0 0 0 0 0    

M′

→     8 0 5 0 0 0 0 0 8 0 5 0 0 0 0 0    

SR

→     8 0 5 0 0 0 0 0 5 0 8 0 0 0 0 0    

S

→     2 0 5 0 0 0 0 0 2 0 5 0 0 0 0 0     A 3-round singular characteristic with EDP = 2−35

18

slide-90
SLIDE 90

Singular Cluster

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k

19

slide-91
SLIDE 91

Singular Cluster

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k α′

S

β′

P

α′

1

S

β′

1

P

α′

2

S

β′

2

P

α′

3

S

β′

3

P

α′

4

K′

1

K′

2

K′

3

19

slide-92
SLIDE 92

Singular Cluster

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k α′

S

β′

P

α′

1

S

β′

1

P

α′

2

S

β′

2

P

α′

3

S

β′

3

P

α′

4

K′

1

K′

2

K′

3

If no effective key in common → singular cluster.

19

slide-93
SLIDE 93

Singular Cluster

α0

S

β0

P

α1

S

β1

P

α2

S

β2

P

α3

S

β3

P

α4

K1 K2 K3 Key Schedule

k α′

S

β′

P

α′

1

S

β′

1

P

α′

2

S

β′

2

P

α′

3

S

β′

3

P

α′

4

K′

1

K′

2

K′

3

If no effective key in common → singular cluster. Differentials/truncated differentials/multiple differentials

19

slide-94
SLIDE 94

Further Applications

Observation: If a differential contains only singular characteristics, it is an impossible differential.

20

slide-95
SLIDE 95

Further Applications

Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16]

20

slide-96
SLIDE 96

Further Applications

Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule

20

slide-97
SLIDE 97

Further Applications

Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule Impossible differential by singular characteristics

20

slide-98
SLIDE 98

Further Applications

Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule Impossible differential by singular characteristics An impossible differential is found in a toy cipher

20

slide-99
SLIDE 99

Further Applications

Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule Impossible differential by singular characteristics An impossible differential is found in a toy cipher Improve distinguishers?

20

slide-100
SLIDE 100

Further Applications

Consider a 5-round differential D of the AES with active pattern 1-4-16-4-1. The effective keys of each characteristic can be precomputed. By assuming the knowledge on the effective keys of the differential:

21

slide-101
SLIDE 101

Further Applications

Consider a 5-round differential D of the AES with active pattern 1-4-16-4-1. The effective keys of each characteristic can be precomputed. By assuming the knowledge on the effective keys of the differential: ΩD = ∅ → singular

21

slide-102
SLIDE 102

Further Applications

Consider a 5-round differential D of the AES with active pattern 1-4-16-4-1. The effective keys of each characteristic can be precomputed. By assuming the knowledge on the effective keys of the differential: ΩD = ∅ → singular |ΩD| = ∅

21

slide-103
SLIDE 103

Further Applications

Consider a 5-round differential D of the AES with active pattern 1-4-16-4-1. The effective keys of each characteristic can be precomputed. By assuming the knowledge on the effective keys of the differential: ΩD = ∅ → singular |ΩD| = ∅

◮ Information leaked about the secret key

21

slide-104
SLIDE 104

Further Applications

Consider a 5-round differential D of the AES with active pattern 1-4-16-4-1. The effective keys of each characteristic can be precomputed. By assuming the knowledge on the effective keys of the differential: ΩD = ∅ → singular |ΩD| = ∅

◮ Information leaked about the secret key ◮ The total number of characteristics is around 270, |ΩD| < 2128

21

slide-105
SLIDE 105

Further Applications

Consider a 5-round differential D of the AES with active pattern 1-4-16-4-1. The effective keys of each characteristic can be precomputed. By assuming the knowledge on the effective keys of the differential: ΩD = ∅ → singular |ΩD| = ∅

◮ Information leaked about the secret key ◮ The total number of characteristics is around 270, |ΩD| < 2128 ◮ Exhaustive search space reduced?

21

slide-106
SLIDE 106

Summary

Differential cryptanalysis in fixed-key block ciphers and permutations

22

slide-107
SLIDE 107

Summary

Differential cryptanalysis in fixed-key block ciphers and permutations Effective keys and singular characteristics are proposed based

  • n fixed-key DP

22

slide-108
SLIDE 108

Summary

Differential cryptanalysis in fixed-key block ciphers and permutations Effective keys and singular characteristics are proposed based

  • n fixed-key DP

Concrete examples are found for AES-like ciphers with efficient algorithms

22

slide-109
SLIDE 109

Summary

Differential cryptanalysis in fixed-key block ciphers and permutations Effective keys and singular characteristics are proposed based

  • n fixed-key DP

Concrete examples are found for AES-like ciphers with efficient algorithms Pay extra attention to characteristics generated from enumeration techniques when they are applied in attacks

22

slide-110
SLIDE 110

Summary

Differential cryptanalysis in fixed-key block ciphers and permutations Effective keys and singular characteristics are proposed based

  • n fixed-key DP

Concrete examples are found for AES-like ciphers with efficient algorithms Pay extra attention to characteristics generated from enumeration techniques when they are applied in attacks New approach towards improved distinguisher or key recovery technique

22

slide-111
SLIDE 111

Summary

Differential cryptanalysis in fixed-key block ciphers and permutations Effective keys and singular characteristics are proposed based

  • n fixed-key DP

Concrete examples are found for AES-like ciphers with efficient algorithms Pay extra attention to characteristics generated from enumeration techniques when they are applied in attacks New approach towards improved distinguisher or key recovery technique Thank you for your attention!

22