Outline C2 - description Attack scenarios Conclusion
Cryptanalysis of C2
Julia Borghoff, Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz CRYPTO 2009
1 / 19
Cryptanalysis of C2 Julia Borghoff , Lars R. Knudsen, Gregor Leander, - - PowerPoint PPT Presentation
Outline C2 - description Attack scenarios Conclusion Cryptanalysis of C2 Julia Borghoff , Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz CRYPTO 2009 1 / 19 Outline C2 - description Attack scenarios Conclusion C2 - description 1
Outline C2 - description Attack scenarios Conclusion
1 / 19
Outline C2 - description Attack scenarios Conclusion
2 / 19
Outline C2 - description Attack scenarios Conclusion
3 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
9 22 1
5 2
4 / 19
Outline C2 - description Attack scenarios Conclusion
4 / 19
Outline C2 - description Attack scenarios Conclusion
32
56
5 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
6 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
7 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
8 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
9 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
10 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
11 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
rk0 C
rk1 C rk2 C
X0 X1 X2 X3
rk3 C
GF(2)-linear function
GF(2)-linear function
GF(2)-linear function
GF(2)-linear function 12 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
12 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
9 22 1
5 2 12 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
9 22 1
5 2 12 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
rk0 C
9 22 rk1 C 9 22 rk2 C
X0 X1 X2 X3
rk3 C
F(X1 ⊕ (z1 ≪ 23)) F(X2 ⊕ (z2 ≪ 23))
GF(2)-linear function
GF(2)-linear function
1 5 2
1 5 2 12 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
12 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
13 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
14 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
15 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
E0 E0 E1 E1 E0 E0 E1 E1
16 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
17 / 19
Outline C2 - description Attack scenarios Conclusion The S-box recovery attack Key recovery attack Key and S-box recovery attack
18 / 19
Outline C2 - description Attack scenarios Conclusion
19 / 19
Outline C2 - description Attack scenarios Conclusion
19 / 19
Outline C2 - description Attack scenarios Conclusion
19 / 19