cryptanalysis of
play

Cryptanalysis of Round-Reduced LED Ivica Nikoli, Lei Wang and Shuang - PowerPoint PPT Presentation

Cryptanalysis of Round-Reduced LED Ivica Nikoli, Lei Wang and Shuang Wu FSE 2013 Singapore March 11, 2013 1 Outline Backgrounds Specification Previous Analysis Slidex Attack Application Multicollision Application


  1. Cryptanalysis of Round-Reduced LED Ivica Nikolić, Lei Wang and Shuang Wu FSE 2013 Singapore March 11, 2013 1

  2. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 2

  3. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 3

  4. LED • Designed by Guo et al. at CHES 2011 • L ight E ncryption D evice  64-bit block  64- or 128-bit key (primarily) • Conservative security, e.g. concerning  Related-key attack  Distinguishers in hash function setting 4

  5. Specification (1/2) • Extremely simple key schedule  Denote the secret key as K  LED-64: K as each round key  LED-128: K=K 0 ||K 1 , then K 0 and K 1 as round keys alternatively K 0 K 1 K t … P C F 0 F 1 F t 5

  6. Specification (2/2) • LED-64: 8 steps; LED-128: 12 steps • Step functions  AES like  4 rounds and each round as below  Differ in round constants. 6

  7. Timeline of Previous Analysis • Guo et al. at CHES 2011  Distinguishers on 3.75/6.75-step LED-64/-128  Super-Sbox cryptanalysis • Isobe and Shibutani at ACISP 2012  Key recovery on 2/4-step LED-64/-128  Meet-in-the-middle cryptanalysis • Mendel et al. at ASIACRYPT 2012  Key recovery on 4-step LED-128  Related-key key recovery on 4/6-step LED-64/-128  Guess-then-recover, local collision, characteristics and differentials of step functions 7

  8. Security State of LED • The number of attacked steps Key Recovery Distinguisher Single-key Related-key LED-64 2 4 3.75 (8 steps) LED-128 4 6 6.75 (12 steps) 8

  9. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 9

  10. Security State of LED • The number of attacked steps Key Recovery Distinguisher Single-key Related-key LED-64 2 4 3.75 (8 steps) LED-128 4 6 6.75 (12 steps) 10

  11. Slidex Attack • Dunkelman et al. at EUROCRYPT 2012 • Known -plaintext attack • Wok for any public permutation E • Time*Data=2 n  K is n bits long K K P E C 11

  12. Application to 4-Step LED-128 • Guess K 0 K 0 K 0 F 0 F 3 P P' C C' • Recover K 1 E K 1 K 1 K 0 F 1 F 2 C' P' 12

  13. Comparison • Model  Ours: known -plaintext  Previous: chosen -plaintext • Complexity Data Time 2 16 2 112 IS12 2 64 2 96 MRT+12 2 32 2 96 Ours 13

  14. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 14

  15. A 2-Step Even-Mansour • K is n bits long • E 0 and E 1 are public permutations K K K E 0 E 1 P C 15

  16. A 2-Step Even-Mansour • K is n bits long • E 0 and E 1 are public permutations Can we recover K with a complexity less than 2 n ? K K K E 0 E 1 P C 16

  17. An Observation (1/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C K K K E 0 E 1 Y X P C 17

  18. An Observation (2/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C We recover X for some P, which gives us K immediately. K K K E 0 E 1 Y X P C 18

  19. An Observation (3/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C P = -1 (P C X) E 0 (X) E 1 X 19

  20. An Observation (4/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C P = -1 ( P C X) E 0 (X) E 1 X 20

  21. An Observation (5/7) • For a t-multicollision on P C, namely = … = = const P 1 C 1 P t C t we get P i = -1 (const X i ) E 0 (X i ) E 1 X i 21

  22. An Observation (6/7) • For a t-multicollision on P C, namely = … = = const P 1 C 1 P t C t we get P i = -1 (const X i ) E 0 (X i ) E 1 X i denoted as P i = G(X i ) 22

  23. An Observation (7/7) • For a t-multicollision on P C, namely = … = = const P 1 C 1 P t C t we recover a X i with a complexity 2 n /t  try 2 n /t random values as X, and match G(X) to {P 1 , P 2 , …, P t }. 23

  24. Application to 6-Step LED-128 • Guess K 0 K 0 K 0 F 0 F 5 C' P P' C • Recover K 1 E 0 E 1 K 1 K 1 K 1 K 0 K 0 F 1 F 2 F 3 F 4 P' C' 24

  25. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 25

  26. Differential vs Characteristic • Differential ∆ in ∆ out ? ? ? ? • Characteristic ∆ in ∆ out ∆ 1 ∆ 2 ∆ 3 ∆ 4  The characteristic probability on an active step function is upper bounded by 2 -50 . 26

  27. Differential on 2-step LED-64 • For a differential �∆ 1 , ∆ 2 ) → ∆ 3  what is the complexity of finding a solution (P, K)? ∆ 2 ∆ 2 ∆ 2 ∆ 3 ∆ 1 F 0 F 1 27

  28. Differential on 2-step LED-64 • Meet-in-the-middle approach  One solution with a birthday complexity • Differential multicollision distinguisher ∆ 2 ∆ 2 ∆ 2 ∆ 3 ∆ 1 F 0 F 1 28

  29. Extend to 4-Step LED-64 • Chosen differentials �∆, ∆� → ∆  Complexity of birthday bound to find a solution (P, K). ∆ ∆ ∆ ∆ ∆ ∆ ∆ F 0 F 1 F 2 F 3 prob=1 prob=1 29

  30. Application to 8-Step LED-128 • Set a random value to K 1 and ∆K 1 =0 K 1 G i F 2*i F 2*i+1 • Set ∆P=∆K 0 =∆, and find a solution �P, K 0 ) ∆ ∆ ∆ ∆ ∆ ∆ ∆ G 0 G 1 G 2 G 3 30

  31. Application to 8-Step LED-128 • Set a random value to K 1 and ∆K 1 =0 K 1 Exploit the freedom of both K 0 and K 1 G i F 2*i F 2*i+1 • Set ∆P=∆K 0 =∆, and find a solution �P, K 0 ) ∆ ∆ ∆ ∆ ∆ ∆ ∆ G 0 G 1 G 2 G 3 31

  32. Random-Difference Distinguisher • On a random difference ∆  Set ∆K 0 =∆, ∆K 1 =0, ∆P=∆ and ∆C=∆  The complexity of finding a solution?  Ideal case: 2 n (n=64) ∆K 0 = ∆ ∆K 1 = 0 LED-128 ∆P= ∆ ∆C= ∆ 32

  33. Distinguisher on 10 Steps • Difference propagation  Passive step function  Active step function ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ 33

  34. Attack Procedure (1/3) • Phase 1 : find solutions for differentials on F 2 and F 3 , and on F 6 and F 7 .  Exploit the freedom of K 1  At Phase 1, the value of K 1 is chosen. ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ 34

  35. Phase 1 • Find a set of (K 1 , X i , Y i )s such that  all K 1 s are equal  (K 1 , X i )s follows differential on F 2 and F 3  (K 1 , Y i )s follows differential on F 6 and F 7 ∆K 1 =0 ∆K 1 =0 ∆X=∆ ∆Y=∆ ∆ ∆ F 2 F 3 F 6 F 7 Find collision on K 1 35

  36. Attack Procedure (2/3) • Phase 2 : match a solution on F 2 and F 3 to a solution on F 6 and F 7  Exploit the freedom of K 0  At Phase 2, the value of K 0 is chosen. ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ 36

  37. Phase 2 • Similar with the key-recovery attack on single-key 1-step Even-Mansour  Utilize the set {(K 1 , X i , Y i )} from Phase 1. E K 0 K 0 K 1 F 4 F 5 X i Y i 37

  38. Attack Procedure (3/3) • Phase 3 : compute P to obtain a solution (P, K 0 , K 1 ). ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ Prob=1 Prob=1 38

  39. Distinguisher • The complexity of our attack is 2 60.3 , which is smaller than 2 64  10-step LED-128 is “ non- ideal” • Irrespective to the specification of step function. 39

  40. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 40

  41. Updated State of LED • The number of attacked steps Key Recovery Distinguisher Single-key Related-key LED-64 2 4 �.�� → � (8 steps) LED-128 � → � 6 �.�� → �� (12 steps) 41

  42. Thank you for your attention!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend