A Key-recovery Attack on 855-Round Trivium
Ximing Fu, Xiaoyun Wang, Xiaoyang Dong, Willi Meier
Tsinghua University, Beijing, China FHNW, Windisch, Switzerland
A Key-recovery Attack on 855-Round Trivium Ximing Fu, Xiaoyun Wang, - - PowerPoint PPT Presentation
A Key-recovery Attack on 855-Round Trivium Ximing Fu, Xiaoyun Wang, Xiaoyang Dong , Willi Meier Tsinghua University, Beijing, China FHNW, Windisch, Switzerland June 6,2018 Introduction to Trivium Outline Introduction to Trivium 1 Related
Tsinghua University, Beijing, China FHNW, Windisch, Switzerland
Introduction to Trivium
1
2
3
4
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 2 / 24
Introduction to Trivium
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 3 / 24
Introduction to Trivium
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 4 / 24
Introduction to Trivium
w (0 ≤ w ≤ 2) denote s1, s94 and s178 at round
2
2
2
2
1
1
2
1
1
1
1
2
1
1
2
2
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 5 / 24
Related Works
1
2
3
4
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 6 / 24
Related Works
i∈I vi
j∈J kj
1 gI(k) is linear or of low degree over partial key bits (key-recovery) 2 gI(k) = 0: tI(k) is a missing IV term (distinguisher) X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 7 / 24
Basic Ideas
1
2
3
4
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 8 / 24
Basic Ideas
1 Right guess: (1 + P1)z = (1 + P1)P3 2 Wrong guesses: (1 + P ′
1)z = (1 + P ′ 1)P1P2 + (1 + P ′ 1)P3
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 9 / 24
Basic Ideas
1 Determine P1 and obtain the reduced polynomial (1 + P1)P3. There
2 Compute the degree bound of (1 + P1)P3 as d, then
1 For right guess, the result is always 0. 2 For wrong guesses, the results are 0-1 balanced. X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 10 / 24
Basic Ideas
1 80 1 80
Forward Internal State bits
j i
IV Representation discarding monomials Step 1 Step 3 j i
Internal State bits Step 2
1 3
(1 ) P P
1 Compute the state bits sj
i (j ∈ [0, 2]) for i ∈ [0, 340] over key and
2 Decompose the output bit and obtain (1 + P1)P3 over state bits at
3 ”Meet-in-the-middle”: decomposition & IV representation X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 11 / 24
Basic Ideas
1 if the evaluated degree of a state term deg Ti, then Ti can be
2 if deg(Ti) − dt(Ti) < d, then Ti can be deleted, where dt(Ti) is the
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 12 / 24
Basic Ideas
1: Initialize an empty Hash Set H. 2: for i ← 1 : n do 3:
4:
5:
6:
7:
8:
9: end for
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 13 / 24
Basic Ideas
Input: The value t and r which indicates the state bit sr
t .
Output: DEG(sr
t )=d.
1: Initialize the degree bound d similar to the above Step 2., the end point end. 2: len ← 0 3: while len = 0 do 4:
Iteratively express sr
t using state bits sj i , where 0 ≤ j ≤ 2 and 0 ≤ j < end. During
each expression, discard the state terms of degree lower than d. Let len be the number
5:
if len = 0 then
6:
d ← d − 1
7:
end if
8: end while 9: return d
32⌋ × 32 − 128 in the cryptanalysis of Trivium.
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 14 / 24
Basic Ideas
1
32⌋ × 32 − 128 = 192):
2
1
1
1
1
2
1
1
1
1
2
2
1
1
2
2
2 s57 2 s83 2 s84 2 s101 2
2 s58 2 s83 2 s84 2 s100 2
2
2
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 15 / 24
Basic Ideas
Input: The value i, r, t which indicates the state term degree reduction. Output: The degree reduction dt = l+t−1
j=l
deg(sj
i ) − deg(l+t−1 j=l
sj
i ).
1: Initialize the degree bound d = l+t−1
i=l
DEG(sj
i ) , degree reduction dt = 0, end point end
and number of survived state terms len.
2: while len = 0 do 3:
Express the state term l+t−1
j=l
sj
i using state bits sj i , where 0 ≤ i ≤ 2 and 0 ≤ j < end,
discard the state terms of degree lower than d − dt. Let len be the number of remaining state terms.
4:
if len = 0 then
5:
dt ← dt + 1
6:
end if
7: end while 8: return dt
32⌋ × 32 − 128 in the cryptanalysis of Trivium.
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 16 / 24
Basic Ideas
1
1
32⌋ × 32 − 128 = 192):
1
1
1
1
1
1
1
1
2
2
2
2
2
2
2
2
i with j bigger than
1
1
1
1
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 17 / 24
Basic Ideas
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 18 / 24
Basic Ideas
1: Initialize an empty Hash set H. 2: for i ← 1 : n do 3:
4:
5:
6:
7: end for
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 19 / 24
Attack on 855-round Trivium
1
2
3
4
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 20 / 24
Attack on 855-round Trivium
w (w ∈ [0, 2]) for
1
1
4 of all the preserved high state terms; (2) the degree of s210 1
1
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 21 / 24
Attack on 855-round Trivium
… … State Terms … … Repeated Term Removing Degree Evaluation Degree Reduction Discarding Monomials Repeat (Algorithm 4) IV Representation
70-degree IV terms
Left State Terms Deleted State Terms
1
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 22 / 24
Attack on 855-round Trivium
1: Initialize the possible key space KEY with size of 23. 2: for i ← 1 : 3 do 3:
4:
1
1
5:
1
6:
7:
8:
9:
10: end for
X Fu ( Tsinghua University, Beijing, China FHNW, Windisch, Switzerland ) A Key-recovery Attack on 855-Round Trivium June 6,2018 23 / 24