AFRICACRYPT 2010 STIAS Stellenbosch Stellenbosch South Africa
G J Kühn Ciphertec cc p
gjkuhn@global.co.za
G J Khn Ciphertec cc p gjkuhn@global.co.za Contents Contents - - PowerPoint PPT Presentation
AFRICACRYPT 2010 STIAS Stellenbosch Stellenbosch South Africa G J Khn Ciphertec cc p gjkuhn@global.co.za Contents Contents Protex: First electronic crypto device in designed in South Africa designed in South Africa Keeloq: A simple
AFRICACRYPT 2010 STIAS Stellenbosch Stellenbosch South Africa
gjkuhn@global.co.za
Africacrypt 2010 2
Africacrypt 2010 3
Africacrypt 2010 4
The Enigma machine was g used commercially from the early 1920’s, and was adopted by the militaries adopted by the militaries and governments of various countries.
[Wikipedia]
Africacrypt 2010 5
P
A B C D E A B C D E
E F G H E F G H
A B A B
S‐1PS
B C D E F B C D E F
Africacrypt 2010 6
G H G H
Africacrypt 2010 7
[Wikipedia]
Africacrypt 2010 8
[Wikipedia]
1 1 2 2
i i i i i i − − −
1 1 2 2
1 2
r r
i i i i i i r
1 2
Africacrypt 2010 9
A B
P1 P2 Pr
B C D E F
Self‐inverse permutation
G H
1 1 2 2 2 2 1 1
1 1 i i i i i i i i
− − − − − −
1 2 2 1 1 r r
−
Q and Pr are conjugate permutations with the same cycle structure
Africacrypt 2010 10
Encryption/ decryption operations are identical
A given letter is never encrypted into itself
This is due to the turn‐around permutation being self‐
inverse with no fixed points – all cycles are of order 2 h Sh d d f
This represents a Shannon redundancy of 0.057
bits/letter
Africacrypt 2010 11
P P
P1 P2
A B C A B C C D E F C D E F
1 2 1 2
Africacrypt 2010 12
One permutation is used as a reflector The permutations are chosen such that P•S ≠ S•P
Africacrypt 2010 13
2
11
10
1
2
11
i1 i2 i9 i10 i11 c c c c c
10
12
1
c1 c9 c2 c10 c11 Boolean Finite State Circuit
1 12
‐i11 ‐i10 ‐i9 ‐i2 ‐i1 Boolean Finite State Circuit
1 1
1 2
1 10
1 11
Africacrypt 2010 14
1 12
Boolean Finite State Circuit KEY Complex mixing function Input stream Output stream
Africacrypt 2010 15
Africacrypt 2010 16
t i Probability entries y 0.812500 1 0.157258 2 0.026210 3 0.003615 Average = 0.22 4 0.000387 5 0.000029 6 0.000001
Africacrypt 2010 17
6 0.000001
Africacrypt 2010 18
Africacrypt 2010 19
Africacrypt 2010 20
Advance of the counters are irregular
Timing attacks Timing attacks
Re‐entry Propagation of carry bit
p g y Power analysis
Power surges due to switching of magnetic ferrite
cores
Africacrypt 2010 21
Input‐output permutations conjugate to a fixed
Africacrypt 2010 22
Africacrypt 2010 23
Applications: car door, garage door openers, etc.
32‐bit radio transmission low power low component count
Africacrypt 2010 24
Africacrypt 2010 25
Africacrypt 2010 26
26 20 16 9 1 30 31 ‐‐‐‐ ‐‐‐‐ ‐‐‐‐ ‐‐‐‐ ‐‐‐‐ 4 3 2 1 NLF (3A5C742E) (3A5C742E) 63 64‐bit key shift register
Africacrypt 2010 27
25 19 15 8 1 30 31 ‐‐‐‐ ‐‐‐‐ ‐‐‐‐ ‐‐‐‐ ‐‐‐‐ 4 3 2 1 NLF (3A5C742E) (3A5C742E) 63 64‐bit key shift register 15
Africacrypt 2010 28
Good SAC properties from plaintext to
Each key bit should be active at least 8 times
Africacrypt 2010 29
Minimised to enhance diffusion of bit changes
Africacrypt 2010 30
5‐bit Boolean function 0‐1 balanced Algebraic degree : 3
Minimum distance to affine set : 8 Correlation immunity : 1
Function resiliency : 1
Africacrypt 2010 31
Attack Data Tim e Mem Reference Exhaustive search 2 KP 263 Small Time‐memory trade‐off 2 CP 242.7 100 TB Hellman Slide/algebraic 216 KP 251.4 ? [Co, Ba, Wa] Slid / d
32 KP 37
6 GB B d Slide/guess and determine 232 KP 237 16 GB Bogdanov Slide/cycle structure 232 KP 239.4 16.5 GB [Co, Ba] Slide/cycle structure 2 KP 2 16.5 GB [Co, Ba] Slide/fixed points 232 KP 227 >16 GB [Co, Ba, Wa] Slide/meet‐in‐the‐middle 216 KP 245 ≈2 MB [In, Ke, …]
Africacrypt 2010 32
Africacrypt 2010 33
Most significant half Criterion Number of
Most significant half (MSH) Criterion Number of ciphertexts MAC = f(counter) MSH* Satisfies MAC 2 Fixed ID (known) MSH Equals ID 2 Fixed ID (unknown) MSH differential 3 Random bits 16‐bit counter mode ≤64
* MSH = most significant half of counter
Africacrypt 2010 34
MSH = most significant half of counter
The date of purchase of the car and the usage
At a usage pattern of 10 transmissions per day,
Africacrypt 2010 35
Africacrypt 2010 36
Africacrypt 2010 37
Africacrypt 2010 38
Africacrypt 2010 39
Africacrypt 2010 40
Self‐similar key schedule (supports slide attack) Efficient linear approximation to the NLF Existence of linear relations within the
Africacrypt 2010 41
k k k F F F P C k k k F F F k k C*
Africacrypt 2010 42
K
F P P* K Assume that P and P is a slid pair, then so is C and C*
V if h l i b h ki F C* K C
additional plaintext‐ciphertext pairs Complexity 1. The attacker is searching for collisions, which, due to the 1. The attacker is searching for collisions, which, due to the birthday paradox, have a high probability after 2n/2 pairs have been searched S l i f K h ld b K
Africacrypt 2010 43
Africacrypt 2010 44
Africacrypt 2010 45
Africacrypt 2010 46
32 bits 32 bits 1 key register cycle
8 k
(8 cycles) (k – k ) c (32 bits)
Africacrypt 2010 47
(k15 k0)
About 216 pairs will be found (birthday paradox)
8 k
Africacrypt 2010 48
Africacrypt 2010 49
Version A works for about 63% of keys The attack does not work for about 37% of keys Optimised version A works for about 30% of
Africacrypt 2010 50
Africacrypt 2010 51
Africacrypt 2010 52
16 steps later State 16 bits U L*
i
K
U L
i
K
g 16 bits U L Ki = (k16i …k16i + 15), i = 0,1,2,3 K is easily solved if L L* and U are known
Africacrypt 2010
Ki is easily solved if L, L and U are known
53
i
P
i
X
i
X∗
j
P∗
j
P
g g g g k0…k15 k16…k31 k32…k47 k48…k63 k0…k15
C Y C∗ Y ∗ C
g g g g
i
C
j
Y
i
C∗
j
Y
j
C
Africacrypt 2010 54
i
P
i
X
i
X∗
j
P∗
j
P
g g g g k0…k15 k16…k31 k32…k47 k48…k63 k0…k15
C Y C∗ Y ∗ C
g g g g
i
C
j
Y
i
C∗
j
Y
j
C
Africacrypt 2010 55
i
P
i
X
i
X∗
j
P∗
j
P
g g g g k0…k15 k16…k31 k32…k47 k48…k63 k0…k15
C Y C∗ Y ∗ C
g g g g
i
C
j
Y
i
C∗
j
Y
j
C
Africacrypt 2010 56
65 minutes to obtain data 65 minutes to obtain data
7.8 days on 64 CPU cores Variant requires 3.4 days on 64 CPU cores
Africacrypt 2010 57
Africacrypt 2010 58
Scale up the Keeloq block and key lengths Slight structural changes to the key schedule
Africacrypt 2010 59
The rapid progress in brute force computational
Discovery of new attacks, such as the slide
Africacrypt 2010 60
Africacrypt 2010 61