Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP
Ling Song, Jian Guo FSE 2019 @ Paris, France
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 1 / 27
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP - - PowerPoint PPT Presentation
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP Ling Song , Jian Guo FSE 2019 @ Paris, France Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 1 / 27 Outlines 1 Keccak and its Relatives 2
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 1 / 27
1
2
3
4
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 2 / 27
Keccak and its Relatives
1
2
3
4
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 3 / 27
Keccak and its Relatives
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 3 / 27
Keccak and its Relatives
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 4 / 27
Keccak and its Relatives
∗ In the Ketje mode.
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 5 / 27
Keccak and its Relatives
b 25-bit lanes, A[x, y]
http://www.iacr.org/authors/tikz/ Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 6 / 27
Keccak and its Relatives
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 7 / 27
Keccak and its Relatives
http://keccak.noekeon.org/
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 8 / 27
Keccak and its Relatives
http://keccak.noekeon.org/
0,4 0,3 0,2 0,1 0,0 1,4 1,3 1,2 1,1 1,0 2,4 2,3 2,2 2,1 2,0 3,4 3,3 3,2 3,1 3,0 4,4 4,3 4,2 4,1 4,0
π
0,0 0,1 0,2 0,3 0,4 1,0 1,1 1,2 1,3 1,4 2,0 2,1 2,2 2,3 2,4 3,0 3,1 3,2 3,3 3,4 4,0 4,1 4,2 4,3 4,4
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 9 / 27
Keccak and its Relatives
x0 x1 x2 x3 x4 y0 y1 y2 y3 y4
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 10 / 27
Keccak and its Relatives
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 11 / 27
Keccak and its Relatives
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 12 / 27
Keccak and its Relatives
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 13 / 27
Keccak and its Relatives
f0 pad K||Nonce σi f1 Zi r ... ... pad σj f2 Zj r ... ... pad nstart nstep nstride
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 14 / 27
Cube-Attack-Like Crytanalysis
1
2
3
4
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 15 / 27
Cube-Attack-Like Crytanalysis
(vi1,...,vid)∈CI
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 15 / 27
Cube-Attack-Like Crytanalysis
SI = L′(ki1, ..., kini), ni < n
1
2
3
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 16 / 27
Cube-Attack-Like Crytanalysis
1
2
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 17 / 27
MILP Model for Searching Cubes
1
2
3
4
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 18 / 27
MILP Model for Searching Cubes
k k c c a
θ ρ, π
i i
1
2
3
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 18 / 27
MILP Model for Searching Cubes
k k c c a
θ ρ, π
i i
1
2
3
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 18 / 27
MILP Model for Searching Cubes
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 19 / 27
MILP Model for Searching Cubes
θ
π◦ρ
θ
π◦ρ
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 20 / 27
MILP Model for Searching Cubes
Cube vars (A[x][y]) ? ? ? ? ? ? ? ? ? ? ? 0 Activeness of column sums: G[x] Consumption of DF: D[x] ? ? ? ? ? ? ? ? ? ? a[x][y] v1 v0 1
(1) a[x][3][z] = v0, a[x][4][z] = v0, then A[x][3][z] = A[x][4][z] = 1, G[x][z] = 0, D[x][z] = 1 (2) a[x][3][z] = v1, a[x][4][z] = v2, then A[x][3][z] = A[x][4][z] = 1, G[x][z] = 1, D[x][z] = 0
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 21 / 27
MILP Model for Searching Cubes
A[x][y0][z] A[x][y1][z] G[x][z] D[x][z] Inequalities A[x][y0][z] + A[x][y1][z] − G[x][z] − 2D[x][z] ≥ 0, −A[x][y1][z] + G[x][z] + D[x][z] ≥ 0, −A[x][y0][z] + G[x][z] + D[x][z] ≥ 0. 1 1 1 1 1 1 1 1 1 1
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 22 / 27
MILP Model for Searching Cubes
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 23 / 27
MILP Model for Searching Cubes
Key vars (W [x][y]) 1 1 1 1 1 1 1 1 1 1 1 1 ? ? ? ? ? ? ? ? ? ? ? 0
Key vars in column sums: X[x] ? ? ? ? ? a[x][y]
k0+k1
k1 k0
a[x][1][z] = k0, a[x][2][z] = k1, a[x][3][z] = k0 + k1,then W[x][3][z] = 1, X[x][z] = 0
x,z,3≤y<5 W[x][y][z] + ∑ z W[4][2][z].
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 24 / 27
MILP Model for Searching Cubes
θ
π◦ρ
θ
π◦ρ
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 25 / 27
Main Results
1
2
3
4
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 26 / 27
Main Results
∗ In the Ketje mode.
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 26 / 27
Main Results
1
2
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 27 / 27
Main Results
1
2
Song, Guo Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP FSE 2019 27 / 27