. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
Cryptanalysis of LAC
Gaëtan Leurent
Inria, France
DIAC 2014
- G. Leurent (Inria)
Cryptanalysis of LAC DIAC 2014 1 / 9
Cryptanalysis of LAC G. Leurent (Inria) Cryptanalysis of LAC DIAC - - PowerPoint PPT Presentation
Description of LAC Differentials and Characteristics Forgery attack Cryptanalysis of LAC G. Leurent (Inria) Cryptanalysis of LAC DIAC 2014 1 / 9 . . . . . . . . Gatan Leurent Inria, France DIAC 2014 2 / 9 Description of LAC DIAC
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
Cryptanalysis of LAC DIAC 2014 1 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Lei Zhang, Wenling Wu, Yanfeng Wang, Shengbao Wu, Jian Zhang
▶ G based on modified LBlock. ▶ 80bit key, 64bit state, 48bit leak
Cryptanalysis of LAC DIAC 2014 2 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
Cryptanalysis of LAC DIAC 2014 2 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
2
▶ Key addition ▶ Nibble Sbox ▶ Nibble permutation
▶ 35 active Sboxes ▶ Proba ≤ 2−70
Cryptanalysis of LAC DIAC 2014 3 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
2
2
2
2
2
2
2
2
Cryptanalysis of LAC DIAC 2014 4 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
2
2
2
2
2
2
2
2
Cryptanalysis of LAC DIAC 2014 4 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Modifying one step leads to significantly different characteristics
▶ Given a truncated characteristics, there are many instantiated
Cryptanalysis of LAC DIAC 2014 5 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Modifying one step leads to significantly different characteristics
▶ Given a truncated characteristics, there are many instantiated
Cryptanalysis of LAC DIAC 2014 5 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
Cryptanalysis of LAC DIAC 2014 6 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Di is the first i rounds of D
▶ Pr D ∶ 𝛽 𝛾 ≤ Pr 𝛽 𝛾
Cryptanalysis of LAC DIAC 2014 7 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Di is the first i rounds of D
▶ Pr D ∶ 𝛽 𝛾 ≤ Pr 𝛽 𝛾
Cryptanalysis of LAC DIAC 2014 7 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Di is the first i rounds of D
▶ Pr D ∶ 𝛽 𝛾 ≤ Pr 𝛽 𝛾
Cryptanalysis of LAC DIAC 2014 7 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Di is the first i rounds of D
▶ Pr D ∶ 𝛽 𝛾 ≤ Pr 𝛽 𝛾
Cryptanalysis of LAC DIAC 2014 7 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Di is the first i rounds of D
▶ Pr D ∶ 𝛽 𝛾 ≤ Pr 𝛽 𝛾
Cryptanalysis of LAC DIAC 2014 7 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Di is the first i rounds of D
▶ Pr D ∶ 𝛽 𝛾 ≤ Pr 𝛽 𝛾
Cryptanalysis of LAC DIAC 2014 7 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
2
2
2
2
▶ Storage 224
▶ At most 29 transitions ▶ Time 237
Cryptanalysis of LAC DIAC 2014 8 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Corresponding plaintext: m1 ⊕ 𝛽 ‖ m2 ⊕ 𝛾,
Cryptanalysis of LAC DIAC 2014 9 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Corresponding plaintext: m1 ⊕ 𝛽 ‖ m2 ⊕ 𝛾,
Cryptanalysis of LAC DIAC 2014 9 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Corresponding plaintext: m1 ⊕ 𝛽 ‖ m2 ⊕ 𝛾,
Cryptanalysis of LAC DIAC 2014 9 / 9
. . . Description of LAC . . . . Differentials and Characteristics . Forgery attack
▶ Can use several differentials (17512 in this class) ▶ Design limited to 240 data
Cryptanalysis of LAC DIAC 2014 9 / 9
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 1 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Encryption key ki; ▶ Constants qi; ▶ Public nonce ni; ▶ Secret nonce si; ▶ Block counter bi; ▶ Extra parameters pi;
Cryptanalysis of Wheesht DIAC 2014 2 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 3 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Using 271 data time
▶ Using 2197 data, 2192 time
▶ Using 210 data, 2200 time
Cryptanalysis of Wheesht DIAC 2014 4 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Using 271 data time
▶ Using 2197 data, 2192 time
▶ Using 210 data, 2200 time
Cryptanalysis of Wheesht DIAC 2014 5 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 6 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 6 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Behave like random functions
Cryptanalysis of Wheesht DIAC 2014 7 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 8 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Using 271 data time
▶ Using 2197 data, 2192 time
▶ Using 210 data, 2200 time
Cryptanalysis of Wheesht DIAC 2014 9 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 10 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 10 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Evaluate g with 2192 random states offline ▶ Evaluate online with 2192 different messages
Cryptanalysis of Wheesht DIAC 2014 11 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Using 271 data time
▶ Using 2197 data, 2192 time
▶ Using 210 data, 2200 time
Cryptanalysis of Wheesht DIAC 2014 12 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
Cryptanalysis of Wheesht DIAC 2014 13 / 13
Wheesht design Distinguisher Key recovery Improved key recovery
▶ Expect single k1, k3 candidate with 256 blocks, time 2200
Cryptanalysis of Wheesht DIAC 2014 13 / 13