differential cryptanalysis
play

Differential Cryptanalysis The first method which reduced the - PDF document

Differential Cryptanalysis The first method which reduced the complexity of attacking DES below (half of) exhaustive search. Differential Cryptanalysis Note : In all the following discussion we ignore the existence of the initial and the final


  1. Differential Cryptanalysis The first method which reduced the complexity of attacking DES below (half of) exhaustive search. Differential Cryptanalysis Note : In all the following discussion we ignore the existence of the initial and the final permutations, since they do not affect the analysis. Motivation : 1. All the operations except for the S boxes are linear. 2. Mixing the key in all the rounds prohibits the attacker from knowing which entries of the S boxes are actually used, and thus he cannot know their output. See: Biham and Shamir, Differential Cryptanalysis of the Data Encryption Standard , Springer Ver- lag, 1993. � Eli Biham - May 3, 2005 c 520 Differential Cryptanalysis (18) � Eli Biham - May 3, 2005 c 521 Differential Cryptanalysis (18) Differential Cryptanalysis (cont.) Differential Cryptanalysis (cont.) How can we inhibit the key from hiding the information? Advantages : It is easy to predict the output difference of linear operations given the input difference: The basic idea of differential cryptanalysis : Study the differences between two encryptions of two different plaintexts: P and P ∗ . • Unary operations (E, P, IP): Notation : For any value X during the encryption of P , and the corresponding ( P ( X )) ′ = P ( X ) ⊕ P ( X ∗ ) = P ( X ′ ) value X ∗ during encryption of P ∗ , denote the difference by X ′ = X ⊕ X ∗ . • Binary operations (XOR): ( X ⊕ Y ) ′ = ( X ⊕ Y ) ⊕ ( X ∗ ⊕ Y ∗ ) = X ′ ⊕ Y ′ • Mixing the key : ( X ⊕ K ) ′ = ( X ⊕ K ) ⊕ ( X ∗ ⊕ K ) = X ′ We conclude that the differences are linear in linear operations, and in partic- ular, the result is key independent . � Eli Biham - May 3, 2005 c 522 Differential Cryptanalysis (18) � Eli Biham - May 3, 2005 c 523 Differential Cryptanalysis (18) Differences and the S Boxes The Difference Distribution Table of S1 Assume we have two inputs X and X ∗ for the same S box, and that we know Input Output XOR only their difference X ′ . XOR 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 x A x B x C x D x E x F x 0 x 64 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 x 0 0 0 6 0 2 4 4 0 10 12 4 10 6 2 4 Denote Y = S ( X ). 2 x 0 0 0 8 0 4 4 4 0 6 8 6 12 6 4 2 3 x 14 4 2 2 10 6 4 2 6 4 4 0 2 2 2 0 4 x 0 0 0 6 0 10 10 6 0 4 6 4 2 8 6 2 5 x 4 8 6 2 2 4 4 2 0 4 4 0 12 2 4 6 What do we know about Y ′ ? 6 x 0 4 2 4 8 2 6 2 8 4 4 2 4 2 0 12 7 x 2 4 10 4 0 4 8 4 2 4 8 2 2 2 4 4 The simple case: when X ′ = 0 : S ( X ) = S ( X ∗ ) for any X , and Y ′ = 0 . 8 x 0 0 0 12 0 8 8 4 0 6 2 8 8 2 2 4 9 x 10 2 4 0 2 4 6 0 2 2 8 0 10 0 2 12 A x 0 8 6 2 2 8 6 0 6 4 6 0 4 0 2 10 B x 2 4 0 10 2 2 4 0 2 6 2 6 6 4 2 12 If X ′ � = 0: we do not know the output difference. C x 0 0 0 8 0 6 6 0 0 6 6 4 6 6 14 2 D x 6 6 4 8 4 8 2 6 0 6 4 6 0 2 0 2 E x 0 4 8 8 6 6 4 0 6 6 4 0 0 4 0 8 F x 2 0 2 4 4 6 4 2 4 8 2 2 2 6 8 8 10 x 0 0 0 0 0 0 2 14 0 6 6 12 4 6 8 6 Definition : Lets look on the distribution of the pairs ( X ′ , Y ′ ) of all the pos- . . . 27 x 10 4 2 0 2 4 2 0 4 8 0 4 8 8 4 4 sible inputs X . We call the table containing this information difference dis- 28 x 12 2 2 8 2 6 12 0 0 2 6 0 4 0 6 2 29 x 4 2 2 10 0 2 4 0 0 14 10 2 4 6 0 4 2 A x 4 2 4 6 0 2 8 2 2 14 2 6 2 6 2 2 tribution table of the S box . 2 B x 12 2 2 2 4 6 6 2 0 2 6 2 6 0 8 4 2 C x 4 2 2 4 0 2 10 4 2 2 4 8 8 4 2 6 2 D x 6 2 6 2 8 4 4 4 2 4 6 0 8 2 0 6 2 E x 6 6 2 2 0 2 4 6 4 0 6 2 12 2 6 4 2 F x 2 2 2 2 2 6 8 8 2 4 4 6 8 2 4 2 30 x 0 4 6 0 12 6 2 2 8 2 4 4 6 2 2 4 31 x 4 8 2 10 2 2 2 2 6 0 0 2 2 4 10 8 32 x 4 2 6 4 4 2 2 4 6 6 4 8 2 2 8 0 33 x 4 4 6 2 10 8 4 2 4 0 2 2 4 6 2 4 34 x 0 8 16 6 2 0 0 12 6 0 0 0 0 8 0 6 35 x 2 2 4 0 8 0 0 0 14 4 6 8 0 2 14 0 36 x 2 6 2 2 8 0 2 2 4 2 6 8 6 4 10 0 37 x 2 2 12 4 2 4 4 10 4 4 2 6 0 2 2 4 38 x 0 6 2 2 2 0 2 2 4 6 4 4 4 6 10 10 39 x 6 2 2 4 12 6 4 8 4 0 2 4 2 4 4 0 3 A x 6 4 6 4 6 8 0 6 2 2 6 2 2 6 4 0 3 B x 2 6 4 0 0 2 4 6 4 6 8 6 4 4 6 2 3 C x 0 10 4 0 12 0 4 2 6 0 4 12 4 4 2 0 3 D x 0 8 6 2 2 6 0 8 4 4 0 4 0 12 4 4 3 E x 4 8 2 2 2 4 4 14 4 2 0 2 0 8 4 4 3 F x 4 8 4 2 4 0 2 4 4 2 4 8 8 6 2 2 � Eli Biham - May 3, 2005 c 524 Differential Cryptanalysis (18) � Eli Biham - May 3, 2005 c 525 Differential Cryptanalysis (18) The Difference Distribution Table of S1 (cont.) Differences and the S Boxes (cont.) Definition : If the entry of the input difference X ′ and the output difference Observe that : Y ′ is greater than zero, we say that X ′ may cause Y ′ by the S box , and denote X ′ → Y ′ . • In the first line X ′ = 0 and thus all the 64 pairs satisfy Y ′ = 0. Y ′ � = 0 is impossible. Definition : The probability of X ′ → Y ′ is the probability that for a pair with the input difference X ′ , the output difference is Y ′ , among all • In the rest of the lines: The average value is 4, the sum in each line is 64. the possible pairs. In DES, the probability is the corresponding value in the The values are all even in the range 0–16. difference distribution table divided by 64. The entries with value 16 mean that for a quarter of the pairs with this Similarly we define X ′ → Y ′ by the F -function , and define the probability input difference X ′ , the output difference is the particular Y ′ . as the product of the probabilities by the eight S boxes. The entries with value 0 mean that there are no pairs with the corre- sponding input difference X ′ and the corresponding output difference Y ′ . c c � Eli Biham - May 3, 2005 526 Differential Cryptanalysis (18) � Eli Biham - May 3, 2005 527 Differential Cryptanalysis (18)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend