An Improved Cryptanalysis of Lightweight Stream Cipher Grain-v1 - - PowerPoint PPT Presentation

an improved cryptanalysis of lightweight stream cipher
SMART_READER_LITE
LIVE PREVIEW

An Improved Cryptanalysis of Lightweight Stream Cipher Grain-v1 - - PowerPoint PPT Presentation

An Improved Cryptanalysis of Lightweight Stream Cipher Grain-v1 Miodrag J. Mihaljevi 1 , Nishant Sinha 2 , Sugata Gangopadhyay 2 , Subhamoy Maitra 3 , Goutam Paul 3 and Kanta Matsuura 4 1 Mathematical Institute, Serbian Academy of Sciences and


slide-1
SLIDE 1

1 1 1 1

Miodrag J. Mihaljević1, Nishant Sinha2, Sugata Gangopadhyay2, Subhamoy Maitra3, Goutam Paul3 and Kanta Matsuura4

1Mathematical Institute, Serbian Academy of Sciences and Arts, Belgeade 2Indian Institute of Technology, Roorkee 3Indian Statistical Institute, Kolkata 4The University of Tokyo, Tokyo

  • COST CRYPTACUS Workshop -

16-18 November 2017, Nijmegen – Netherlands

An Improved Cryptanalysis of Lightweight Stream Cipher Grain-v1

slide-2
SLIDE 2

Roadmap

  • Part I:

Why Grain-v1 is interesting and motivation for the work

  • Part II:

Summary of our recent results on Grain- v1 cryptanalysis

  • Part III:

Work in progress - An advanced approach for cryptanalysis of Grain-v1

2

slide-3
SLIDE 3

Part I Why Grain-v1 is interesting and motivation for the work

  • Grain family and academic interest
  • Lizard: A Grain like lightweight

stream cipher reported at FSE 2017

  • NIST project on lightweight

cryptography (2017)

3

slide-4
SLIDE 4

A bird view (1)

4

Infrastructure for security & privacy

cryptographic components

Recently, PRIVACY has appeared as an issue of top interest

slide-5
SLIDE 5

A bird view (2): A neverending story

  • Development of

advanced cryptographic components for information (cyber) security & privacy.

  • Development of

advanced techniques for security evaluation

  • f cryptographic

components for information (cyber) security & privacy.

5

slide-6
SLIDE 6

Motivation for our further work

  • Grain-v1 is a

representative of an interesting and important framework for design of lightweight stream ciphers.

  • Security evaluation of

Grain-v1 also provides certain guidelines for design

  • f secure lightweight

stream ciphers.

6

slide-7
SLIDE 7

ACADEMIC REFERENCES Why Grain Family is Interesting

7

slide-8
SLIDE 8

Grain-v1: A Member of Grain Family

8

initialization keystream generation

slide-9
SLIDE 9

Some Recent References

  • Z. Ma, T. Tian, W.-F. Qi, “Improved conditional

differential attacks on Grain v1”, IET Inf. Secur., 2017,

  • Vol. 11 Iss. 1, pp. 46-53.
  • M. Rahimi, M. Barmshory, M. H. Mansouri, M. R. Aref,

“Dynamic cube attack on Grain-v1”, IET Inf. Secur., 2016, Vol. 10, Iss. 4, pp. 165–172.

  • S. Banik, “Conditional differential cryptanalysis of

105 round Grain v1”, Cryptogr. Commun. (2016) 8: 113–137.

  • Z. Ma, T. Tian, W.-F. Qi, “Conditional differential

attacks on Grain-128a stream cipher”, IET Inf. Secur., 2017, Vol. 11 Iss. 3, pp. 139-145.

9

slide-10
SLIDE 10

Very Recent References: Improvements Originated from Grain Family

  • M. Hamann, M. Krause, W. Meier, “LIZARD – A

Lightweight Stream Cipher for Power- constrained Devices”, FSE 2017, to appear in IACR Transactions on Symmetric Cryptology.

  • E. Dubrova, Martin Hell, “Espresso: A stream

cipher for 5G wireless communication systems”, Cryptogr. Commun. (2017) 9: 273– 289

10

slide-11
SLIDE 11

Some of Our References on Grain Family

  • M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai, "State

Recovery of Grain-v1 Employing Normality Order of the Filter Function", IET Information Security, vol. 6, no. 2, pp. 55-64, June 2012.

  • M.J. Mihaljevic, S. Gangopadhyay, G. Paul and H. Imai, "Generic

Cryptographic Weakness of k-normal Boolean Functions in Certain Stream Ciphers and Cryptanalysis of Grain-128", Periodica Mathematica Hungarica, vol. 65, no. 2, pp. 205-227, Dec. 2012.

  • M.J. Mihaljevic, N. Sinha, S. Gangopadhyay , S. Maitra, G. Paul, K.

Matsuura, “Internal State Recovery of Grain-v1 Stream Cipher Employing Conditional Time-Memory-Data Trade-Off”, to be submitted.

11

slide-12
SLIDE 12

AN ORIGIN FOR ADVANCED DESIGNS

Why Grain Family is Interesting

12

slide-13
SLIDE 13

Grain-v1 Keystream Generator

slide-14
SLIDE 14

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

1 University of Mannheim, Germany 2 FH Nordwestschweiz, Switzerland

Matthias Hamann1 Matthias Krause1 Willi Meier2

Page 14 07.03.2017

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

FSE 2017 (Tokyo, Japan)

slide-15
SLIDE 15

Difference to Grain v1

  • Smaller state size: 121 bit (compared to 160 bit).
  • Larger key size: 120 bit (rather than 80 bit), necessary assumption

for security proof.

  • Key is introduced not only once, but twice in initialization.
  • Quite different output function: Inspired by FLIP stream cipher,

uses many (53) inputs.

  • Both register feedbacks now nonlinear.
  • Efficiently parallelizable up to a factor of 6 (compared to 16).

Page 15

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

FSE 2017 (Tokyo, Japan)

07.03.2017

slide-16
SLIDE 16

LIZARD in keystream generation mode

slide-17
SLIDE 17
  • Clock speed of 100 kHz.
  • * indicates serialized key/IV loading.
  • Load/Ini: Number of clock cycles needed to perform the state initialization.
  • After state initialization, all designs produce one keystream bit per clock

cycle (i.e., 100 kbit/s).

Hardware Results

Page 17

LIZARD – A Lightweight Stream Cipher for Power-constrained Devices

FSE 2017 (Tokyo, Japan)

07.03.2017

slide-18
SLIDE 18

NIST RECOGNITION

Why Grain Family is Interesting

18

slide-19
SLIDE 19

NIST Lightweight Cryptograpy Project

slide-20
SLIDE 20

NISTIR 8114 REPORT ON LIGHTWEIGHT CRYPTOGRAPHY

This publication is available free of charge from: https://doi.org/10.6028/NIST.IR.8114

  • Stream ciphers are also promising primitives for constrained
  • environments. The eSTREAM competition, organized by the

European Network of Excellence for Cryptology, aimed to identify new stream ciphers that might be suitable for widespread adoption. The finalists of the competition were announced in 2008 and included three stream ciphers for hardware applications with restricted resources:

  • Grain is widely analyzed and provides implementation flexibility,

and also has a version that supports authentication.

  • Trivium is a widely analyzed design; however, it only supports

80-bit keys.

  • Mickey is less analyzed compared to Grain and Trivium. It

provides less implementation flexibility and is susceptible to timing and power analysis, due to irregular clocking.

20

slide-21
SLIDE 21

21

slide-22
SLIDE 22

22

slide-23
SLIDE 23

23

slide-24
SLIDE 24

Part II

A summary of our recent results on recent Grain-v1 cryptanalysis

24

slide-25
SLIDE 25

Considered Model of Stream Ciphers

slide-26
SLIDE 26

Underlying Ideas for Cryptanalysis

slide-27
SLIDE 27

Linearized Model

special internal state

(which reduces algebraic degree of the output Boolean function) (nonlinear) state updating function LINEARIZED

  • r

REDUCED ALGEBRAIC DEGREE nonlinear Boolean function

  • utput
slide-28
SLIDE 28

Grain-v1 Keystream Generator

nonlinear function

+

1 80 NFSR linear function

+

1 80 LFSR nonlinear function h(.)

+ +

slide-29
SLIDE 29

Algebraic Description of Grain-v1

slide-30
SLIDE 30

The proposed cryptanalysis is based on the following approach:

  • employment of a dedicated restricted

guess and determine approach;

  • employment of a dedicated BSW

sampling which provides efficient recovery of a part of the internal state (under a dedicated restricted guess) based on the given keystream segment;

  • employment of a dedicated time-memory

trade-off approach.

slide-31
SLIDE 31

Probabilistic Background (1)

slide-32
SLIDE 32

Probabilistic Background (2)

slide-33
SLIDE 33

Towards Internal State Recovery: Guess & Linearise

nonlinear function

+

1 80 NFSR linear function

+

1 80 LFSR linear function

+ +

slide-34
SLIDE 34

“Enforcing” h(.) to be linear

slide-35
SLIDE 35

“Enforcing” h(.) to be constant (a consequence of its k-normality)

slide-36
SLIDE 36

BSW Sampling and a Part of Internal State Recovery under Linearization Guess

nonlinear function

+

1 80 NFSR linear function

+

1 80 LFSR linear function

+ +

keystream

slide-37
SLIDE 37

Framework for Advanced Cryptanalysis (1)

slide-38
SLIDE 38
slide-39
SLIDE 39

Framework for Advanced Cryptanalysis (2)

slide-40
SLIDE 40

Advanced Algorithm for Cryptanalysis (1)

slide-41
SLIDE 41

Advanced Algorithm for Cryptanalysis (2)

slide-42
SLIDE 42

Part III Novelties in the Advanced Approach

42

slide-43
SLIDE 43

Novelties in the Advanced Approach

  • Construction and

employment of a novel dedicated system of equations for the guess & determine approach

  • Development of a

dedicated BSW sampling TMD-TO based on multiple prefix patterns

43

slide-44
SLIDE 44

Construction and employment of a novel dedicated system of equations for the guess & determine approach

44

slide-45
SLIDE 45

45

slide-46
SLIDE 46

46

slide-47
SLIDE 47

47

slide-48
SLIDE 48

48

slide-49
SLIDE 49

49

Thank You Very Much for the Attention,

and QUESTIONS Please!