Top Banner
Analysis and design of symmetric ciphers David Wagner University of California, Berkeley
27

Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Dec 16, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Analysis and design of symmetric ciphers

David Wagner

University of California, Berkeley

Page 2: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

x

Ek(x)

k

What’s a block cipher?

Ek : X → X bijective for all k

Page 3: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

When is a block cipher secure?

x

(x)randompermutation

k E

x

Ek(x)

blockcipher

Answer: when these two black boxes are indistinguishable.

Page 4: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: The AES

S S S S S S SS S S S S S S SS

4×4 matrix 4×4 matrix 4×4 matrix4×4 matrix

byte re-ordering

One

round

S(x) = l(l’(x)-1) in GF(28), where l,l’ are GF(2)-linearand the MDS matrix and byte re-ordering are GF(28)-linear

Page 5: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

In this talk:

Survey of cryptanalysis of block ciphers Steps towards a unifying view of this field Algebraic attacks

How do we tell if a block cipher is secure? How do we design good ones?

Page 6: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

How to attack a product cipher

1. Identify local properties of its round functions

2. Piece these together into global properties of the whole cipher

X

X

Ek

X

X

X

X

f1

fn

=

Page 7: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Motif #1: projection

Identify local properties using commutative diagrams:

X

X

fk

where:

fk = original round function

Y

Y

gk’ gk’ = reduced round function

and:gk’ ○ = ’ ○ fk

Page 8: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Concatenating local properties

Build global commutative diagrams out of local ones:

X

X

f1

Y

Y

g1

X

X

f2

Y

Y

g2+

X Y

’X

f1

Y

g1

”X

f2

Y

g2

=

Page 9: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Exploiting global properties

Use global properties to build a known-text attack:

X

X

Ek

Y

Y

g

The distinguisher: Let (x, y) be a

plaintext/ciphertext pair If g((x)) =’(y), it’s

probably from Ek

Otherwise, it’s from

Page 10: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: linearity in Madryga

Madryga leaves parity unchanged Let (x) = parity of x We see (Ek(x)) = (x)

This yields a distinguisher Pr[((x)) = (x)] = ½ Pr[(Ek(x)) = (x)] = 1

GF(2)64

GF(2)64

GF(2)64

GF(2)64

f1

fn

GF(2)

GF(2)

GF(2)

GF(2)

id

id

Page 11: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Motif #2: statistics

Suffices to find a property that holds with large enough probability

Maybe probabilistic commutative diagrams?

X

X

Ek

Y

Y

gProb. p

where p = Pr[’(Ek(x)) = g((x))]

Page 12: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

A better formulation?

Stochastic comm. diagrams Ek , , ’ induce a stochastic

process M (hopefully Markov); , , ’ yield M’

Pick a distance measure d(M, M’), say 1/||M(x) – M’(x)||2 where the r.v. x is uniform on X

Then d(M,M’) known texts suffice to distinguish Ek from

X

X

Ek

Y

Y

M

X

X

Y

Y

M’

Page 13: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: Linear cryptanalysis

Matsui’s linear cryptanalysis Set X = GF(2)64, Y = GF(2) Cryptanalyst chooses linear

maps , ’ cleverly to make d(M,M’) as small as possible

Then M is a 2×2 matrix of the form shown here, and 1/2 known texts break the cipher

X

X

Ek

Y

Y

M

½+ ½–

½– ½+[ ]M =

and d(M, M’) = 1/2

Page 14: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Motif #3: higher-order attacks

Use many encryptions to find better properties:

X ×X

X ×X

Êk

Y

Y

M

Here we’ve definedÊk(x,x’) = (Ek(x), Ek(x’))

Page 15: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: Complementation

Complementation properties are a simple example:

X ×X

X ×X

Êk

X

X

M

Take (x,x’) = x’ – x Suppose M(Δ,Δ) = 1 for

some cleverly chosen Δ Then we obtain a

complementation property Exploit with chosen texts

Page 16: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: Differential crypt.

Differential cryptanalysis:

X ×X

X ×X

Êk

X

X

M

Set X = GF(2)n, and take (x,x’) = x’ – x

If p = M(Δ,Δ’) » 0 for some clever choice of Δ, Δ’: can distinguish with 2/p

chosen plaintexts

Page 17: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: Impossible diff.’s

Impossible differential cryptanalysis:

X ×X

X ×X

Êk

X

X

M

Set X = GF(2)n, and take (x,x’) = x’ – x

If M(Δ,Δ’) = 0 for some clever choice of Δ, Δ’: can distinguish with

2/M’(Δ,Δ’) known texts

Page 18: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: Truncated diff. crypt.

Truncated differential cryptanalysis:

1

2

X ×X

X ×X

Êk

Y

Y

M

Set X = GF(2)n, Y = GF(2)m, cleverly choose linear maps φ1, φ2 : X → Y, and take i(x,x’) = φi(x’ – x)

If M(Δ,Δ’) » 0 for some clever choice of Δ, Δ’, we can distinguish

Page 19: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Generalized truncated d.c.

Generalized truncated differential cryptanalysis:

1

2

X ×X

X ×X

Êk

Y1

Y2

M

Take X, Yi, i as before; then = maxx ||M(x) – M’(x)|| measures the distinguishing power of the attack

Generalizes the other attacks

Page 20: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

The attacks, compared

generalized truncated diff. crypt.

truncated d.c.

differential crypt.

complementation props.

linear factors

linear crypt.

l.c. with multiple approximations

impossible d.c.

Page 21: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Summary (1)

A few leitmotifs generate many known attacks Many other attack methods can also be viewed this way (higher-

order d.c., slide attacks, mod n attacks, d.c. over other groups, diff.-linear attacks, algebraic attacks, etc.)

Are there other powerful attacks in this space?Can we prove security against all commutative diagram attacks?

We’re primarily exploiting linearities in ciphers E.g., the closure properties of GL(Y, Y) Perm(X) Are there other subgroups with useful closure properties?

Are there interesting “non-linear’’ attacks?Can we prove security against all “linear” comm. diagram attacks?

Page 22: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Part 2: Algebraic attacks

Page 23: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: Interpolation attacks

Express cipher as a polynomial in the message & key:

id

id

X

X

Ek

X

X

p

Write Ek(x) = p(x), then interpolate from known texts Or, p’(Ek(x)) = p(x)

Generalization: probabilistic interpolation attacks Noisy polynomial

reconstruction, decoding Reed-Muller codes

Page 24: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Example: Rational inter. attacks

Express the cipher as a rational polynomial:

id

id

X

X

Ek

X

X

p/q

If Ek(x) = p(x)/q(x), then:

Write Ek(x)×q(x) = p(x), and apply linear algebra

Note: rational poly’s are closed under composition

Are probabilistic rational interpolation attacks feasible?

Page 25: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

A generalization: resultants

A possible direction: bivariate polynomials:

The small diagrams commute ifpi(x, fi(x)) = 0 for all x

Small diagrams can be composed to obtain q(x, f2(f1(x))) = 0, where q(x,z) = resy(p1(x,y), p2(y,z))

Some details not worked out...

X

X

f1 Xp1

Xp2

X

f2

Page 26: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Algebraic attacks, compared

probabilistic bivariate attacks

bivariate attacks

interpolation attacks

MITM interpolation

rational interpol.probabilistic interpol.

prob. rational interpol.

Page 27: Analysis and design of symmetric ciphers David Wagner University of California, Berkeley.

Summary

Many cryptanalytic methods can be understood using only a few basic ideas Commutative diagrams as a unifying theme?

Algebraic attacks of growing importance Collaboration between cryptographic and mathematical

communities might prove fruitful here