darxplorer
play

DARXplorer a Toolbox for Cryptanalysis and Cipher Designers Dennis - PowerPoint PPT Presentation

DARXplorer a Toolbox for Cryptanalysis and Cipher Designers Dennis Hoppe Bauhaus-University Weimar 22nd April 2009 Dennis Hoppe (BUW) DARXplorer 22nd April 2009 1 / 31 Agenda 1 Introduction to Hash Functions 2 The ThreeFish Block Cipher 3


  1. DARXplorer a Toolbox for Cryptanalysis and Cipher Designers Dennis Hoppe Bauhaus-University Weimar 22nd April 2009 Dennis Hoppe (BUW) DARXplorer 22nd April 2009 1 / 31

  2. Agenda 1 Introduction to Hash Functions 2 The ThreeFish Block Cipher 3 Differential Cryptanalysis 4 DARXplorer – DC of ThreeFish 5 Results on ThreeFish 6 Generalization of DARXplorer Dennis Hoppe (BUW) DARXplorer 22nd April 2009 2 / 31

  3. Agenda 1 Introduction to Hash Functions 2 The ThreeFish Block Cipher 3 Differential Cryptanalysis 4 DARXplorer – DC of ThreeFish 5 Results on ThreeFish 6 Generalization of DARXplorer Dennis Hoppe (BUW) DARXplorer 22nd April 2009 3 / 31

  4. Introduction to Hash Functions Hash Functions A hash function H : { 0 , 1 } ∗ → { 0 , 1 } n is used to compute an n -bit fingerprint from an arbitrarily-sized input M ∈ { 0 , 1 } ∗ Most of them are based on a compression function C : { 0 , 1 } n × { 0 , 1 } m → { 0 , 1 } n with fixed size input Computation: H i := C ( H i − 1 , M i ) C C C . . . H[0] H[1] H[L-1] H[L] . . . M[1] M[2] M[L] Dennis Hoppe (BUW) DARXplorer 22nd April 2009 4 / 31

  5. Introduction to Hash Functions – cont’d Compression Functions A crucial building block of iterated hash functions is the compression function C Designer often make use of block ciphers Which properties should be imposed on C to guarantee that the hash function satisfies certain properties? Theorem (Damg˚ ard-Merkle) If the compression function C is collision-resistant , then the hash function H is collision-resistant as well. If the compression function C is preimage-resistant , then the hash function H is preimage-resistant as well. Dennis Hoppe (BUW) DARXplorer 22nd April 2009 5 / 31

  6. Introduction to Hash Functions – cont’d Vulnerability of Hash Functions Black-Box attacks on the compression function Exploit the way in which multiple compression functions are combined Joux (2004), Kelsey u. Kohno (2006) Attacks dependent on the internal details of the compression function Make use of cryptanalytical techniques One of the most successful attacks against block ciphers is Differential Cryptanalysis Used to crypt analyze MD4, MD5 [Wang u. a. (2004)] Dennis Hoppe (BUW) DARXplorer 22nd April 2009 6 / 31

  7. Introduction to Hash Functions – cont’d Vulnerability of Hash Functions Black-Box attacks on the compression function Exploit the way in which multiple compression functions are combined Joux (2004), Kelsey u. Kohno (2006) Attacks dependent on the internal details of the compression function Make use of cryptanalytical techniques One of the most successful attacks against block ciphers is Differential Cryptanalysis Used to crypt analyze MD4, MD5 [Wang u. a. (2004)] Dennis Hoppe (BUW) DARXplorer 22nd April 2009 6 / 31

  8. Agenda 1 Introduction to Hash Functions 2 The ThreeFish Block Cipher 3 Differential Cryptanalysis 4 DARXplorer – DC of ThreeFish 5 Results on ThreeFish 6 Generalization of DARXplorer Dennis Hoppe (BUW) DARXplorer 22nd April 2009 7 / 31

  9. Introduction to Block Ciphers One-way compression functions built from block ciphers H m i i-1 m H E E g i i-1 H i H i Davies-Meyer Matyas-Meyer-Oseas Dennis Hoppe (BUW) DARXplorer 22nd April 2009 8 / 31

  10. The ThreeFish Block Cipher Motivation Tweakable block cipher, designed with the purpose to be used as a building block for a hash function Provides speed, flexibility and the ease of analysis to proof security Supports different block sizes (ThreeFish- n ); n = 256 , 512 , 1024 ThreeFish- n supports n -bit blocks and n -bit keys and a 128 -bit tweak Usage (Skein) Skein- n uses ThreeFish- n H i := C ( H i − 1 , T i , M i ) := Threefish H i − 1 ,T i ( M i ) ⊕ M i We have to show, that the probability is below 2 − 2 n − 128 by providing an upper bound on the probability of the best exclusive-OR difference Dennis Hoppe (BUW) DARXplorer 22nd April 2009 9 / 31

  11. The ThreeFish Block Cipher Motivation Tweakable block cipher, designed with the purpose to be used as a building block for a hash function Provides speed, flexibility and the ease of analysis to proof security Supports different block sizes (ThreeFish- n ); n = 256 , 512 , 1024 ThreeFish- n supports n -bit blocks and n -bit keys and a 128 -bit tweak Usage (Skein) Skein- n uses ThreeFish- n H i := C ( H i − 1 , T i , M i ) := Threefish H i − 1 ,T i ( M i ) ⊕ M i We have to show, that the probability is below 2 − 2 n − 128 by providing an upper bound on the probability of the best exclusive-OR difference Dennis Hoppe (BUW) DARXplorer 22nd April 2009 9 / 31

  12. The ThreeFish Block Cipher – cont’d Structure of ThreeFish-256 Non-linear MIX function on two 64 -bit words MIX MIX Permutation Input (A, B, C, D) Output (A, D, C, B) A B C D Key Schedule PERMUTE Generates subkeys A D C B Injects subkeys each 8th round Completely omitted in DARXplorer Dennis Hoppe (BUW) DARXplorer 22nd April 2009 10 / 31

  13. The ThreeFish Block Cipher – cont’d A B MIX Operation Primitives Addition mod 2 64 , Word-wise rotation, and <<< c Bit-wise exclusive-OR MIX ( A, B, c ) = ( X, Y ) Y = A + B X = ( A ≪ c ) ⊕ Y X Y Dennis Hoppe (BUW) DARXplorer 22nd April 2009 11 / 31

  14. Agenda 1 Introduction to Hash Functions 2 The ThreeFish Block Cipher 3 Differential Cryptanalysis 4 DARXplorer – DC of ThreeFish 5 Results on ThreeFish 6 Generalization of DARXplorer Dennis Hoppe (BUW) DARXplorer 22nd April 2009 12 / 31

  15. Differential Cryptanalysis Differential Cryptanalysis [Biham u. Shamir (1990)] Exploits the high probability of certain occurrences by tracing differences through the network ( X ′ , X ′′ ) , ∆ X = X ′ ⊕ X ′′ In: Out: ( Y ′ , Y ′′ ) , ∆ Y = Y ′ ⊕ Y ′′ Ideally randomizing cipher: the probability that a particular output difference ∆ Y occurs given a particular input difference ∆ X is 2 − n Dennis Hoppe (BUW) DARXplorer 22nd April 2009 13 / 31

  16. Differential Cryptanalysis – cont’d Example (DC) Input Difference: ∆ P 1 = [0000 1011 0000 0000] Difference-Pair for S-Box: S 12 : ∆ X = B → ∆ Y = 2 with probability p 1 = 1 / 2 Output Difference: ∆ V 1 = [0000 0010 0000 0000] Try to find r-round characteristics ! Dennis Hoppe (BUW) DARXplorer 22nd April 2009 14 / 31

  17. Differential Cryptanalysis of ThreeFish Differential Cryptanalysis of ThreeFish We need to make assumptions about the differential properties of the A B primitives Differential exclusive-OR δ w = δ u ⊕ δ v Pr [ δ w ] = 1 . 0 c <<< Differential rotations t ′ = ( u ⊕ δu ) ≪ i t = u ≪ i, δ t = t ⊕ t ′ = δ u ≪ i Pr [ δ t ] = 1 . 0 Differential addition X Y Evaluating the differential properties of addition with respect to exclusive-OR is hard Dennis Hoppe (BUW) DARXplorer 22nd April 2009 15 / 31

  18. Differential Cryptanalysis of ThreeFish Differential Cryptanalysis of ThreeFish We need to make assumptions about the differential properties of the A B primitives Differential exclusive-OR δ w = δ u ⊕ δ v Pr [ δ w ] = 1 . 0 c <<< Differential rotations t ′ = ( u ⊕ δu ) ≪ i t = u ≪ i, δ t = t ⊕ t ′ = δ u ≪ i Pr [ δ t ] = 1 . 0 Differential addition X Y Evaluating the differential properties of addition with respect to exclusive-OR is hard Dennis Hoppe (BUW) DARXplorer 22nd April 2009 15 / 31

  19. Differential Cryptanalysis of ThreeFish Differential Cryptanalysis of ThreeFish We need to make assumptions about the differential properties of the A B primitives Differential exclusive-OR δ w = δ u ⊕ δ v Pr [ δ w ] = 1 . 0 c <<< Differential rotations t ′ = ( u ⊕ δu ) ≪ i t = u ≪ i, δ t = t ⊕ t ′ = δ u ≪ i Pr [ δ t ] = 1 . 0 Differential addition X Y Evaluating the differential properties of addition with respect to exclusive-OR is hard Dennis Hoppe (BUW) DARXplorer 22nd April 2009 15 / 31

  20. Differential Cryptanalysis of ThreeFish – cont’d Computing the Differential Properties of Addition [Lipmaa u. Moriai (2001)] Due to the lack of theory it was hard to evaluate the security of ciphers that employ both exclusive-OR and addition Compute the probability that, given input differences δ u and δ v result in the output difference δ s DP + ( δ u , δ v → δ s ) Θ( log n ) (worst-case), Θ(1) + t (average) Compute all “good” output differentials in a deterministic way DP + max ( δ u , δ v ) = max δ s { DP + ( δ u , δ v → δ s ) } Θ( log n ) Dennis Hoppe (BUW) DARXplorer 22nd April 2009 16 / 31

  21. Differential Cryptanalysis of ThreeFish – cont’d Computing the Differential Properties of Addition [Lipmaa u. Moriai (2001)] Due to the lack of theory it was hard to evaluate the security of ciphers that employ both exclusive-OR and addition Compute the probability that, given input differences δ u and δ v result in the output difference δ s DP + ( δ u , δ v → δ s ) Θ( log n ) (worst-case), Θ(1) + t (average) Compute all “good” output differentials in a deterministic way DP + max ( δ u , δ v ) = max δ s { DP + ( δ u , δ v → δ s ) } Θ( log n ) Dennis Hoppe (BUW) DARXplorer 22nd April 2009 16 / 31

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend