Differential cryptanalysis Linear cryptanalysis
Differential and Linear Cryptanalysis
Lars R. Knudsen June 2014
L.R. Knudsen Differential and Linear Cryptanalysis
Differential and Linear Cryptanalysis Lars R. Knudsen June 2014 - - PowerPoint PPT Presentation
Differential cryptanalysis Linear cryptanalysis Differential and Linear Cryptanalysis Lars R. Knudsen June 2014 L.R. Knudsen Differential and Linear Cryptanalysis Differential cryptanalysis Linear cryptanalysis Iterated block ciphers (DES,
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k1
k2
k3
kr
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k1
k2
k3
kr
1 assume “correlation” between m and cr−1 2 given a number of pairs (m, c) 3 repeat for all pairs and all values i of kr: 1
2
4 value of i which yields cor(m, cr−1) taken as value of kr L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
2
2
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k0
↓
k1
↓
k2
↓
kr
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k0
↓
k1
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k0
↓
k1
↓
k2
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k0
↓
k1
↓
k2
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k0
↓
k1
↓
k2
↓
1 choose random m, compute m′ = m ⊕ fx, obtain (m, c) and
2 for i = 0, . . . , 15:
1
2
3 go to 1, until one counter holds significant value L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
1 exclusive-or round key to text 2 split text, evaluate each nibble via S-box
3 permute bits in y according to:
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
Si
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
16.
16)3. Consequently (u.s.a.)
16( 6 16)3 ≃ 0.033.
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
6 16 and therefore
6 16
16)2 ≃ 0.14
16)4
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
16)4 ≃ 1/51
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
16)4 ≃ 1/51
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
1 choose pairs of plaintexts with difference ∆m 2 get the pairs of ciphertexts c and c∗ 3 for all possible values of kr do:
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
kr−1
↓
kr
↓
i
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
m·β·α 2k−1
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
2
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
2 + 2(p1 − 1/2)(p2 − 1/2)
n
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
n
n
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
ki
↓
ki+1
↓
i=1 |pi − 1/2| (piling up biases)
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k0
↓
k1
↓
kr−1
↓
kr
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
k0
↓
k1
↓
kr−1
↓
kr
↓
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
1 exclusive-or round key to text 2 split text, evaluate each nibble via S-box
3 permute bits in y according to:
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
6 16, probability − 6 16 + 1 2 = 2 16
6 16
8
16)( 4 16) = 1 8
8)( 1 8) = 3 32
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
4 16 and therefore
4
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
32 according to Piling-up
1 32 is taken as value of
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis
Differential cryptanalysis Linear cryptanalysis
L.R. Knudsen Differential and Linear Cryptanalysis