A Model for Structure Attacks, with Applications to PRESENT and Serpent
Meiqin Wang1, Yue Sun2, Elmar Tischhauser3 and Bart Preneel3
1Shandong University, 2Tsinghua University, 3KU Leuven and IBBT
FSE 2012 March 19, 2012
1 / 18
A Model for Structure Attacks, with Applications to PRESENT and - - PowerPoint PPT Presentation
A Model for Structure Attacks, with Applications to PRESENT and Serpent Meiqin Wang 1 , Yue Sun 2 , Elmar Tischhauser 3 and Bart Preneel 3 1 Shandong University, 2 Tsinghua University, 3 KU Leuven and IBBT FSE 2012 March 19, 2012 1 / 18 Outline
1Shandong University, 2Tsinghua University, 3KU Leuven and IBBT
1 / 18
2 / 18
Motivation 3 / 18
Motivation 3 / 18
Motivation 3 / 18
◮ Can this be avoided?
Motivation 4 / 18
◮ Can this be avoided?
Motivation 4 / 18
◮ Can this be avoided?
Motivation 4 / 18
◮ Can this be avoided?
Motivation 4 / 18
Modeling structure attacks 5 / 18
Modeling structure attacks 5 / 18
Modeling structure attacks 5 / 18
Modeling structure attacks 6 / 18
S
15
S
14
S
13
S
12 11
S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1
S
15
S
14
S
13
S
12 11
S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1
S
15
S
14
S
13
S
12 11
S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1
R rounds r rounds
Modeling structure attacks 6 / 18
Modeling structure attacks 7 / 18
15
12 11
8 9 7 6 5 4 3 1
F
12 11
8 9 7 6 5 4 3 1
Modeling structure attacks 7 / 18
15
12 11
8 9 7 6 5 4 3 1
F
12 11
8 9 7 6 5 4 3 1
15
12 11
8 9 7 6 5 4 3 1
F
12 11
8 9 7 6 5 4 3 1
Modeling structure attacks 7 / 18
S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1R rounds r rounds
Modeling structure attacks 8 / 18
S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1R rounds r rounds
Modeling structure attacks 8 / 18
S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1R rounds r rounds
Modeling structure attacks 8 / 18
S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1R rounds r rounds
Modeling structure attacks 8 / 18
S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1R rounds r rounds
Modeling structure attacks 8 / 18
S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1S
15S
14S
13S
12 11S S10 S S S S S S S S S S
8 9 7 6 5 4 3 2 1R rounds r rounds
Modeling structure attacks 8 / 18
Modeling structure attacks 9 / 18
Modeling structure attacks 9 / 18
Modeling structure attacks 9 / 18
Modeling structure attacks 9 / 18
Modeling structure attacks 9 / 18
Modeling structure attacks 10 / 18
Modeling structure attacks 10 / 18
Modeling structure attacks 10 / 18
Modeling structure attacks 10 / 18
Modeling structure attacks 10 / 18
Modeling structure attacks 11 / 18
Modeling structure attacks 11 / 18
Modeling structure attacks 11 / 18
Attacking PRESENT and Serpent 12 / 18
G=3 G=1 G=2 G=0
15
14
12 11
8 9 7 6 4 3 2 1
15
14
13
12 11
8 9 7 5 3 2 1
15
14
13
12 11
8 9 7 6 5 4 2
Attacking PRESENT and Serpent 13 / 18
Attacking PRESENT and Serpent 14 / 18
Attacking PRESENT and Serpent 14 / 18
Attacking PRESENT and Serpent 15 / 18
Attacking PRESENT and Serpent 16 / 18
Attacking PRESENT and Serpent 16 / 18
Conclusions and outlook 17 / 18
Conclusions and outlook 17 / 18
18 / 18