Boomerang Connectivity Table Revisited Ling Song 1,2 , Xianrui Qin 3 - - PowerPoint PPT Presentation

β–Ά
boomerang connectivity table revisited
SMART_READER_LITE
LIVE PREVIEW

Boomerang Connectivity Table Revisited Ling Song 1,2 , Xianrui Qin 3 - - PowerPoint PPT Presentation

Boomerang Connectivity Table Revisited Ling Song 1,2 , Xianrui Qin 3 , Lei Hu 2 1. Nanyang Technological University, Singapore 2. Institute of Information Engineering, CAS, China 3. Shandong University, China FSE 2019 @ Paris Boomerang Attacks


slide-1
SLIDE 1

Ling Song1,2, Xianrui Qin3, Lei Hu2

Boomerang Connectivity Table Revisited

  • 1. Nanyang Technological University, Singapore
  • 2. Institute of Information Engineering, CAS, China
  • 3. Shandong University, China

FSE 2019 @ Paris

slide-2
SLIDE 2

/24

Boomerang Attacks

Proposed by [Wag99] to combine two diff. trails:

  • 𝐹0: Pr 𝛽 β†’ 𝛾 = π‘ž
  • 𝐹1: Pr 𝛿 β†’ πœ€ = π‘Ÿ

Distinguishing probability:

π‘ž2π‘Ÿ2

𝐹1 𝐹1 𝐹1

𝐷1 𝐷2 𝐷3 𝐷4

πœ€ πœ€ 𝐹0 𝐹0 𝐹0

𝑄

1

𝑄2 𝑄3 𝑄

4

𝛽 𝛿 𝛿 𝛾 𝛾 𝛽 𝐹0 𝐹1

2

slide-3
SLIDE 3

/24

Bo Boomer merang ang at attacks tacks: When you send it properly, it always comes back to you.

Boomerang Attacks

Proposed by [Wag99] to combine two diff. trails:

  • 𝐹0: Pr 𝛽 β†’ 𝛾 = π‘ž
  • 𝐹1: Pr 𝛿 β†’ πœ€ = π‘Ÿ

Distinguishing probability:

π‘ž2π‘Ÿ2

𝐹1 𝐹1 𝐹1

𝐷1 𝐷2 𝐷3 𝐷4

πœ€ πœ€ 𝐹0 𝐹0 𝐹0

𝑄

1

𝑄2 𝑄3 𝑄

4

𝛽 𝛿 𝛿 𝛾 𝛾 𝛽 𝐹0 𝐹1

https://www.australiathegift.com.au/shop/boomerang-with-stand/

2

slide-4
SLIDE 4

/24

Bo Boomer merang ang at attacks tacks: When you send it properly, it always comes back to you.

Boomerang Attacks

Proposed by [Wag99] to combine two diff. trails:

  • 𝐹0: Pr 𝛽 β†’ 𝛾 = π‘ž
  • 𝐹1: Pr 𝛿 β†’ πœ€ = π‘Ÿ

Distinguishing probability:

π‘ž2π‘Ÿ2

𝐹1 𝐹1 𝐹1

𝐷1 𝐷2 𝐷3 𝐷4

πœ€ πœ€ 𝐹0 𝐹0 𝐹0

𝑄

1

𝑄2 𝑄3 𝑄

4

𝛽 𝛿 𝛿 𝛾 𝛾 𝛽 𝐹0 𝐹1

[Wag99]: Assumed two trails are independent.

NOT always correct

https://www.australiathegift.com.au/shop/boomerang-with-stand/

2

slide-5
SLIDE 5

/24

  • [BDD03]: Middle-round S-box trick
  • [BK09]: Boomerang switch: Ladder switch /

Feistel switch / S-box switch

Dependency can help attackers

  • [Mer09]: Incompatible trails

Dependency can spoil attacks.

Two Trails in Boomerang Attacks

3

slide-6
SLIDE 6

/24

Sandwich Attacks [DKS10]

Distinguishing probability:

ΰ·€ π‘ž2 ΰ·€ π‘Ÿ2𝑠

πœ€ πœ€ 𝛿 𝛿 ΰ·¨ 𝐹0 ΰ·¨ 𝐹0 ΰ·¨ 𝐹0 𝛽 ΰ·¨ 𝐹0 𝛾 𝛽 ΰ·¨ 𝐹1 ΰ·¨ 𝐹1 ΰ·¨ 𝐹1 𝑧1 𝑧2 𝑧3 𝑧4 ΰ·¨ 𝐹1 𝑦1 𝑦3 𝑦4

𝐹𝑛

𝛾 𝐷1 𝐷2 𝐷3 𝐷4 𝑄

1

𝑄2 𝑄3 𝑄

4

𝑦2

𝐹𝑛 𝐹𝑛 𝐹𝑛

Decompose the cipher into three parts

  • 𝐹𝑛 handles the dependency.
  • ΰ·¨

𝐹0 ← 𝐹0 \𝐹𝑛: Pr 𝛽 β†’ 𝛾 = ΰ·€ π‘ž

  • ΰ·¨

𝐹1 ← 𝐹1 \𝐹𝑛: Pr 𝛿 β†’ πœ€ = ΰ·€ π‘Ÿ

4

slide-7
SLIDE 7

/24

Sandwich Attacks [DKS10]

Distinguishing probability:

ΰ·€ π‘ž2 ΰ·€ π‘Ÿ2𝑠

πœ€ πœ€ 𝛿 𝛿 ΰ·¨ 𝐹0 ΰ·¨ 𝐹0 ΰ·¨ 𝐹0 𝛽 ΰ·¨ 𝐹0 𝛾 𝛽 ΰ·¨ 𝐹1 ΰ·¨ 𝐹1 ΰ·¨ 𝐹1 𝑧1 𝑧2 𝑧3 𝑧4 ΰ·¨ 𝐹1 𝑦1 𝑦3 𝑦4

𝐹𝑛

𝜸? 𝐷1 𝐷2 𝐷3 𝐷4 𝑄

1

𝑄2 𝑄3 𝑄

4

𝑦2

𝐹𝑛 𝐹𝑛 𝐹𝑛

𝑠 = Pr[𝑦3 βŠ• 𝑦4 = 𝛾|(𝑦1 βŠ• 𝑦2 = 𝛾)β‹€(𝑧1 βŠ• 𝑧3 = 𝛿)β‹€(𝑧2 βŠ• 𝑧4 = 𝛿)]

Decompose the cipher into three parts

  • 𝐹𝑛 handles the dependency.
  • ΰ·¨

𝐹0 ← 𝐹0 \𝐹𝑛: Pr 𝛽 β†’ 𝛾 = ΰ·€ π‘ž

  • ΰ·¨

𝐹1 ← 𝐹1 \𝐹𝑛: Pr 𝛿 β†’ πœ€ = ΰ·€ π‘Ÿ

4

slide-8
SLIDE 8

/24

BCT [CHP+18]

Boomerang Connectivity Table (BCT)

  • Calculate 𝑠 theoretically when 𝐹𝑛 is composed of a

single Sβˆ’box layer.

  • Unify previous observations on the S-box (incompa-

tibilities and switches)

𝑇 𝑇 𝑇 𝑇

𝑦1 𝑦2 𝑦3 𝑦4 𝑧1 𝑧2 𝑧3 𝑧4

𝛽 𝛾 𝛾 𝛽

5

slide-9
SLIDE 9

/24

Our Work

  • The actual boundaries of 𝐹𝑛 which contains

dependency

  • How to calculate 𝑠 when 𝐹𝑛 contains multiple

rounds?

  • Generalized framework of BCT

– Determine the boundaries of 𝐹𝑛 – Calculate 𝑠 of 𝐹𝑛 in the sandwich attack

Motivation Contribution

6

slide-10
SLIDE 10

/24

DDT: Difference Distribution Table

πΈπΈπ‘ˆ 𝛽, 𝛾 = #{𝑦 ∈ {0,1}π‘œ|𝑇 𝑦 ⨁𝑇 𝑦⨁𝛽 = 𝛾}

SKINNY’s 4-bit S-box 𝛽 𝛾

7

slide-11
SLIDE 11

/24

BCT: Boomerang Connectivity Table

πΆπ·π‘ˆ 𝛽, 𝛾 = #{𝑦 ∈ {0,1}π‘œ|π‘‡βˆ’1(𝑇 𝑦 βŠ• 𝛾)β¨π‘‡βˆ’1(𝑇 𝑦⨁𝛽 βŠ• 𝛾) = 𝛽}

𝑇 𝑇 𝑇 𝑦1 𝑦2 𝑦3 𝑧1 𝑧2 𝑧3 𝑧4

𝛽 𝛾

𝑇

𝛾

𝑦4

𝛽

SKINNY’s 4-bit S-box 𝛽 𝛾

8

slide-12
SLIDE 12

/24

Relation between DDT and BCT

Let

9

slide-13
SLIDE 13

/24

Relation between DDT and BCT

Let

9

slide-14
SLIDE 14

/24

Relation between DDT and BCT

Let

  • Eq. 1 can be re-written as

9

slide-15
SLIDE 15

/24

New Explanation of BCT

𝑠 for 𝐹𝑛 with one S-box layer at

the boundary of E0 and E1

10

slide-16
SLIDE 16

/24

New Explanation of BCT

𝑠 for 𝐹𝑛 with one S-box layer at

the boundary of E0 and E1 Similarly,

10

slide-17
SLIDE 17

/24

New Explanation of BCT

𝑠 for 𝐹𝑛 with one S-box layer at

the boundary of E0 and E1 Similarly, In this case, 𝛽 and 𝛾 are regarded as fixed.

10

slide-18
SLIDE 18

/24

Generalization: S-box in E0 or E1

Lower crossing difference Upper crossing difference S-box in E0 S-box in E1 11

slide-19
SLIDE 19

/24

Generalization: S-box in E0 or E1

11

What if 𝛽 or 𝛾 (crossing differences) are not fixed?

S-box in E0 S-box in E1 Upper crossing difference Lower crossing difference

slide-20
SLIDE 20

/24

Generalization: S-box in E0

12

slide-21
SLIDE 21

/24

Generalization: S-box in E0

(1) 𝛾 is independent of the upper trail

12

slide-22
SLIDE 22

/24

Generalization: S-box in E0

(1) 𝛾 is independent of the upper trail which becomes identical to π‘ž2π‘Ÿ2 in the classical boomerang attack. (2) 𝛾 is uniformly distributed

12

slide-23
SLIDE 23

/24

Generalization: S-box in E1

(1) 𝛽 is independent of the lower trail which becomes identical to π‘ž2π‘Ÿ2 in the classical boomerang attack. (2) 𝛽 is uniformly distributed

13

slide-24
SLIDE 24

/24

Generalization: Interrelated S-boxes

S-boxes A and B are interrelated.

Lower crossing diff. (𝛾) of A comes from B. Upper crossing diff. (𝛽′) of B comes from A. 14

slide-25
SLIDE 25

/24

Generalization: Interrelated S-boxes

S-boxes A and B are interrelated.

Lower crossing diff. (𝛾) of A comes from B. Upper crossing diff. (𝛽′) of B comes from A. 14

slide-26
SLIDE 26

/24

Generalization: Interrelated S-boxes

S-boxes A and B are interrelated.

Lower crossing diff. (𝛾) of A comes from B. Upper crossing diff. (𝛽′) of B comes from A. 14

slide-27
SLIDE 27

/24

Generalized Framework of BCT

Boundaries of 𝐹𝑛: where crossing differences are distr

ibuted (almost) uniformly. 1. Initialization: 𝐹𝑛 ← 𝐹1

𝑔𝑗𝑠𝑑𝑒||𝐹0 π‘šπ‘π‘‘π‘’ .

2. Extend both trails: 𝛽 β†’

𝐹0 𝛾 βˆ’β‡’, β‡  βˆ’(𝛿 ← 𝐹1 πœ€).

3. Prepend 𝐹𝑛 with one more round

a) If the lower crossing differences are distributed uni formly, peel off the first round and go to Step 4. b) Go to Step 3

4. Append 𝐹𝑛 with one more round

a) If the upper crossing differences are distributed uni formly, peel off the last round and go to Step 5. b) Go to Step 4.

5. Calculate r using formulas in the previous slides

𝐹1 𝐹0

Pr = 1 Pr = 1

15

slide-28
SLIDE 28

/24

Re-evaluate prob of four BM dist. of SKINNY

  • Prev: prob evaluated by ΖΈ

π‘ž2 ො π‘Ÿ2

  • New: prob evaluated by the generalized BCT

Construct related-subkey BM dist. Of AES-128

  • Prev: related-subkey BM dist. Of AES-192/256
  • New: 6-round related-subkey BM dist. Of AES-

128 with 2βˆ’109.42

Applications

16

slide-29
SLIDE 29

/24

SKINNY [BJK+16] is an SPN cipher, with a linear key schedule.

  • SKINNY-n-t where n is block size and t

tweakey size Example 𝐹𝑛 of SKINNY-64-128 in the related- tweakey setting

  • Upper trail: 2 rounds, 2βˆ’8
  • Lower trail: 4 rounds, 2βˆ’14
  • π‘ž2π‘Ÿ2 = 2βˆ’44

SKINNY

17

slide-30
SLIDE 30

/24

𝑭𝒏 with 6 Middle Rounds

Rd Diff before and after SB βˆ†K βˆ‡K Pr. R1 0,0,0,0, 0,0,0,0, 0,0,0,b, 0,0,0,0 0,0,0,0, 0,0,0,0, 0,0,0,1, 0,0,0,0 0,0,0,0, 0,0,0,0 b,0,0,0, 0,0,0,0 2βˆ’2 R2 0,1,0,0, 0,0,0,0, 0,1,0,0, 0,1,0,0 0,8,0,0, 0,0,0,0, 0,8,0,0, 0,8,0,0 0,0,0,0, 0,c,0,0 0,0,0,0, 5,0,0,0 2βˆ’2βˆ—3 R3 0,0,0,0, 0,0,0,0, 0,0,0,0, 0,0,0,2 0,0,0,0, 0,0,0,0, 0,0,0,0, 0,0,0,3 0,0,0,0, 0,0,0,0 0,0,3,0, 0,0,0,0 2βˆ’2 R4 0,0,0,0, 0,0,3,0, 0,0,0,0, 0,0,3,0 0,0,0,0, 0,0,d,0, 0,0,0,0, 0,0,c,0 0,0,0,3, 0,0,0,0 0,0,0,0, 0,0,9,0 2βˆ’3βˆ—2 R5 0,c,0,0, 0,0,0,0, 0,0,0,4, 0,0,0,0 0,2,0,0, 0,0,0,0, 0,0,0,2, 0,0,0,0 0,0,0,0, 0,0,0,0 0,0,0,0, 2,0,0,0 2βˆ’2βˆ—2 R6 0,0,0,0, 0,2,0,0, 0,0,0,0, 0,0,0,0 0,0,0,0, 0,1,0,0, 0,0,0,0, 0,0,0,0 0,0,0,0, 0,0,0,d 0,0,0,0, 0,1,0,0 2βˆ’2

18

slide-31
SLIDE 31

/24

Evaluation of 𝒔

Rounds π’’πŸ‘π’“πŸ‘ ෝ π’’πŸ‘ΰ· π’“πŸ‘ 𝑠 (new) 1+1 2βˆ’16 2βˆ’8.41 2βˆ’2 2+1 2βˆ’20 … 2βˆ’2.79 2+2 2βˆ’32 … 2βˆ’5.69 2+3 2βˆ’40 … 2βˆ’10.56 2+4 2βˆ’44 2βˆ’29.91 2βˆ’12.96 Experiments confirm the results of 𝑠.

19

slide-32
SLIDE 32

/24

Summary of the results on SKINNY

Ver. n 𝑭𝒏 𝑭 = ΰ·© π‘­πŸ ∘ 𝑭𝒏 ∘ ΰ·© π‘­πŸ |𝑭𝒏| 𝑠 |𝐹| ΰ·€ π‘ž2 ΰ·€ π‘Ÿ2𝑠 ΖΈ π‘ž2 ො π‘Ÿ2[LGS17] n-2n 64 6(13) 2βˆ’12.96 17 2βˆ’29.78 2βˆ’48.72 128 5(12) 2βˆ’11.45 18 2βˆ’77.83 2βˆ’103.84 n-3n 64 5(17) 2βˆ’10.50 22 2βˆ’42.98 2βˆ’54.94 128 5(17) 2βˆ’9.88 22 2βˆ’48.30 2βˆ’76.84

  • Prob. of BM dist. and comparison
  • Take seconds to calculate 𝑠

20

slide-33
SLIDE 33

/24

Summary of the results on SKINNY

Ver. n 𝑭𝒏 𝑭 = ΰ·© π‘­πŸ ∘ 𝑭𝒏 ∘ ΰ·© π‘­πŸ |𝑭𝒏| 𝑠 |𝐹| ΰ·€ π‘ž2 ΰ·€ π‘Ÿ2𝑠 ΖΈ π‘ž2 ො π‘Ÿ2[LGS17] n-2n 64 6(13) 2βˆ’12.96 17 2βˆ’29.78 2βˆ’48.72 128 5(12) 2βˆ’11.45 18 2βˆ’77.83 2βˆ’103.84 n-3n 64 5(17) 2βˆ’10.50 22 2βˆ’42.98 2βˆ’54.94 128 5(17) 2βˆ’9.88 22 2βˆ’48.30 2βˆ’76.84

  • Prob. of BM dist. and comparison
  • Take seconds to calculate 𝑠
  • Experiments confirm the results of 𝑠 and the

17-round dist. of SKINNY-64-128

20

slide-34
SLIDE 34

/24

6-round related-subkey BM dist. Of AES-128

3-round related-key differential trails:

  • 2 trails, 5 active S-boxes, 2βˆ’31
  • 18 trails, 6 active S-boxes, 2βˆ’36, 2βˆ’37, 2βˆ’38

2βˆ’31 2βˆ’37 𝐹𝑛, 𝑠 = 2βˆ’33.42 ΰ·€ π‘ž2 ΰ·€ π‘Ÿ2𝑠= 2βˆ’109.42

21

slide-35
SLIDE 35

/24

Discussion

Length of 𝐹𝑛:

  • Mainly determined by the diffusion effect of the linear la

yer

  • Density of active cells of the trails

r:

Strongly affected by the DDT and BCT of the S-box

Limitation of the generalized BCT:

For a long 𝐹𝑛 with large and strong S-boxes, calculating r mig ht be a time-consuming task, e.g., T>235.

22

slide-36
SLIDE 36

/24

Generalized BCT: for calculating 𝒔 in the sandwich attack

1: identify the boundaries of dependency 2: calculate 𝒔

Problems to investigate:

– Extension to non S-box based ciphers – Improving previous boomerang attacks

Concluding Remarks

23

slide-37
SLIDE 37

Slides credit to Yu Sasaki

Thank you for your attention!!