Analysis of cryptographic hash functions
Christina Boura
SECRET Project-Team, INRIA Paris-Rocquencourt Gemalto, France
Ph.D. Defense December 7, 2012
1 / 43
Analysis of cryptographic hash functions Christina Boura SECRET - - PowerPoint PPT Presentation
Analysis of cryptographic hash functions Christina Boura SECRET Project-Team, INRIA Paris-Rocquencourt Gemalto, France Ph.D. Defense December 7, 2012 1 / 43 Symmetric key cryptography Alice and Bob share the same secret key . Key Ciphertext
SECRET Project-Team, INRIA Paris-Rocquencourt Gemalto, France
1 / 43
Plaintext Encryption Ciphertext Decryption Plaintext
Key
2 / 43
3 / 43
4 / 43
5 / 43
1
2
6 / 43
Analysis of the algebraic properties of some primitives
1
2
7 / 43
Analysis of the algebraic properties of some primitives
2 → Fm 2 .
8 / 43
Analysis of the algebraic properties of some primitives
2
2
9 / 43
Analysis of the algebraic properties of some primitives
2
2
9 / 43
Analysis of the algebraic properties of some primitives
2
2
2.
9 / 43
Analysis of the algebraic properties of some primitives
10 / 43
Analysis of the algebraic properties of some primitives
11 / 43
Analysis of the algebraic properties of some primitives
12 / 43
Analysis of the algebraic properties of some primitives Zero-sum distinguishers
2 → Fn 2.
k
k
13 / 43
Analysis of the algebraic properties of some primitives Zero-sum distinguishers
2 → Fn 2.
2 is a zero-sum for F if and only
F .
14 / 43
Analysis of the algebraic properties of some primitives Zero-sum distinguishers
2 into Fn
15 / 43
Analysis of the algebraic properties of some primitives Zero-sum distinguishers
1
t .
2 with dim V > max(deg Fr−t, deg Gt).
2.
2 of size 2dim V for P.
16 / 43
Analysis of the algebraic properties of some primitives Zero-sum distinguishers
17 / 43
Analysis of the algebraic properties of some primitives Zero-sum distinguishers
2 .
2, supp(x) ⊂ word i}.
18 / 43
Analysis of the algebraic properties of some primitives Zero-sum distinguishers
19 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
20 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
21 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
21 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
21 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
2:
21 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
2 into Fn 2 corresponding to the
2 .
2 into Fℓ 2, we have
1≤i≤n0−1
22 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
23 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
23 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
23 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
23 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
(x1,x2,x3,x4)(δ1x1 + δ2x2 + δ3x3 + δ4x4)
23 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
24 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
24 / 43
Analysis of the algebraic properties of some primitives A bound on the degree of SPN-type iterated permutations
25 / 43
Analysis of the algebraic properties of some primitives A bound implying the degree of the inverse permutation
26 / 43
Analysis of the algebraic properties of some primitives A bound implying the degree of the inverse permutation
2 and let G from Fn 2 into
2 . Then,
27 / 43
Analysis of the algebraic properties of some primitives A bound implying the degree of the inverse permutation
2 and let G from Fn 2 into
2 . Then,
27 / 43
Analysis of the algebraic properties of some primitives A bound implying the degree of the inverse permutation
S T E
ki
xi−1 yi−1 xi yi
28 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
29 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
29 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
29 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
29 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
2 into Fm 2 .
2 and
2 with dim V = v and dim W = w such that, for all λ ∈ W,
30 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
2
31 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
32 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
(v, w) Q (2,1) (2,2) (2,3) (2,4) (3,1) (3,2) (3,3) (3,4) G0 3 35 19 5 7 1 G1 3 35 23 3 7 1 G2 3 35 23 3 7 1 G3 35 5 G4 35 5 G5 35 5 G6 35 5 G7 35 5 G8 3 35 19 5 7 1 G9 1 35 13 3 G10 1 35 13 3 G11 35 5 G12 35 5 G13 35 5 G14 1 35 13 3 G15 1 35 11 1 3 33 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
34 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
35 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
35 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
35 / 43
Analysis of the algebraic properties of some primitives The notion of (v, w)-linearity
36 / 43
Side-channel analysis of some SHA-3 candidates
1
2
37 / 43
Side-channel analysis of some SHA-3 candidates
38 / 43
Side-channel analysis of some SHA-3 candidates
2
2.
39 / 43
Side-channel analysis of some SHA-3 candidates
40 / 43
Side-channel analysis of some SHA-3 candidates
41 / 43
Side-channel analysis of some SHA-3 candidates
Algorithm Timings at 8MHz Extra RAM Extra code reference code secured code static stack HMAC-Grøstl 453 ms 486 ms (+7.2%) +325 bytes +688 bytes HMAC-Skein 77.7 ms 155 ms (+100%) +32 bytes +3484 bytes
42 / 43
Side-channel analysis of some SHA-3 candidates
43 / 43