New Types of Cryptanalytic Attacks Using Related Keys
Eli Biham
Eli Biham Presented by: Nael Masalha Outline Introduction LOKI89 - - PowerPoint PPT Presentation
New Types of Cryptanalytic Attacks Using Related Keys Eli Biham Presented by: Nael Masalha Outline Introduction LOKI89 Related Keys Chosen Key Attack Chosen plaintext attack Summary Introduction The author studies
Eli Biham
– Chosen plaintext attack with 217 chosen plaintexts. – Know plaintext attack with 233 know plaintexts.
0,…,P* 65535: whose left halves equal PR and 32-bit right
j we are guaranteed that
jL = PiR.
j such that
𝑘𝑆 ∗ = 𝑄𝑗𝑀 ⊕ 𝐿𝑀 ⊕ 𝑆𝑃𝑀12(𝐿𝑀) ⊕ 𝐺(𝑄𝑗𝑆 ⊕ 𝐿𝑆 ⊕ 𝐿𝑀)
R = CL. This test has a probability of 2-32 to pass accidentally.
𝑆 ⊕ 𝐿𝑆 ⊕ 𝐿𝑀 ⊕ 𝐺 𝐷𝑀 ⊕ 𝐿𝑆 ⊕ 𝐿𝑀 = 𝑄 𝑆 ∗ ⊕ 𝑄 𝑀 ⊕ 𝐷𝑀 ∗ ⊕ 𝐷𝑆
in which the only unknown value is 𝐿𝑀 ⊕ 𝐿𝑆
j encrypted under related key K*=(KR,ROL12(KL)).
𝑦}, h ∈ {0𝑦, … , 𝐺 𝑦} and i = g ⊕ ℎ results
𝑦 , by 𝑄𝑗 = 𝑄0⨁𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑦.
– Four most significant bits are zero – The list contains one value from any pair Li and Lj for which Li = next(Lj) – The list is minimal
Cycle Size Number of Cycles Number of elements in the Cycle 1 16 16 4 16,320 65,280 8 33,546,240 268,369,920 2 120 240
𝑦 , by
𝑄
𝑗 = 𝑄 0⨁𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑦.
(Li, Lj) and K’ = (ROL12(Li), ROR12(Lj))
key is likely to be either 𝐿 = 𝐿′⨁00000000𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑦 or any one of its 15 equivalent keys.
Ci,k⨁𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑗𝑦, then the original key is likely K = (K’R, ROL12(K’L))