Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round - - PowerPoint PPT Presentation

chosen key distinguishers on 12 round feistel sp and 11
SMART_READER_LITE
LIVE PREVIEW

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round - - PowerPoint PPT Presentation

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes Xiaoyang Dong and Xiaoyun Wang Shandong University, Tsinghua University FSE 2017 Tokyo, Japan Outline 2 Secret-key and Open-key Models u


slide-1
SLIDE 1

Xiaoyang Dong and Xiaoyun Wang

Chosen-Key Distinguishers on 12-Round Feistel-SP and 11-Round Collision Attacks on Its Hashing Modes

Shandong University, Tsinghua University FSE 2017 Tokyo, Japan

slide-2
SLIDE 2

Outline

2

slide-3
SLIDE 3

Secret-key and Open-key Models

u Secret-key model

ü

the key is random and secret

ü

the attacker tries to recovery the key or distinguish from random permutation

u Open-key model

ü

known-key, the key is known to the attacker, proposed by Knudsen and Rijmen in ASIACRYPT 2007

ü

chosen-key, the key is under the control of the attacker

ü

the attacker tries to exhibit some non-ideal property of the primitive

3

slide-4
SLIDE 4

Previous works of chosen-key attacks

Full AES-256 Full Whirlpool CP func AES-like permutations 9-r AES-128 Feistel and SPN Generalized Feistel Feistel-SP and MMO MP Camellia Double SP-functions

4

u Biryukov et al [CRYPTO 2009] u Lamberger et al [ASIACRYPT 2009] u Gilbert and Peyrin [FSE 2010] u PA Fouque et al [CRYPTO 2013] u Nikolić et al [ICISC 2010] u Minier et al. [FSE 2011] u Sasaki and Yasuda [FSE 2011] u Sasaki et al [ACISP 2012] u Sasaki et al [INDOCRYPT 2012]

Known-key attacks

slide-5
SLIDE 5

Our attacks

5

u Knudsen and Rijmen (ASIACRYPT 2007)

ü

7-round Feistel Known-key Distinguisher

ü

7-round half-collision on hashing modes

u Sasaki and Yasuda (FSE 2011)

ü

11-round Feistel Known-key Distinguisher

ü

9-round full-collision on hashing modes

u Our works

ü

12-round Feistel Chosen-key Distinguisher

ü

11-round full-collision on hashing modes

Ø

Arbitrary Round Function

Ø

SP Round Function

slide-6
SLIDE 6

Classification of Feistels by Round Function

u Isobe and Shibutani [AC 2013] divide Feistels into three types u Feistel-3 is also called Feistel-SP

6

slide-7
SLIDE 7

Feistel-SP Round Functions

7

Permutation is assumed to be MDS: Maximum distance separable

slide-8
SLIDE 8

Known-key and Chosen-key Distinguisher

8

Sasaki and Yasuda's Known-key Distinguisher Randomly Key

Cipher

(P(1), F) (P(1), F) Our Chosen-key Distinguisher Some Special Key

Cipher

(P(1), F) (1, P(1))

Common: find such a pair for the Feistel

network faster than we do for a random permutation

slide-9
SLIDE 9

Basic Technique: Rebound Attack

u Rebound attack, proposed by Mendel et al.

u Find pairs meet certain truncated differential

u

Inbound phase: a MITM phase that generate pairs meet the truncated differential in Ein in low time

u

Outbound phase: pairs generated in Inbound propagate forward and backward to match the full path

u First of all, find a proper path

8

Ebw Ein Efw

  • utbound

inbound

  • utbound
slide-10
SLIDE 10

10

Sasaki and Yasuda’s work

5r Inbound

5 R 3 R 3 R

Outbound Phase Inbound Phase Outbound Phase 11r Known-key Distinguisher

slide-11
SLIDE 11

11

Our works

5r Inbound Find a 7r Inbound

slide-12
SLIDE 12

12

Our work

Only γ is unknwon

u The equation makes 7r inbound phase right u One must find γ to make it right

u

if we find it by traversing it, it costs 264

u Our Idea: suppose the underlined are equal, γ is find immediately u In fact, we only choose key to make the underlined equal partially, i.e.

u

Thus we tranverse only 2 bytes to get γ, cost 216

slide-13
SLIDE 13

13

Our works

Ø We get a 12r Chosen-key Distinguisher

3r Outbound phase 2r Outbound phase

slide-14
SLIDE 14

8

uApplication to Hashing Modes

slide-15
SLIDE 15

15

Merkle–Damgård Hash

slide-16
SLIDE 16

Hashing modes (PGV modes)

l apply to MMO-mode and Miyaguchi-Preneel modes l keys are the chaining value or IV

16

slide-17
SLIDE 17

17

Collision: Compression Function Cipher

Some Special Key

M  C 

11r Feistel-SP Cipher

slide-18
SLIDE 18

u Translate the collision of Compression Function to Hash

u Using two blocks to generate collision in H2 u Rebound attack is in the 2nd block

u Prepare all (H1,M1,M1'), H1 as key, that meet the truncated differential

u Randomly pick M0, compute H1, check H1

18

Collision: Hash Function

slide-19
SLIDE 19

19

计算7轮inbound的起点

slide-20
SLIDE 20

20

slide-21
SLIDE 21

u We replace the linear permutation of Camellia by block cipher

Khazad' MDS [BR00], called Camellia-MDS in following, to give an experiment

Experiment

21

slide-22
SLIDE 22

Find a pair has the following differential

22

P1 = (1f 17 7f 72 7a f5 37 53, 5f f4 d9 23 59 e0 e6 75) P2 = (8a b5 11 89 23 29 49 9f, a1 9e 90 58 02 e8 fa 25) key = (69 e4 4a 60 1e ea 50 20, 0a 3b 81 ae ad 3a 79 bc)

slide-23
SLIDE 23

23

slide-24
SLIDE 24

Thank you