Top Banner
Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago & Technische Universiteit Eindhoven http://xkcd.com/538/
335

Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

May 23, 2018

Download

Documents

NguyễnKhánh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Failures of

secret-key cryptography

D. J. Bernstein

University of Illinois at Chicago &

Technische Universiteit Eindhoven

http://xkcd.com/538/

Page 2: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2011 Grigg–Gutmann: In the

past 15 years “no one ever lost

money to an attack on a properly

designed cryptosystem (meaning

one that didn’t use homebrew

crypto or toy keys) in the Internet

or commercial worlds”.

Page 3: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2011 Grigg–Gutmann: In the

past 15 years “no one ever lost

money to an attack on a properly

designed cryptosystem (meaning

one that didn’t use homebrew

crypto or toy keys) in the Internet

or commercial worlds”.

2002 Shamir: “Cryptography is

usually bypassed. I am not aware

of any major world-class security

system employing cryptography in

which the hackers penetrated the

system by actually going through

the cryptanalysis.”

Page 4: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Do these people mean that

it’s actually infeasible

to break real-world crypto?

Page 5: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Do these people mean that

it’s actually infeasible

to break real-world crypto?

Or do they mean that

breaks are feasible

but still not worthwhile

for the attackers?

Page 6: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Do these people mean that

it’s actually infeasible

to break real-world crypto?

Or do they mean that

breaks are feasible

but still not worthwhile

for the attackers?

Or are they simply wrong:

real-world crypto is breakable;

is in fact being broken;

is one of many ongoing

disaster areas in security?

Page 7: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Do these people mean that

it’s actually infeasible

to break real-world crypto?

Or do they mean that

breaks are feasible

but still not worthwhile

for the attackers?

Or are they simply wrong:

real-world crypto is breakable;

is in fact being broken;

is one of many ongoing

disaster areas in security?

Let’s look at some examples.

Page 8: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Windows code signatures

Flame broke into computers,

spied on audio, keystrokes, etc.

2012.06.03 Microsoft:

“We recently became aware

of a complex piece of targeted

malware known as ‘Flame’ and

immediately began examining the

issue. : : : We have discovered

through our analysis that some

components of the malware have

been signed by certificates that

allow software to appear as if it

was produced by Microsoft.”

Page 9: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2012.06.07 Stevens: “A chosen-

prefix collision attack against

MD5 has been used for Flame.

More interestingly : : : not our

published chosen-prefix collision

attack was used, but an entirely

new and unknown variant.”

Page 10: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2012.06.07 Stevens: “A chosen-

prefix collision attack against

MD5 has been used for Flame.

More interestingly : : : not our

published chosen-prefix collision

attack was used, but an entirely

new and unknown variant.”

CrySyS: Flame file wavesup3.drv

appeared in logs in 2007; Flame

“may have been active for as long

as five to eight years”.

Page 11: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2012.06.07 Stevens: “A chosen-

prefix collision attack against

MD5 has been used for Flame.

More interestingly : : : not our

published chosen-prefix collision

attack was used, but an entirely

new and unknown variant.”

CrySyS: Flame file wavesup3.drv

appeared in logs in 2007; Flame

“may have been active for as long

as five to eight years”.

Was MD5 “homebrew crypto”?

No. Standardized, widely used.

Worthwhile to attack? Yes.

Page 12: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Compare to 2011 Grigg–Gutmann:

“Cryptosystem failure is orders of

magnitude below any other risk.”

Page 13: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Compare to 2011 Grigg–Gutmann:

“Cryptosystem failure is orders of

magnitude below any other risk.”

http://en.wikipedia.org/wiki

/2003_Mission_Accomplished

_speech

Page 14: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

WEP

WEP introduced in 1997

in 802.11 wireless standard.

2001 Borisov–Goldberg–Wagner:

24-bit “nonce” frequently repeats,

leaking plaintext xor and

allowing very easy forgeries.

2001 Arbaugh–Shankar–Wan:

this also breaks user auth.

2001 Fluhrer–Mantin–Shamir:

WEP builds RC4 key (k; n)

from secret k, “nonce” n;

RC4 outputs leak bytes of k.

Page 15: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Implementations, optimizations

of k-recovery attack: 2001

Stubblefield–Ioannidis–Rubin,

2004 KoreK, 2004 Devine, 2005

d’Otreppe, 2006 Klein, 2007

Tews–Weinmann–Pyshkin, 2010

Sepehrdad–Vaudenay–Vuagnoux,

2013 S–Susil–V–V, : : :

Page 16: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Implementations, optimizations

of k-recovery attack: 2001

Stubblefield–Ioannidis–Rubin,

2004 KoreK, 2004 Devine, 2005

d’Otreppe, 2006 Klein, 2007

Tews–Weinmann–Pyshkin, 2010

Sepehrdad–Vaudenay–Vuagnoux,

2013 S–Susil–V–V, : : :

“These are academic papers!

Nobody was actually attacked.”

Page 17: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Implementations, optimizations

of k-recovery attack: 2001

Stubblefield–Ioannidis–Rubin,

2004 KoreK, 2004 Devine, 2005

d’Otreppe, 2006 Klein, 2007

Tews–Weinmann–Pyshkin, 2010

Sepehrdad–Vaudenay–Vuagnoux,

2013 S–Susil–V–V, : : :

“These are academic papers!

Nobody was actually attacked.”

Fact: WEP blamed for 2007 theft

of 45 million credit-card numbers

from T. J. Maxx. Subsequent

lawsuit settled for $40900000.

Page 18: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Keeloq

Wikipedia: “KeeLoq is or was

used in many remote keyless

entry systems by such companies

as Chrysler, Daewoo, Fiat,

GM, Honda, Toyota, Volvo,

Volkswagen Group, Clifford,

Shurlok, Jaguar, etc.”

2007 Indesteege–Keller–

Biham–Dunkelman–Preneel

“How to steal cars”:

recover 64-bit KeeLoq key

using 216 known plaintexts,

only 244:5 encryptions.

Page 19: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2008 Eisenbarth–Kasper–Moradi–

Paar–Salmasizadeh–Shalmani

recovered system’s master key,

allowing practically instantaneous

cloning of KeeLoq keys.

Page 20: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2008 Eisenbarth–Kasper–Moradi–

Paar–Salmasizadeh–Shalmani

recovered system’s master key,

allowing practically instantaneous

cloning of KeeLoq keys.

1. Setup phase of this attack

watches power consumption

of Keeloq device. Is this

“bypassing” the cryptography?

Page 21: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2008 Eisenbarth–Kasper–Moradi–

Paar–Salmasizadeh–Shalmani

recovered system’s master key,

allowing practically instantaneous

cloning of KeeLoq keys.

1. Setup phase of this attack

watches power consumption

of Keeloq device. Is this

“bypassing” the cryptography?

2. If all the “X is weak” press

comes from academics, is it safe

to conclude that real attackers

aren’t breaking X? How often do

real attackers issue press releases?

Page 22: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

VMWare View

VMWare View is a remote

desktop protocol supported by

many low-cost terminals.

Recommendation from VMWare,

Dell, etc.: switch from “AES-128”

to “SALSA20-256” for the “best

user experience”. Apparently AES

slows down network graphics.

Page 23: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

VMWare View

VMWare View is a remote

desktop protocol supported by

many low-cost terminals.

Recommendation from VMWare,

Dell, etc.: switch from “AES-128”

to “SALSA20-256” for the “best

user experience”. Apparently AES

slows down network graphics.

Closer look at documentation:

“AES-128” and “SALSA20-256”

are actually “AES-128-GCM”

and “Salsa20-256-Round12”.

Page 24: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

AES-128-GCM includes AES

and message authentication.

No indication that VMWare’s

“Salsa20-256-Round12” includes

any message authentication.

Can attacker forge packets?

One can easily combine Salsa20

with message authentication,

but does VMWare do this?

Salsa20 has speed and security

advantages over AES, but

both Salsa20 and AES are

unauthenticated ciphers.

User needs authenticated cipher.

Page 25: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

SSL/TLS/HTTPS

Standard AES-CBC encryption

of a packet (p0; p1; p2):

send random v,

c0 = AESk(p0 � v),

c1 = AESk(p1 � c0),

c2 = AESk(p2 � c1).

Page 26: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

SSL/TLS/HTTPS

Standard AES-CBC encryption

of a packet (p0; p1; p2):

send random v,

c0 = AESk(p0 � v),

c1 = AESk(p1 � c0),

c2 = AESk(p2 � c1).

AES-CBC encryption in SSL:

retrieve last block c�1

from previous ciphertext; send

c0 = AESk(p0 � c�1),

c1 = AESk(p1 � c0),

c2 = AESk(p2 � c1).

Page 27: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

SSL lets attacker choose p0

as function of c�1! Very bad.

2002 Moller:

To check a guess g for (e.g.) p�3,

choose p0 = c�1 � g � c�4,

compare c0 to c�3.

2006 Bard:

malicious code in browser should

be able to carry out this attack,

especially if high-entropy data

is split across blocks.

2011 Duong–Rizzo “BEAST”:

fast attack fully implemented,

including controlled variable split.

Page 28: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Countermeasure in browsers:

send a content-free packet

just before sending real packet.

Page 29: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Countermeasure in browsers:

send a content-free packet

just before sending real packet.

Attacker can also try to attack

CBC by forging ciphertexts,

but each SSL packet

includes an authenticator.

“Authenticate-then-encrypt”:

SSL appends an authenticator,

pads reversibly to full block,

encrypts with CBC.

Page 30: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Countermeasure in browsers:

send a content-free packet

just before sending real packet.

Attacker can also try to attack

CBC by forging ciphertexts,

but each SSL packet

includes an authenticator.

“Authenticate-then-encrypt”:

SSL appends an authenticator,

pads reversibly to full block,

encrypts with CBC.

2001 Krawczyk:

This is provably secure.

Page 31: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2001 Vaudenay:

This is completely broken

if attacker can distinguish

padding failure from MAC failure.

Page 32: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2001 Vaudenay:

This is completely broken

if attacker can distinguish

padding failure from MAC failure.

2003 Canvel:

Obtain such a padding oracle

by observing SSL server timing.

Page 33: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2001 Vaudenay:

This is completely broken

if attacker can distinguish

padding failure from MAC failure.

2003 Canvel:

Obtain such a padding oracle

by observing SSL server timing.

Response in OpenSSL etc.:

always compute MAC

even if padding fails.

Page 34: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2001 Vaudenay:

This is completely broken

if attacker can distinguish

padding failure from MAC failure.

2003 Canvel:

Obtain such a padding oracle

by observing SSL server timing.

Response in OpenSSL etc.:

always compute MAC

even if padding fails.

2013.02 AlFardan–Paterson

“Lucky 13”: watch timing

more closely; attack still works.

Page 35: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

“Cryptographic algorithm agility”:

(1) the pretense that bad crypto

is okay if there’s a backup plan +

(2) the pretense that there

is in fact a backup plan.

Page 36: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

“Cryptographic algorithm agility”:

(1) the pretense that bad crypto

is okay if there’s a backup plan +

(2) the pretense that there

is in fact a backup plan.

SSL has a crypto switch

that in theory allows

switching to AES-GCM.

But most SSL software

doesn’t support AES-GCM.

Page 37: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

“Cryptographic algorithm agility”:

(1) the pretense that bad crypto

is okay if there’s a backup plan +

(2) the pretense that there

is in fact a backup plan.

SSL has a crypto switch

that in theory allows

switching to AES-GCM.

But most SSL software

doesn’t support AES-GCM.

The software does support

one non-CBC option:

Page 38: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

“Cryptographic algorithm agility”:

(1) the pretense that bad crypto

is okay if there’s a backup plan +

(2) the pretense that there

is in fact a backup plan.

SSL has a crypto switch

that in theory allows

switching to AES-GCM.

But most SSL software

doesn’t support AES-GCM.

The software does support

one non-CBC option: RC4.

Now widely recommended,

used for 50% of SSL traffic.

Page 39: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Not as scary as WEP: SSL uses a

hash to avoid related RC4 keys.

2001 Rivest: “The new attacks

do not apply to RC4-based SSL.

: : : [protocol] designers [using

RC4] should not be concerned.”

Page 40: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Not as scary as WEP: SSL uses a

hash to avoid related RC4 keys.

2001 Rivest: “The new attacks

do not apply to RC4-based SSL.

: : : [protocol] designers [using

RC4] should not be concerned.”

Problem: many nasty biases in

RC4 output bytes z1; z2; : : :.

Page 41: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Not as scary as WEP: SSL uses a

hash to avoid related RC4 keys.

2001 Rivest: “The new attacks

do not apply to RC4-based SSL.

: : : [protocol] designers [using

RC4] should not be concerned.”

Problem: many nasty biases in

RC4 output bytes z1; z2; : : :.

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt,

“On the security of RC4 in TLS”:

Force target cookie into many

RC4 sessions. Use RC4 biases

to find cookie from ciphertexts.

Page 42: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

The single-byte biases:

2001 Mantin–Shamir:

z2 ! 0.

Page 43: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

The single-byte biases:

2001 Mantin–Shamir:

z2 ! 0.

2002 Mironov:

z1 6! 0, z1 6! 1, z1 ! 2, etc.

Page 44: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

The single-byte biases:

2001 Mantin–Shamir:

z2 ! 0.

2002 Mironov:

z1 6! 0, z1 6! 1, z1 ! 2, etc.

2011 Maitra–Paul–Sen Gupta:

z3 ! 0, z4 ! 0, : : : , z255 ! 0,

contrary to Mantin–Shamir claim.

Page 45: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

The single-byte biases:

2001 Mantin–Shamir:

z2 ! 0.

2002 Mironov:

z1 6! 0, z1 6! 1, z1 ! 2, etc.

2011 Maitra–Paul–Sen Gupta:

z3 ! 0, z4 ! 0, : : : , z255 ! 0,

contrary to Mantin–Shamir claim.

2011 Sen Gupta–Maitra–Paul–

Sarkar: z16 ! 240.

(This is specific to 128-bit keys.)

Page 46: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

The single-byte biases:

2001 Mantin–Shamir:

z2 ! 0.

2002 Mironov:

z1 6! 0, z1 6! 1, z1 ! 2, etc.

2011 Maitra–Paul–Sen Gupta:

z3 ! 0, z4 ! 0, : : : , z255 ! 0,

contrary to Mantin–Shamir claim.

2011 Sen Gupta–Maitra–Paul–

Sarkar: z16 ! 240.

(This is specific to 128-bit keys.)

But wait: there’s more!

Page 47: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt:

accurately computed Pr[zi = j]

for all i 2 f1; : : : ; 256g, all j;

found �65536 single-byte biases;

used all of them in SSL attack

via proper Bayesian analysis.

Page 48: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt:

accurately computed Pr[zi = j]

for all i 2 f1; : : : ; 256g, all j;

found �65536 single-byte biases;

used all of them in SSL attack

via proper Bayesian analysis.

�256 of these biases were found

independently (slightly earlier)

by 2013 Watanabe–Isobe–

Ohigashi–Morii, 2013 Isobe–

Ohigashi–Watanabe–Morii:

z32 ! 224, z48 ! 208, etc.;

z3 ! 131; zi ! i; z256 6! 0.

Page 49: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z1 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 50: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z2 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 51: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z3 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 52: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z4 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 53: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z5 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 54: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z6 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 55: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z7 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 56: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z8 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 57: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z9 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 58: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z10 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 59: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z11 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 60: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z12 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 61: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z13 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 62: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z14 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 63: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z15 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 64: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z16 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 65: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z17 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 66: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z18 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 67: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z19 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 68: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z20 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 69: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z21 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 70: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z22 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 71: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z23 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 72: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z24 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 73: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z25 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 74: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z26 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 75: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z27 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 76: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z28 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 77: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z29 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 78: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z30 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 79: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z31 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 80: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z32 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 81: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z33 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 82: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z34 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 83: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z35 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 84: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z36 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 85: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z37 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 86: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z38 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 87: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z39 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 88: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z40 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 89: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z41 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 90: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z42 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 91: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z43 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 92: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z44 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 93: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z45 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 94: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z46 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 95: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z47 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 96: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z48 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 97: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z49 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 98: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z50 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 99: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z51 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 100: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z52 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 101: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z53 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 102: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z54 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 103: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z55 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 104: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z56 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 105: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z57 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 106: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z58 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 107: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z59 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 108: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z60 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 109: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z61 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 110: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z62 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 111: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z63 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 112: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z64 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 113: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z65 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 114: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z66 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 115: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z67 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 116: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z68 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 117: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z69 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 118: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z70 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 119: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z71 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 120: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z72 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 121: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z73 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 122: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z74 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 123: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z75 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 124: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z76 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 125: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z77 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 126: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z78 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 127: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z79 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 128: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z80 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 129: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z81 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 130: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z82 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 131: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z83 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 132: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z84 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 133: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z85 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 134: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z86 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 135: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z87 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 136: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z88 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 137: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z89 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 138: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z90 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 139: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z91 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 140: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z92 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 141: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z93 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 142: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z94 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 143: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z95 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 144: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z96 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 145: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z97 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 146: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z98 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 147: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z99 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 148: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z100 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 149: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z101 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 150: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z102 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 151: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z103 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 152: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z104 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 153: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z105 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 154: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z106 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 155: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z107 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 156: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z108 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 157: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z109 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 158: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z110 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 159: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z111 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 160: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z112 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 161: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z113 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 162: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z114 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 163: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z115 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 164: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z116 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 165: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z117 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 166: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z118 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 167: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z119 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 168: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z120 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 169: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z121 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 170: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z122 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 171: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z123 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 172: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z124 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 173: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z125 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 174: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z126 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 175: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z127 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 176: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z128 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 177: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z129 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 178: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z130 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 179: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z131 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 180: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z132 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 181: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z133 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 182: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z134 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 183: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z135 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 184: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z136 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 185: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z137 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 186: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z138 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 187: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z139 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 188: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z140 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 189: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z141 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 190: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z142 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 191: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z143 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 192: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z144 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 193: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z145 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 194: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z146 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 195: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z147 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 196: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z148 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 197: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z149 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 198: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z150 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 199: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z151 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 200: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z152 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 201: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z153 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 202: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z154 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 203: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z155 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 204: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z156 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 205: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z157 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 206: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z158 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 207: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z159 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 208: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z160 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 209: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z161 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 210: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z162 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 211: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z163 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 212: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z164 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 213: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z165 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 214: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z166 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 215: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z167 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 216: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z168 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 217: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z169 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 218: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z170 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 219: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z171 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 220: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z172 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 221: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z173 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 222: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z174 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 223: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z175 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 224: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z176 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 225: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z177 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 226: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z178 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 227: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z179 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 228: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z180 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 229: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z181 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 230: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z182 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 231: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z183 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 232: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z184 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 233: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z185 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 234: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z186 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 235: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z187 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 236: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z188 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 237: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z189 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 238: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z190 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 239: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z191 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 240: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z192 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 241: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z193 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 242: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z194 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 243: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z195 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 244: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z196 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 245: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z197 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 246: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z198 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 247: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z199 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 248: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z200 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 249: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z201 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 250: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z202 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 251: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z203 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 252: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z204 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 253: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z205 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 254: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z206 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 255: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z207 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 256: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z208 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 257: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z209 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 258: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z210 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 259: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z211 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 260: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z212 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 261: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z213 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 262: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z214 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 263: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z215 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 264: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z216 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 265: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z217 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 266: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z218 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 267: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z219 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 268: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z220 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 269: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z221 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 270: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z222 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 271: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z223 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 272: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z224 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 273: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z225 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 274: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z226 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 275: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z227 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 276: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z228 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 277: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z229 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 278: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z230 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 279: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z231 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 280: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z232 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 281: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z233 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 282: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z234 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 283: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z235 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 284: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z236 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 285: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z237 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 286: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z238 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 287: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z239 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 288: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z240 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 289: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z241 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 290: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z242 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 291: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z243 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 292: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z244 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 293: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z245 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 294: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z246 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 295: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z247 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 296: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z248 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 297: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z249 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 298: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z250 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 299: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z251 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 300: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z252 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 301: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z253 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 302: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z254 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 303: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z255 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 304: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Graph of 256 Pr[z256 = x]:

0 50 100 150 200 2500.990

0.995

1.000

1.005

1.010

Page 305: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 224 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 306: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 225 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 307: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 226 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 308: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 227 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 309: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 228 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 310: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 229 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 311: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 230 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 312: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 231 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 313: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

2013 AlFardan–Bernstein–

Paterson–Poettering–Schuldt

success probability (256 trials)

for recovering byte x of plaintext

from 232 ciphertexts (with

no prior plaintext knowledge):

0"

0.2"

0.4"

0.6"

0.8"

1"

1.2"

0" 10" 20" 30" 40" 50" 60" 70" 80" 90" 100" 110" 120" 130" 140" 150" 160" 170" 180" 190" 200" 210" 220" 230" 240" 250"

Page 314: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Why does this happen?

For years we’ve had AES;

AES-GCM; defenses against

various side-channel attacks.

We simply have to educate the

software and hardware engineers

choosing crypto primitives, right?

Page 315: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Why does this happen?

For years we’ve had AES;

AES-GCM; defenses against

various side-channel attacks.

We simply have to educate the

software and hardware engineers

choosing crypto primitives, right?

Maybe, maybe not.

Does AES-GCM actually do

what the users need?

Page 316: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Why does this happen?

For years we’ve had AES;

AES-GCM; defenses against

various side-channel attacks.

We simply have to educate the

software and hardware engineers

choosing crypto primitives, right?

Maybe, maybe not.

Does AES-GCM actually do

what the users need?

Often it doesn’t.

Most obvious issue: performance.

Page 317: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

e.g. 2001 Rivest: “The ‘heart’ of

RC4 is its exceptionally simple

and extremely efficient pseudo-

random generator. : : : RC4 is

likely to remain the algorithm of

choice for many applications and

embedded systems.”

e.g. OpenSSL still uses table-

based implementations of AES

for speed on most CPUs,

leaking many key bits; see, e.g.,

2012 Weiß–Heinz–Stumpf.

e.g. RFIDs need small ciphers.

Page 318: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Major research direction:

achieve better performance

than AES-GCM

without sacrificing security.

Fit into low power (watts),

low area (square micrometers),

sometimes low latency (seconds);

minimize area�seconds/byte;

minimize energy (joules)/byte.

Many different CPUs, FPGAs,

ASIC manufacturing technologies.

Many different input sizes,

precomputation possibilities, etc.

Page 319: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Can one design do very well

in hardware and software?

Some inspirational examples:

Trivium and Keccak

are “hardware” designs

but not bad in software.

Page 320: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Can one design do very well

in hardware and software?

Some inspirational examples:

Trivium and Keccak

are “hardware” designs

but not bad in software.

Another approach:

replace ARX with “ORX”.

Skein-type mix doesn’t work

but can imitate Salsa20:

compose a^=((b|c)<<<r).

Needs a few more rounds,

but friendlier to hardware.

Page 321: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Another major research direction:

achieve better security

than AES-GCM

without sacrificing performance.

Typical 128-bit blocks

are starting to feel too small.

Limit impact of collisions?

Use larger blocks?

Page 322: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Another major research direction:

achieve better security

than AES-GCM

without sacrificing performance.

Typical 128-bit blocks

are starting to feel too small.

Limit impact of collisions?

Use larger blocks?

Typical 128-bit pipe

is starting to feel too small.

Limit reforgeries? Use wider pipe?

Page 323: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Another major research direction:

achieve better security

than AES-GCM

without sacrificing performance.

Typical 128-bit blocks

are starting to feel too small.

Limit impact of collisions?

Use larger blocks?

Typical 128-bit pipe

is starting to feel too small.

Limit reforgeries? Use wider pipe?

Has anyone tried optimizing

192-bit/256-bit poly hashes?

Page 324: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Allow repeated message numbers?

User has to expect that

encrypting (n;m) and (n;m0)

will tell attacker whether m = m0.

Page 325: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Allow repeated message numbers?

User has to expect that

encrypting (n;m) and (n;m0)

will tell attacker whether m = m0.

But user is surprised if repeated

message number leaks more

information, allows forgeries, etc.

Page 326: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Allow repeated message numbers?

User has to expect that

encrypting (n;m) and (n;m0)

will tell attacker whether m = m0.

But user is surprised if repeated

message number leaks more

information, allows forgeries, etc.

2006 Rogaway–Shrimpton:

first authenticate (n;m),

then use the authenticator

as a nonce to encrypt m.

Page 327: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Allow repeated message numbers?

User has to expect that

encrypting (n;m) and (n;m0)

will tell attacker whether m = m0.

But user is surprised if repeated

message number leaks more

information, allows forgeries, etc.

2006 Rogaway–Shrimpton:

first authenticate (n;m),

then use the authenticator

as a nonce to encrypt m.

Is this protection compatible

with fast forgery rejection?

Page 328: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Many ciphers integrate

“free” message authentication:

e.g., AES-OCB, Helix, Phelix.

Is this compatible

with repeated message numbers?

Page 329: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Many ciphers integrate

“free” message authentication:

e.g., AES-OCB, Helix, Phelix.

Is this compatible

with repeated message numbers?

Is this compatible

with fast forgery rejection?

Page 330: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Many ciphers integrate

“free” message authentication:

e.g., AES-OCB, Helix, Phelix.

Is this compatible

with repeated message numbers?

Is this compatible

with fast forgery rejection?

One approach: build

HFFH Feistel block cipher;

reuse first H for fast auth

with repeated message numbers;

reuse last H for another auth

with fast forgery rejection.

But this consumes bandwidth.

Page 331: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Many more directions

in authenticated ciphers.

AES-GCM is clearly not

the end of the story.

Can build better modes

using same MAC, cipher.

Can build better MACs,

combine with same cipher.

Can build better

block ciphers, stream ciphers.

Can build better integrated

authenticated ciphers.

Page 332: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

CAESAR

“Competition for Authenticated

Encryption: Security,

Applicability, and Robustness”

competitions.cr.yp.to

Mailing list: crypto-

competitions+subscribe

@googlegroups.com

NIST is much too busy

to run another competition

but has generously provided

a $333099 “Cryptographic

competitions” grant to UIC.

Page 333: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Competition scheduling

AES schedule:

M0: 15 submissions.

M14: 5 finalists.

M28: 1 winner.

eSTREAM schedule:

M0: 34 submissions.

M11: 27 round-2 ciphers.

M24: 16 finalists.

M36: 8 portfolio ciphers.

M41: 7 portfolio ciphers.

Page 334: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

SHA-3 schedule:

M0: 64 submissions.

M9: 14 round-2 functions.

M26: 5 finalists.

M48: 1 winner.

Tentative CAESAR schedule:

M0, 2014.01.15: submissions.

M11: round-2 candidates.

M23: round-3 candidates.

M35: finalists.

M47: portfolio.

Page 335: Failures of secret-key cryptography D. J. Bernstein ...cr.yp.to/talks/2013.03.12/slides.pdf · Failures of secret-key cryptography D. J. Bernstein University of Illinois at Chicago

Workshops

2012.07.05–06, Stockholm:

ECRYPT workshop on Directions

in Authenticated Ciphers.

DIAC 2013 in Chicago,

maybe 2013.08.12–13,

maybe 2013.08.26–27.

2013.08.14–16 is SAC;

2013.08.18–22 is Crypto;

2013.08.20–23 is CHES.

DIAC 2014: maybe San Diego?

DIAC 2015, 2016, 2017: TBA.