Cryptanalysis of Low-Data Instances of Full LowMCv2 Christian - - PowerPoint PPT Presentation

cryptanalysis of low data instances of full lowmcv2
SMART_READER_LITE
LIVE PREVIEW

Cryptanalysis of Low-Data Instances of Full LowMCv2 Christian - - PowerPoint PPT Presentation

Cryptanalysis of Low-Data Instances of Full LowMCv2 Christian Rechberger 1 Hadi Soleimany 2 Tyge Tiessen 3 1 Graz University of Technology, Austria 2 Shahid Beheshti University, Iran 3 Technical University of Denmark, Denmark FSE 2019, Paris,


slide-1
SLIDE 1

Cryptanalysis of Low-Data Instances of Full LowMCv2

Christian Rechberger1 Hadi Soleimany 2 Tyge Tiessen3

1Graz University of Technology, Austria 2Shahid Beheshti University, Iran 3Technical University of Denmark, Denmark

FSE 2019, Paris, France

1 / 14

slide-2
SLIDE 2

Outline

Introduction LowMC Description Related Work New Technique Overview of the Technique Proposed Framework Key Recovery Simplified Representation of LowMC Impact on Applications of LowMC Conclusion

2 / 14

slide-3
SLIDE 3

Introduction LowMC Description Related Work New Technique Overview of the Technique Proposed Framework Key Recovery Simplified Representation of LowMC Impact on Applications of LowMC Conclusion

3 / 14

slide-4
SLIDE 4

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

3 / 14

slide-5
SLIDE 5

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

◮ Implementation properties are comlex, but linear operations

come often almost for free whereas the bottleneck are nonlinear operations.

3 / 14

slide-6
SLIDE 6

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

◮ Implementation properties are comlex, but linear operations

come often almost for free whereas the bottleneck are nonlinear operations.

◮ Multi-party computation (MPC) 3 / 14

slide-7
SLIDE 7

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

◮ Implementation properties are comlex, but linear operations

come often almost for free whereas the bottleneck are nonlinear operations.

◮ Multi-party computation (MPC) ◮ Fully homomorphic encryption (FHE) 3 / 14

slide-8
SLIDE 8

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

◮ Implementation properties are comlex, but linear operations

come often almost for free whereas the bottleneck are nonlinear operations.

◮ Multi-party computation (MPC) ◮ Fully homomorphic encryption (FHE) ◮ Zero-knowledge proof systems like SNARKs or STARKs 3 / 14

slide-9
SLIDE 9

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

◮ Implementation properties are comlex, but linear operations

come often almost for free whereas the bottleneck are nonlinear operations.

◮ Multi-party computation (MPC) ◮ Fully homomorphic encryption (FHE) ◮ Zero-knowledge proof systems like SNARKs or STARKs ◮ Quantum-resilient public-key signature 3 / 14

slide-10
SLIDE 10

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

◮ Implementation properties are comlex, but linear operations

come often almost for free whereas the bottleneck are nonlinear operations.

◮ Multi-party computation (MPC) ◮ Fully homomorphic encryption (FHE) ◮ Zero-knowledge proof systems like SNARKs or STARKs ◮ Quantum-resilient public-key signature

◮ A main goal in the design of suitable

ciphers/permutations/hash functions is to minimize the number of multiplications.

3 / 14

slide-11
SLIDE 11

New Designs for New Applications

◮ Some design choices that were sensible for classical

applications are suboptimal for a range of new applications.

◮ Implementation properties are comlex, but linear operations

come often almost for free whereas the bottleneck are nonlinear operations.

◮ Multi-party computation (MPC) ◮ Fully homomorphic encryption (FHE) ◮ Zero-knowledge proof systems like SNARKs or STARKs ◮ Quantum-resilient public-key signature

◮ A main goal in the design of suitable

ciphers/permutations/hash functions is to minimize the number of multiplications.

◮ Examples of such designs include LowMC, Kreyvium, Flip,

MiMC and Rasta.

3 / 14

slide-12
SLIDE 12

LowMC Description

◮ First design proposed at Eurocrypt 2015 [Albrecht et al. 15].

4 / 14

slide-13
SLIDE 13

LowMC Description

◮ First design proposed at Eurocrypt 2015 [Albrecht et al. 15]. ◮ Allows to create suitable instances for a wide range of

applications, e.g. used for a signature scheme currently under consideration in round 2 of the NIST PQ process.

4 / 14

slide-14
SLIDE 14

LowMC Description

◮ First design proposed at Eurocrypt 2015 [Albrecht et al. 15]. ◮ Allows to create suitable instances for a wide range of

applications, e.g. used for a signature scheme currently under consideration in round 2 of the NIST PQ process.

◮ Round function:

4 / 14

slide-15
SLIDE 15

LowMC Description

◮ First design proposed at Eurocrypt 2015 [Albrecht et al. 15]. ◮ Allows to create suitable instances for a wide range of

applications, e.g. used for a signature scheme currently under consideration in round 2 of the NIST PQ process.

◮ Round function:

◮ Using partial non-linear layers 4 / 14

slide-16
SLIDE 16

LowMC Description

◮ First design proposed at Eurocrypt 2015 [Albrecht et al. 15]. ◮ Allows to create suitable instances for a wide range of

applications, e.g. used for a signature scheme currently under consideration in round 2 of the NIST PQ process.

◮ Round function:

◮ Using partial non-linear layers ◮ Using 3 × 3 Sbox with algebraic degree 2. 4 / 14

slide-17
SLIDE 17

LowMC Description

◮ First design proposed at Eurocrypt 2015 [Albrecht et al. 15]. ◮ Allows to create suitable instances for a wide range of

applications, e.g. used for a signature scheme currently under consideration in round 2 of the NIST PQ process.

◮ Round function:

◮ Using partial non-linear layers ◮ Using 3 × 3 Sbox with algebraic degree 2. ◮ Linear layers are binary invertible matrices that are chosen

independently and uniformly at random.

4 / 14

slide-18
SLIDE 18

LowMC Description

◮ First design proposed at Eurocrypt 2015 [Albrecht et al. 15]. ◮ Allows to create suitable instances for a wide range of

applications, e.g. used for a signature scheme currently under consideration in round 2 of the NIST PQ process.

◮ Round function:

◮ Using partial non-linear layers ◮ Using 3 × 3 Sbox with algebraic degree 2. ◮ Linear layers are binary invertible matrices that are chosen

independently and uniformly at random.

◮ Round key is generated by a randomly chosen multiplication of

a full-rank b × k with the master key.

4 / 14

slide-19
SLIDE 19

LowMC Cryptanalysis and Impact

◮ 2012-2015: Authors provide analysis with a large variety of

  • techniques. Given block size (b), allowable data complexity

D, and number of Sboxes per round (m), a ’v0 round formular’ (r) is provided to allows to create instances for any desired security level.

5 / 14

slide-20
SLIDE 20

LowMC Cryptanalysis and Impact

◮ 2012-2015: Authors provide analysis with a large variety of

  • techniques. Given block size (b), allowable data complexity

D, and number of Sboxes per round (m), a ’v0 round formular’ (r) is provided to allows to create instances for any desired security level.

◮ Observations by Khovratovich, Leurent led to v1 (Eurocrypt

2015)

5 / 14

slide-21
SLIDE 21

LowMC Cryptanalysis and Impact

◮ 2012-2015: Authors provide analysis with a large variety of

  • techniques. Given block size (b), allowable data complexity

D, and number of Sboxes per round (m), a ’v0 round formular’ (r) is provided to allows to create instances for any desired security level.

◮ Observations by Khovratovich, Leurent led to v1 (Eurocrypt

2015)

◮ Attacks by Dobraunig, Eichlseder and Mendel, and Dinur, Liu,

Meier and Wang led to v2 (eprint 2016).

5 / 14

slide-22
SLIDE 22

LowMC Cryptanalysis and Impact

◮ 2012-2015: Authors provide analysis with a large variety of

  • techniques. Given block size (b), allowable data complexity

D, and number of Sboxes per round (m), a ’v0 round formular’ (r) is provided to allows to create instances for any desired security level.

◮ Observations by Khovratovich, Leurent led to v1 (Eurocrypt

2015)

◮ Attacks by Dobraunig, Eichlseder and Mendel, and Dinur, Liu,

Meier and Wang led to v2 (eprint 2016).

◮ Our new cryptanalysis led to v3 (github 2017).

5 / 14

slide-23
SLIDE 23

LowMC Cryptanalysis and Impact

◮ 2012-2015: Authors provide analysis with a large variety of

  • techniques. Given block size (b), allowable data complexity

D, and number of Sboxes per round (m), a ’v0 round formular’ (r) is provided to allows to create instances for any desired security level.

◮ Observations by Khovratovich, Leurent led to v1 (Eurocrypt

2015)

◮ Attacks by Dobraunig, Eichlseder and Mendel, and Dinur, Liu,

Meier and Wang led to v2 (eprint 2016).

◮ Our new cryptanalysis led to v3 (github 2017).

LowMCv3 is used in all applications we are aware of, e.g Picnic signature scheme (Zaverucha et al., CCS 2017), group signature schemes (Boneh et al., Derler et al.), or a protype Signal ’plugin’ for private contact discovery.

5 / 14

slide-24
SLIDE 24

Overview of Previous Techniques

◮ Meet-in-the-middle cryptanalysis requires extremely limited

data and it is almost independent of inner components.

6 / 14

slide-25
SLIDE 25

Overview of Previous Techniques

◮ Meet-in-the-middle cryptanalysis requires extremely limited

data and it is almost independent of inner components.

◮ But it is applicable to the ciphers with weak key schedule. 6 / 14

slide-26
SLIDE 26

Overview of Previous Techniques

◮ Meet-in-the-middle cryptanalysis requires extremely limited

data and it is almost independent of inner components.

◮ But it is applicable to the ciphers with weak key schedule.

◮ Differential cryptanalysis is usually applicable on any round

functions [Biham Shamir 90].

6 / 14

slide-27
SLIDE 27

Overview of Previous Techniques

◮ Meet-in-the-middle cryptanalysis requires extremely limited

data and it is almost independent of inner components.

◮ But it is applicable to the ciphers with weak key schedule.

◮ Differential cryptanalysis is usually applicable on any round

functions [Biham Shamir 90].

◮ But there exists a lower bound for active S-boxes, since it is a

well-known cryptanalysis.

6 / 14

slide-28
SLIDE 28

Overview of Previous Techniques

◮ Meet-in-the-middle cryptanalysis requires extremely limited

data and it is almost independent of inner components.

◮ But it is applicable to the ciphers with weak key schedule.

◮ Differential cryptanalysis is usually applicable on any round

functions [Biham Shamir 90].

◮ But there exists a lower bound for active S-boxes, since it is a

well-known cryptanalysis.

◮ Truncated differential MITM cryptanalysis take advantage of

positive properties in both methods. [Demirci et al. 09]

6 / 14

slide-29
SLIDE 29

Overview of Previous Techniques

◮ Meet-in-the-middle cryptanalysis requires extremely limited

data and it is almost independent of inner components.

◮ But it is applicable to the ciphers with weak key schedule.

◮ Differential cryptanalysis is usually applicable on any round

functions [Biham Shamir 90].

◮ But there exists a lower bound for active S-boxes, since it is a

well-known cryptanalysis.

◮ Truncated differential MITM cryptanalysis take advantage of

positive properties in both methods. [Demirci et al. 09]

◮ But it strongly depends on the properties of the linear layer. 6 / 14

slide-30
SLIDE 30

Overview of Previous Techniques

◮ Meet-in-the-middle cryptanalysis requires extremely limited

data and it is almost independent of inner components.

◮ But it is applicable to the ciphers with weak key schedule.

◮ Differential cryptanalysis is usually applicable on any round

functions [Biham Shamir 90].

◮ But there exists a lower bound for active S-boxes, since it is a

well-known cryptanalysis.

◮ Truncated differential MITM cryptanalysis take advantage of

positive properties in both methods. [Demirci et al. 09]

◮ But it strongly depends on the properties of the linear layer.

This Work

Exploit previous ideas to take advantage of the positive properties and overcome the limitations!

6 / 14

slide-31
SLIDE 31

Introduction LowMC Description Related Work New Technique Overview of the Technique Proposed Framework Key Recovery Simplified Representation of LowMC Impact on Applications of LowMC Conclusion

7 / 14

slide-32
SLIDE 32

Overview of the Technique

◮ Divide the cipher into three consecutive parts r1, r2 and r3.

Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r

7 / 14

slide-33
SLIDE 33

Overview of the Technique

◮ Divide the cipher into three consecutive parts r1, r2 and r3. ◮ Select an input difference ∆in so that the output difference

after r1 rounds can be determined with a probability of one.

Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r

∆in ∆r1 Pr[∆in → ∆r1] = 1

7 / 14

slide-34
SLIDE 34

Overview of the Technique

◮ Divide the cipher into three consecutive parts r1, r2 and r3. ◮ Select an input difference ∆in so that the output difference

after r1 rounds can be determined with a probability of one.

◮ Ask oracle to provide the corresponding ciphertexts of

P, P′ = P ⊕ ∆in.

Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r

∆in ∆r1 Pr[∆in → ∆r1] = 1

7 / 14

slide-35
SLIDE 35

Overview of the Technique

◮ Divide the cipher into three consecutive parts r1, r2 and r3. ◮ Select an input difference ∆in so that the output difference

after r1 rounds can be determined with a probability of one.

◮ Ask oracle to provide the corresponding ciphertexts of

P, P′ = P ⊕ ∆in.

◮ Create a list of all reachable output differences after r2 rounds.

Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r

∆in ∆r1 Pr[∆in → ∆r1] = 1 ∆r1+r2

7 / 14

slide-36
SLIDE 36

Overview of the Technique

◮ Divide the cipher into three consecutive parts r1, r2 and r3. ◮ Select an input difference ∆in so that the output difference

after r1 rounds can be determined with a probability of one.

◮ Ask oracle to provide the corresponding ciphertexts of

P, P′ = P ⊕ ∆in.

◮ Create a list of all reachable output differences after r2 rounds. ◮ Create a list of all reachable differences over the last r3 rounds.

Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r

∆in ∆r1 Pr[∆in → ∆r1] = 1 ∆r1+r2 ∆r

7 / 14

slide-37
SLIDE 37

Overview of the Technique

◮ Divide the cipher into three consecutive parts r1, r2 and r3. ◮ Select an input difference ∆in so that the output difference

after r1 rounds can be determined with a probability of one.

◮ Ask oracle to provide the corresponding ciphertexts of

P, P′ = P ⊕ ∆in.

◮ Create a list of all reachable output differences after r2 rounds. ◮ Create a list of all reachable differences over the last r3 rounds. ◮ If these lists are significantly smaller than the set of all possible

  • utput differences, we can obtain the difference in the middle.

Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r

∆in ∆r1 Pr[∆in → ∆r1] = 1 ∆r1+r2 ∆r Meet-in-the-middle

7 / 14

slide-38
SLIDE 38

Overview of the Technique

◮ Divide the cipher into three consecutive parts r1, r2 and r3. ◮ Select an input difference ∆in so that the output difference

after r1 rounds can be determined with a probability of one.

◮ Ask oracle to provide the corresponding ciphertexts of

P, P′ = P ⊕ ∆in.

◮ Create a list of all reachable output differences after r2 rounds. ◮ Create a list of all reachable differences over the last r3 rounds. ◮ If these lists are significantly smaller than the set of all possible

  • utput differences, we can obtain the difference in the middle.

◮ Repeat the procedure to find all intermediate differences.

Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r Rounds

1 to r1

Rounds r1 + 1 to r1 + r2 Rounds r1 + r2 + 1 to r

∆in ∆r1 Pr[∆in → ∆r1] = 1 ∆r1+r2 ∆r Meet-in-the-middle

7 / 14

slide-39
SLIDE 39

First Part

◮ To have deterministic differential characteristic, all Sboxes

should be passive.

8 / 14

slide-40
SLIDE 40

First Part

◮ To have deterministic differential characteristic, all Sboxes

should be passive.

Deterministic Differential Characteristic

On average for LowMC, there exist 2b−3.m.R deterministic differential characteristics over R rounds, i.e. |{∆in ∈ Fb

2| Pr[∆in → LR ◦ · · · ◦ L1(∆in)] = 1}| = 2b−3.m.R.

8 / 14

slide-41
SLIDE 41

First Part

◮ To have deterministic differential characteristic, all Sboxes

should be passive.

Deterministic Differential Characteristic

On average for LowMC, there exist 2b−3.m.R deterministic differential characteristics over R rounds, i.e. |{∆in ∈ Fb

2| Pr[∆in → LR ◦ · · · ◦ L1(∆in)] = 1}| = 2b−3.m.R. ◮ We can cover r1 =

  • b

3·m

  • − 1 rounds.

8 / 14

slide-42
SLIDE 42

Estimating the Number of Reachable Differences

Possible of differences for one Sbox

For a bijective 3-bit Sbox each non-zero difference ∆in ∈ F3

2 can

transfer to at most 22 different differences.

9 / 14

slide-43
SLIDE 43

Estimating the Number of Reachable Differences

Possible of differences for one Sbox

For a bijective 3-bit Sbox each non-zero difference ∆in ∈ F3

2 can

transfer to at most 22 different differences.

Number of Differences

The number of possible differences in the output of the R-th round

  • f LowMC is almost 22.(m.R), i.e.

|{∆′|Pr[∆ → ∆′] > 0}| = 22.(m.R).

9 / 14

slide-44
SLIDE 44

Estimating the Number of Reachable Differences

Possible of differences for one Sbox

For a bijective 3-bit Sbox each non-zero difference ∆in ∈ F3

2 can

transfer to at most 22 different differences.

Number of Differences

The number of possible differences in the output of the R-th round

  • f LowMC is almost 22.(m.R), i.e.

|{∆′|Pr[∆ → ∆′] > 0}| = 22.(m.R).

Time complexity

22·m·r2 + 22·m·r3 < 2k

9 / 14

slide-45
SLIDE 45

Estimating the Number of Reachable Differences

Possible of differences for one Sbox

For a bijective 3-bit Sbox each non-zero difference ∆in ∈ F3

2 can

transfer to at most 22 different differences.

Number of Differences

The number of possible differences in the output of the R-th round

  • f LowMC is almost 22.(m.R), i.e.

|{∆′|Pr[∆ → ∆′] > 0}| = 22.(m.R).

Time complexity

22·m·r2 + 22·m·r3 < 2k

To Avoid Wrong Collision

22·m·(r2+r3) < 2b → r2 + r3 < b 2 · m

9 / 14

slide-46
SLIDE 46

Estimating the Number of Reachable Differences

Possible of differences for one Sbox

For a bijective 3-bit Sbox each non-zero difference ∆in ∈ F3

2 can

transfer to at most 22 different differences.

Number of Differences

The number of possible differences in the output of the R-th round

  • f LowMC is almost 22.(m.R), i.e.

|{∆′|Pr[∆ → ∆′] > 0}| = 22.(m.R).

Time complexity

22·m·r2 + 22·m·r3 < 2k

To Avoid Wrong Collision

22·m·(r2+r3) < 2b → r2 + r3 < b 2 · m

◮ How can we overcome this limitation?

9 / 14

slide-47
SLIDE 47

From Differential to Polytopic

d-differences

A d-difference is the ordered tuple of the respective differences, i.e., (x1 ⊕ x0, . . . , xd ⊕ x0). [Tiessen 14]

10 / 14

slide-48
SLIDE 48

From Differential to Polytopic

d-differences

A d-difference is the ordered tuple of the respective differences, i.e., (x1 ⊕ x0, . . . , xd ⊕ x0). [Tiessen 14]

Possible of d differences for one Sbox

The number of reachable d-differences over the 3-bit S-box for a non-zero input d-difference is at most 23.

10 / 14

slide-49
SLIDE 49

From Differential to Polytopic

d-differences

A d-difference is the ordered tuple of the respective differences, i.e., (x1 ⊕ x0, . . . , xd ⊕ x0). [Tiessen 14]

Possible of d differences for one Sbox

The number of reachable d-differences over the 3-bit S-box for a non-zero input d-difference is at most 23.

Estimating the Number of Reachable Differences

Simple upper bound on the number of reachable d-differences after r rounds is 23·m·r.

10 / 14

slide-50
SLIDE 50

From Differential to Polytopic

d-differences

A d-difference is the ordered tuple of the respective differences, i.e., (x1 ⊕ x0, . . . , xd ⊕ x0). [Tiessen 14]

Possible of d differences for one Sbox

The number of reachable d-differences over the 3-bit S-box for a non-zero input d-difference is at most 23.

Estimating the Number of Reachable Differences

Simple upper bound on the number of reachable d-differences after r rounds is 23·m·r.

Condition to Avoid Wrong Collision

23·m·(r2+r3) < 2b·d → d > 3 · m · (r2 + r3) b

10 / 14

slide-51
SLIDE 51

Introduction LowMC Description Related Work New Technique Overview of the Technique Proposed Framework Key Recovery Simplified Representation of LowMC Impact on Applications of LowMC Conclusion

11 / 14

slide-52
SLIDE 52

Key Recovery

Definition

An Sbox S : {0, 1}n → {0, 1}n is called to be differentially δ-uniform if for any (α, β) ∈ (Fn

2 × Fn 2), we have:

|{x ∈ {0, 1}n : β = S(x) ⊕ S(x ⊕ α)| ≤ δ

11 / 14

slide-53
SLIDE 53

Key Recovery

Definition

An Sbox S : {0, 1}n → {0, 1}n is called to be differentially δ-uniform if for any (α, β) ∈ (Fn

2 × Fn 2), we have:

|{x ∈ {0, 1}n : β = S(x) ⊕ S(x ⊕ α)| ≤ δ

Key candidates

We expect to have at most 2m.x solutions for the quadratic (X I

r , X

′I

r , X S r , , X

′S

r ), since each Sbox is differentially 2x-uniform.

Each solution uniquely suggests a candidate for the round key skr as follows: C ⊕ skr = X L

r = L(X S r ) → skr = C ⊕ L(X S r )

11 / 14

slide-54
SLIDE 54

Equivalent representation with Equivalent Round Keys

Key Addition S Affine layer Key Addition S Affine layer Key Addition ⇒ 12 / 14

slide-55
SLIDE 55

Equivalent representation with Equivalent Round Keys

Key Addition S Affine layer Key Addition S Affine layer Key Addition ⇒ Key Addition S Affine layer Key Addition S Key Addition Affine layer ⇒ 12 / 14

slide-56
SLIDE 56

Equivalent representation with Equivalent Round Keys

Key Addition S Affine layer Key Addition S Affine layer Key Addition ⇒ Key Addition S Affine layer Key Addition S Key Addition Affine layer ⇒ Key Addition S Affine layer Key Addition S Key A. Affine layer ⇒ 12 / 14

slide-57
SLIDE 57

Equivalent representation with Equivalent Round Keys

Key Addition S Affine layer Key Addition S Affine layer Key Addition ⇒ Key Addition S Affine layer Key Addition S Key Addition Affine layer ⇒ Key Addition S Affine layer Key Addition S Key A. Affine layer ⇒ Key Addition S Key A. Affine layer S Key A. Affine layer 12 / 14

slide-58
SLIDE 58

Results

Cipher Specification Attack Details Block S-boxes Data Key Rounds Dimension r0 r1 r2 Time Complexity Data n m D k r d ⌊ n−log2 d

3·m

⌋ ⌊ r−r0

2 ⌋

⌈ r−r0

2 ⌉

2 · (δr1

d + δr2 d )

2(d + 1) 128 1 16 256 158 4 41 58 58 2164.9 10 128 5 16 256 37 4 8 14 15 2212.75 10 256 1 8 256 243 2 85 79 79 2223 6 256 5 8 256 53 2 17 18 18 2254.9 6 512 1 8 256 413 1 170 121 121 2226.6 4 1024 1 8 512 758 1 341 208 209 2389.9 4

◮ Several low-data instances of LowMCv2 can be broken

significantly faster than exhaustive search.

◮ The type of instance that is vulnerable (few Sboxes per

round) are used e.g. in post-quantum signature schemes.

13 / 14

slide-59
SLIDE 59

Introduction LowMC Description Related Work New Technique Overview of the Technique Proposed Framework Key Recovery Simplified Representation of LowMC Impact on Applications of LowMC Conclusion

14 / 14

slide-60
SLIDE 60

Conclusions

◮ New representation for the block ciphers with partial

non-linear layer.

14 / 14

slide-61
SLIDE 61

Conclusions

◮ New representation for the block ciphers with partial

non-linear layer.

◮ A new insight into the security evaluation of block ciphers

with a partial non-linear layer by presenting a new cryptanalytic technique.

14 / 14

slide-62
SLIDE 62

Conclusions

◮ New representation for the block ciphers with partial

non-linear layer.

◮ A new insight into the security evaluation of block ciphers

with a partial non-linear layer by presenting a new cryptanalytic technique.

◮ Best results for some versions of LowMC. Led to a new round

’formula’ v3.

14 / 14