Top Banner
©KDDI R&D Laboratories Inc. ALL Rights Reser Cryptanalysis on Clock Controlled Stream Ciphers Shinsaku Kiyomoto KDDI R&D Laboratories Inc. 2005.2.22 This is a joint work with Kyushu University (Prof. Kouichi Sakura
26

Cryptanalysis on Clock Controlled Stream Ciphers

Jan 18, 2016

Download

Documents

Griffin Griffin

Cryptanalysis on Clock Controlled Stream Ciphers. Shinsaku Kiyomoto KDDI R&D Laboratories Inc. 2005.2.22. This is a joint work with Kyushu University (Prof. Kouichi Sakurai). Information about Myself. Shinsaku Kiyomoto (age 29) B.E. and M.E. from Tsukuba Univ. (1998 and 2000) - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Cryptanalysis on Clock Controlled Stream Ciphers

Shinsaku Kiyomoto

KDDI R&D Laboratories Inc.

2005.2.22

This is a joint work with Kyushu University (Prof. Kouichi Sakurai)

Page 2: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Information about Myself

• Shinsaku Kiyomoto (age 29)– B.E. and M.E. from Tsukuba Univ. (1998 and

2000)– Researcher of Security Lab. in KDDI R&D Labs.

Inc. (from April, 2000)– Current Interests: Stream Cipher, Security

protocols, and Mobile Security

Page 3: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

KDDI R&D Laboratories Inc.

● Incorporated April 1, 2003

            (Merged KDI in April 1, 2001)

● Capital 2.28 billion Yen

● Shareholders KDDI , Kyocera corporation,

Toyota motor corporation

● President    Tohru ASAMI

● Staff 197 ( April 1, 2004)

● Office Kamifukuoka, Saitama, Japan

● Research Area Photonic NW, Wireless NW, IP,

Multimedia, Ubiquitous NW,

and Information Security

http://www.kddilabs.jp

Page 4: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Security Laboratory• Current Research Topics

– Secret and Public Key Cryptosystems– Cryptographic Protocols– Mobile Security– PKI (Public Key Infrastructure)– Software Security– Secure Overlay Networks– P.P. (Privacy Protection)– DRM (Digital Rights Management)– Intrusion Detection System – Virus Protection

Page 5: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Cryptanalysis on Clock Controlled Stream Ciphers

Shinsaku Kiyomoto

KDDI R&D Laboratories Inc.

2005.2.22

This is a joint work with Kyushu University (Prof. Kouichi Sakurai)

Page 6: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Introduction: History of Stream Cipher

Hardware based random generatorLFSR based Stream Cipher

From Bit-Oriented to Word-Oriented

Time-Memory Trade off Attack

Correlation Attack

Berlekamp-Massey Algorithm

Distinguishing Attack

Re-synchronization Attack

Guess-and-Determine Attack

A5RC4

NESSIE Project (SNOW, BGML, SOBER, LILI etc.)

XL, XSL

Page 7: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Clock Controlled Stream Cipher

• Using irregular clocking as a non-linear function.

• Example– A5: Stop-and-Go Clocking according to tap bits

from 3 LFSRs. – LILI-128: 1-2-3-4 Clocking by a clock controller

and special LFSR

Page 8: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Analysis of Irregular Clocking

• Motivation– Is the irregular clocking more effective than other

non-linear functions ?– Drawback of irregular clocking

• Reduce efficiency of generating keystreams

• Shorten a period of keystreams

– How to construct or choose an algorithm of generating irregular clocking

Page 9: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Theoretical and Experimental Analysis

• Theoretical Analysis– Analysis on an ideal environment.

• Experiments (Minutia Model Approach)– Constructing a minutia model of evaluating stream cipher.

– How to make a minutia model• Shorten the lengths of LFSRs (in case of bit-oriented stream

ciphers)

• Shrink the sizes of registers in LFSRs (in case of word-oriented stream ciphers)

• Modifying non-linear parts

Page 10: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Guess-and-Determine AttackG: Guess some registers of an internal statesG: Guess some registers of an internal statesD: Determine other internal statesD: Determine other internal statesAA : : Check the validity of guessed registers. Check the validity of guessed registers.

An assumption is required to remove nonlinearity.An assumption is required to remove nonlinearity.

◆SOBER, SOBER-II-Blackburn, Murphy, Piper, Wild (1998)-Bleichenbacher, Patel (1999)◆SOBER-t16/t32-Hawkes, Rose (2000)◆SNOW1.0-Hawkes, Rose (2002)

Page 11: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Security of GD attacks

Initial Key Size

Internal State

AssumptionGuess

Determine

Weak

Attack isSuccessful

Same as a computational costs of a exhaustive key search

Page 12: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Example: Attacks on AA5

000 001 010 011

100 101 110 111

LFSR F

2 1 1 2 2 1 1 2

LFSR G

2 1 2 1 1 2 1 2

LFSR H

2 2 1 1 1 1 2 2

F, G, H

The Clock controller decides the clocking of three LFSRs according to the least significant bits of No.2 register in LFSR F, No.2 in LFSR G, and No.3 in LFSR H as follows.

F G H

S

M

Clock Controller

2 23

8bit

48bit 40bit 56bit

8bit

S

6 reg. 5 reg. 7 reg.

Page 13: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

• We determine LFSR H (the longest) to guess LFSR F, and G.

• If we guess LFSR F, G, and internal memory M, then we can ignore influence of S-boxes.

• How to remove irregularity by the clock controller. →We use assumptions that the target LFSR clocks regularly.

Strategy of proposed GD attacks

Irregular Clocking Assumption

Regular Clocking

Page 14: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Attacks on AA5

5 4 3 2 1 0

M4 3 2 1 0

LFSR-F

LFSR-G Key Stream

Z

02 1LFSR-H

3

Determine 0,1,2 in H and 7bits of 3,4,5,6 in H.

4 5 6

Process Complexity = O(2^100) Data Complexity = O(2^6)

=100bit

Assumption: H operates six times in succession =2^-36

Non-linear function

Guess all values of all registers in F, all registers in G, and M, and least significant bits of 6,5,4 and 3 registers in H.

Page 15: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Evaluation Results of GD attacks

Page 16: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Real Probability of Assumption being Valid

Ideal model

Clocking are determined according to tap bits from LFSRs.

Exploitable states are uniformly distributed.

Real model

Not uniformly distributed. A Gap of experimental results exists.

Short period

Page 17: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Experimental Results of Minutia Model

Page 18: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Distinguishing Attack

• Distinguish keystreams from stream ciphers and truly random strings. – Powerful attack on Stream Ciphers

• SNOW1.0 (by Coppersmith, 2000)

• SNOW 2.0 (by Watanabe, 2003)

• SOBER-Family (by Ekdahl, 2002)

• SCREAM (by Johansson, 2003)

Page 19: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Distinguishing Attack Cont.Construct a linear equation only consisting of output keystreams by using linear approximation of a non-linear function and other linear equations.

LFSR

Key Stream

S_x1    + S_x2 + … + S_xi =0

S_(x1 +y1)   + S_(x2+y1) + … + S_(xi+y1) =0

S_(x1 +y j )    + S_(x2+y j ) + … + S_(xi+yj) =0

・・・

LFSRのFeedbackPolynomial

Linear approximation

=Z_t2=Z_t1 =Z_t3

Z_t1+Z_t2+Z_t3=0

Page 20: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Complexity of irregular clocking• Regular Clocking

• Irregular Clocking

Key Stream Generator S1 S2 S3 S4 S5 S6 S7 S8

S1 S3 S4 S6 S8Key Stream Generator

Clock Controller

Get keystreams deterministically

Get keystreams probabilistically Complexity = (1/Probability)^2 = ?

Page 21: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Detail Analysis of the Complexity(1) Required Keystreams are skipped

In LILI-128 case, theoretical results fit in experimental results, if X_j > 38

Page 22: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Detail Analysis of the Complexity(2) Fail to guess a cycle of outputting a keystream.

Page 23: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Detail Analysis of the Complexity• Example of LILI-128

Page 24: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Detail Analysis of the Complexity

0

10

20

30

40

50

60

70

80

90

0 10 20 30 40Cycles

Probability

Page 25: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Experimental Results

About 2^4(fit in theoretical results )

Page 26: Cryptanalysis on Clock Controlled Stream Ciphers

©KDDI R&D Laboratories Inc. ALL Rights Reserved.

Conclusion

• Irregular clocking is effective for several attacks. However, the algorithm should be carefully designed.

• Especially, large clocking is effective for protecting distinguishing attacks, even though a trade-off exists between the effect and efficiency of generating keystreams.