boomerang connectivity table revisited
play

Boomerang Connectivity Table Revisited Ling Song 1,2 , Xianrui Qin 3 - PowerPoint PPT Presentation

Boomerang Connectivity Table Revisited Ling Song 1,2 , Xianrui Qin 3 , Lei Hu 2 1. Nanyang Technological University, Singapore 2. Institute of Information Engineering, CAS, China 3. Shandong University, China FSE 2019 @ Paris Boomerang Attacks


  1. Boomerang Connectivity Table Revisited Ling Song 1,2 , Xianrui Qin 3 , Lei Hu 2 1. Nanyang Technological University, Singapore 2. Institute of Information Engineering, CAS, China 3. Shandong University, China FSE 2019 @ Paris

  2. Boomerang Attacks Proposed by [Wag99] to 𝑄 𝑄 3 1 combine two diff. trails: 𝛽 𝛽 𝑄 2 𝑄 𝐹 0 𝐹 0 4 β€’ 𝐹 0 : Pr 𝛽 β†’ 𝛾 = π‘ž 𝛿 β€’ 𝐹 1 : Pr 𝛿 β†’ πœ€ = π‘Ÿ 𝐹 0 𝐹 0 𝛾 Distinguishing probability: 𝛾 𝐹 1 𝐹 1 π‘ž 2 π‘Ÿ 2 𝛿 𝐹 1 𝐹 1 πœ€ 𝐷 1 𝐷 3 𝐷 2 πœ€ 𝐷 4 2 /24

  3. Boomerang Attacks Proposed by [Wag99] to 𝑄 𝑄 3 1 combine two diff. trails: 𝛽 𝛽 𝑄 2 𝑄 𝐹 0 𝐹 0 4 β€’ 𝐹 0 : Pr 𝛽 β†’ 𝛾 = π‘ž 𝛿 β€’ 𝐹 1 : Pr 𝛿 β†’ πœ€ = π‘Ÿ 𝐹 0 𝐹 0 𝛾 Distinguishing probability: 𝛾 𝐹 1 𝐹 1 π‘ž 2 π‘Ÿ 2 𝛿 𝐹 1 𝐹 1 Bo Boomer merang ang at attacks tacks: When you πœ€ 𝐷 1 𝐷 3 send it properly, it always comes back to you. 𝐷 2 πœ€ 𝐷 4 https://www.australiathegift.com.au/shop/boomerang-with-stand/ 2 /24

  4. Boomerang Attacks Proposed by [Wag99] to 𝑄 𝑄 3 1 combine two diff. trails: 𝛽 𝛽 𝑄 2 𝑄 𝐹 0 𝐹 0 4 β€’ 𝐹 0 : Pr 𝛽 β†’ 𝛾 = π‘ž 𝛿 β€’ 𝐹 1 : Pr 𝛿 β†’ πœ€ = π‘Ÿ 𝐹 0 𝐹 0 𝛾 Distinguishing probability: 𝛾 𝐹 1 𝐹 1 π‘ž 2 π‘Ÿ 2 𝛿 𝐹 1 𝐹 1 Bo Boomer merang ang at attacks tacks: When you πœ€ 𝐷 1 𝐷 3 send it properly, it always comes back to you. 𝐷 2 πœ€ 𝐷 4 https://www.australiathegift.com.au/shop/boomerang-with-stand/ [Wag99]: Assumed two trails are independent . 2 /24 NOT always correct

  5. Two Trails in Boomerang Attacks Dependency can help attackers [BDD03]: Middle-round S-box trick β€’ [BK09]: Boomerang switch: Ladder switch / β€’ Feistel switch / S-box switch Dependency can spoil attacks. [Mer09]: Incompatible trails β€’ 3 /24

  6. Sandwich Attacks [DKS10] 𝑄 𝑄 3 1 𝛽 𝛽 Decompose the cipher into 𝑄 2 𝑄 ΰ·¨ ΰ·¨ 𝐹 0 𝐹 0 4 three parts ΰ·¨ ΰ·¨ 𝐹 0 𝐹 0 β€’ 𝐹 𝑛 handles the dependency. 𝑦 1 𝑦 3 𝛾 𝛾 ΰ·¨ 𝐹 𝑛 𝐹 𝑛 𝐹 0 ← 𝐹 0 \𝐹 𝑛 : Pr 𝛽 β†’ 𝛾 = ΰ·€ π‘ž β€’ 𝑦 2 𝑦 4 𝑧 1 𝑧 3 𝛿 ΰ·¨ 𝐹 1 ← 𝐹 1 \𝐹 𝑛 : Pr 𝛿 β†’ πœ€ = ΰ·€ π‘Ÿ β€’ 𝐹 𝑛 𝐹 𝑛 𝑧 2 𝑧 4 ΰ·¨ ΰ·¨ 𝐹 1 𝐹 1 𝛿 Distinguishing probability: ΰ·¨ ΰ·¨ 𝐹 1 𝐹 1 πœ€ 𝐷 3 𝐷 1 π‘ž 2 ΰ·€ π‘Ÿ 2 𝑠 ΰ·€ πœ€ 𝐷 2 𝐷 4 4 /24

  7. Sandwich Attacks [DKS10] 𝑄 𝑄 3 1 𝛽 𝛽 Decompose the cipher into 𝑄 2 𝑄 ΰ·¨ ΰ·¨ 𝐹 0 𝐹 0 4 three parts ΰ·¨ ΰ·¨ 𝐹 0 𝐹 0 β€’ 𝐹 𝑛 handles the dependency. 𝑦 1 𝑦 3 𝜸? 𝛾 ΰ·¨ 𝐹 𝑛 𝐹 𝑛 𝐹 0 ← 𝐹 0 \𝐹 𝑛 : Pr 𝛽 β†’ 𝛾 = ΰ·€ π‘ž β€’ 𝑦 2 𝑦 4 𝑧 1 𝑧 3 𝛿 ΰ·¨ 𝐹 1 ← 𝐹 1 \𝐹 𝑛 : Pr 𝛿 β†’ πœ€ = ΰ·€ π‘Ÿ β€’ 𝐹 𝑛 𝐹 𝑛 𝑧 2 𝑧 4 ΰ·¨ ΰ·¨ 𝐹 1 𝐹 1 𝛿 Distinguishing probability: ΰ·¨ ΰ·¨ 𝐹 1 𝐹 1 πœ€ 𝐷 3 𝐷 1 π‘ž 2 ΰ·€ π‘Ÿ 2 𝑠 ΰ·€ πœ€ 𝐷 2 𝐷 4 𝑠 = Pr[𝑦 3 βŠ• 𝑦 4 = 𝛾|(𝑦 1 βŠ• 𝑦 2 = 𝛾)β‹€(𝑧 1 βŠ• 𝑧 3 = 𝛿)β‹€(𝑧 2 βŠ• 𝑧 4 = 𝛿)] 4 /24

  8. BCT [CHP+18] Boomerang Connectivity Table (BCT) Calculate 𝑠 theoretically when 𝐹 𝑛 is composed of a β€’ single Sβˆ’box layer . Unify previous observations on the S-box (incompa- β€’ tibilities and switches) 𝑦 1 𝑦 3 𝛽 𝛽 𝑦 2 𝑦 4 𝑇 𝑇 𝑇 𝑇 𝛾 𝑧 1 𝑧 3 𝑧 2 𝑧 4 𝛾 5 /24

  9. Our Work Motivation The actual boundaries of 𝐹 𝑛 which contains β€’ dependency How to calculate 𝑠 when 𝐹 𝑛 contains multiple β€’ rounds? Contribution Generalized framework of BCT β€’ – Determine the boundaries of 𝐹 𝑛 Calculate 𝑠 of 𝐹 𝑛 in the sandwich attack – 6 /24

  10. DDT: Difference Distribution Table πΈπΈπ‘ˆ 𝛽, 𝛾 = #{𝑦 ∈ {0,1} π‘œ |𝑇 𝑦 ⨁𝑇 𝑦⨁𝛽 = 𝛾 } 𝛾 𝛽 SKINNY’s 4 -bit S-box 7 /24

  11. BCT: Boomerang Connectivity Table πΆπ·π‘ˆ 𝛽, 𝛾 = #{𝑦 ∈ {0,1} π‘œ |𝑇 βˆ’1 (𝑇 𝑦 βŠ• 𝛾)⨁𝑇 βˆ’1 (𝑇 𝑦⨁𝛽 βŠ• 𝛾) = 𝛽 } 𝛾 𝑦 1 𝑦 3 𝛽 𝛽 𝑦 2 𝑦 4 𝑇 𝑇 𝛾 𝑇 𝑇 𝑧 1 𝑧 3 𝛾 𝑧 2 𝑧 4 𝛽 SKINNY’s 4 -bit S-box 8 /24

  12. Relation between DDT and BCT Let 9 /24

  13. Relation between DDT and BCT Let 9 /24

  14. Relation between DDT and BCT Let Eq. 1 can be re-written as 9 /24

  15. New Explanation of BCT 𝑠 for 𝐹 𝑛 with one S-box layer at the boundary of E 0 and E 1 10 /24

  16. New Explanation of BCT 𝑠 for 𝐹 𝑛 with one S-box layer at the boundary of E 0 and E 1 Similarly, 10 /24

  17. New Explanation of BCT 𝑠 for 𝐹 𝑛 with one S-box layer at the boundary of E 0 and E 1 Similarly, In this case, 𝛽 and 𝛾 are regarded as fixed. 10 /24

  18. Generalization: S-box in E 0 or E 1 Upper crossing difference Lower crossing difference S-box in E 0 S-box in E 1 11 /24

  19. Generalization: S-box in E 0 or E 1 Upper crossing difference Lower crossing difference S-box in E 0 S-box in E 1 What if 𝛽 or 𝛾 (crossing differences) are not fixed? 11 /24

  20. Generalization: S-box in E 0 12 /24

  21. Generalization: S-box in E 0 (1) 𝛾 is independent of the upper trail 12 /24

  22. Generalization: S-box in E 0 (1) 𝛾 is independent of the upper trail (2) 𝛾 is uniformly distributed which becomes identical to π‘ž 2 π‘Ÿ 2 in the classical boomerang attack. 12 /24

  23. Generalization: S-box in E 1 (1) 𝛽 is independent of the lower trail (2) 𝛽 is uniformly distributed which becomes identical to π‘ž 2 π‘Ÿ 2 in the classical boomerang attack. 13 /24

  24. Generalization: Interrelated S-boxes Lower crossing diff. ( 𝛾 ) of A comes from B. Upper crossing diff. ( 𝛽′ ) of B comes from A. S-boxes A and B are interrelated. 14 /24

  25. Generalization: Interrelated S-boxes Lower crossing diff. ( 𝛾 ) of A comes from B. Upper crossing diff. ( 𝛽′ ) of B comes from A. S-boxes A and B are interrelated. 14 /24

  26. Generalization: Interrelated S-boxes Lower crossing diff. ( 𝛾 ) of A comes from B. Upper crossing diff. ( 𝛽′ ) of B comes from A. S-boxes A and B are interrelated. 14 /24

  27. Generalized Framework of BCT π‘šπ‘π‘‘π‘’ . 𝑔𝑗𝑠𝑑𝑒 ||𝐹 0 1. Initialization: 𝐹 𝑛 ← 𝐹 1 𝐹 0 𝛾 βˆ’β‡’ , β‡  βˆ’(𝛿 ← 𝐹 1 πœ€) . 𝐹 1 𝐹 0 2. Extend both trails: 𝛽 β†’ Pr = 1 Pr = 1 3. Prepend 𝐹 𝑛 with one more round a) If the lower crossing differences are distributed uni formly, peel off the first round and go to Step 4. b) Go to Step 3 4. Append 𝐹 𝑛 with one more round a) If the upper crossing differences are distributed uni formly, peel off the last round and go to Step 5. b) Go to Step 4. 5. Calculate r using formulas in the previous slides Boundaries of 𝐹 𝑛 : where crossing differences are distr ibuted (almost) uniformly. 15 /24

  28. Applications Re-evaluate prob of four BM dist. of SKINNY π‘ž 2 ො Prev: prob evaluated by ΖΈ π‘Ÿ 2 β€’ New: prob evaluated by the generalized BCT β€’ Construct related-subkey BM dist. Of AES-128 Prev: related-subkey BM dist. Of AES-192/256 β€’ New: 6-round related-subkey BM dist. Of AES- β€’ 128 with 2 βˆ’109.42 16 /24

  29. SKINNY SKINNY [BJK+16] is an SPN cipher, with a linear key schedule. SKINNY-n-t where n is block size and t β€’ tweakey size Example 𝐹 𝑛 of SKINNY-64-128 in the related- tweakey setting Upper trail: 2 rounds, 2 βˆ’8 β€’ Lower trail: 4 rounds, 2 βˆ’14 β€’ π‘ž 2 π‘Ÿ 2 = 2 βˆ’44 β€’ 17 /24

  30. 𝑭 𝒏 with 6 Middle Rounds Rd Diff before and after SB βˆ†K βˆ‡ K Pr. R1 2 βˆ’2 0,0,0,0, 0,0,0,0, 0,0,0,b, 0,0,0,0 0,0,0,0, 0,0,0,0 b,0,0,0, 0,0,0,0 0,0,0,0, 0,0,0,0, 0,0,0,1, 0,0,0,0 R2 2 βˆ’2βˆ—3 0,1,0,0, 0,0,0,0, 0,1,0,0, 0,1,0,0 0,0,0,0, 0,c,0,0 0,0,0,0, 5,0,0,0 0,8,0,0, 0,0,0,0, 0,8,0,0, 0,8,0,0 R3 2 βˆ’2 0,0,0,0, 0,0,0,0, 0,0,0,0, 0,0,0,2 0,0,0,0, 0,0,0,0 0,0,3,0, 0,0,0,0 0,0,0,0, 0,0,0,0, 0,0,0,0, 0,0,0,3 R4 2 βˆ’3βˆ—2 0,0,0,0, 0,0,3,0, 0,0,0,0, 0,0,3,0 0,0,0,3, 0,0,0,0 0,0,0,0, 0,0,9,0 0,0,0,0, 0,0,d,0, 0,0,0,0, 0,0,c,0 R5 2 βˆ’2βˆ—2 0,c,0,0, 0,0,0,0, 0,0,0,4, 0,0,0,0 0,0,0,0, 0,0,0,0 0,0,0,0, 2,0,0,0 0,2,0,0, 0,0,0,0, 0,0,0,2, 0,0,0,0 R6 2 βˆ’2 0,0,0,0, 0,2,0,0, 0,0,0,0, 0,0,0,0 0,0,0,0, 0,0,0,d 0,0,0,0, 0,1,0,0 0,0,0,0, 0,1,0,0, 0,0,0,0, 0,0,0,0 18 /24

  31. Evaluation of 𝒔 Rounds 𝑠 (new) 𝒒 πŸ‘ 𝒓 πŸ‘ 𝒒 πŸ‘ ෝ 𝒓 πŸ‘ ෝ 1+1 2 βˆ’16 2 βˆ’8.41 2 βˆ’2 2+1 … 2 βˆ’20 2 βˆ’2.79 2+2 … 2 βˆ’32 2 βˆ’5.69 2+3 … 2 βˆ’40 2 βˆ’10.56 2+4 2 βˆ’44 2 βˆ’29.91 2 βˆ’12.96 Experiments confirm the results of 𝑠 . 19 /24

  32. ΖΈ Summary of the results on SKINNY Prob. of BM dist. and comparison 𝑭 = ΰ·© 𝑭 𝟐 ∘ 𝑭 𝒏 ∘ ΰ·© 𝑭 𝒏 𝑭 𝟏 Ver. n π‘ž 2 ΰ·€ π‘ž 2 ො π‘Ÿ 2 [LGS17] π‘Ÿ 2 𝑠 | 𝑭 𝒏 | 𝑠 | 𝐹 | ΰ·€ 2 βˆ’12.96 2 βˆ’48.72 2 βˆ’29.78 64 6(13) 17 n-2n 2 βˆ’11.45 2 βˆ’103.84 2 βˆ’77.83 128 5(12) 18 2 βˆ’10.50 2 βˆ’54.94 2 βˆ’42.98 64 5(17) 22 n-3n 2 βˆ’9.88 2 βˆ’76.84 2 βˆ’48.30 128 5(17) 22 Take seconds to calculate 𝑠 β€’ 20 /24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend