Known-Key Distinguisher on Full PRESENT eline Blondeau 1 Thomas - - PowerPoint PPT Presentation

known key distinguisher on full present
SMART_READER_LITE
LIVE PREVIEW

Known-Key Distinguisher on Full PRESENT eline Blondeau 1 Thomas - - PowerPoint PPT Presentation

Introduction New Distinguisher Application to PRESENT Conclusion Known-Key Distinguisher on Full PRESENT eline Blondeau 1 Thomas Peyrin 2 Lei Wang 2 , 3 C 1 Aalto University, Finland 2 Nanyang Technological University, Singapore 3 Shanghai Jiao


slide-1
SLIDE 1

Introduction New Distinguisher Application to PRESENT Conclusion

Known-Key Distinguisher on Full PRESENT

C´ eline Blondeau1 Thomas Peyrin2 Lei Wang2,3

1Aalto University, Finland 2Nanyang Technological University, Singapore 3Shanghai Jiao Tong University, China

CRYPTO 2015 Presented by Pierre Karpman

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-2
SLIDE 2

Introduction New Distinguisher Application to PRESENT Conclusion

Outlook

Introduction Our Known-Key Distinguisher Application to PRESENT Conclusion

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-3
SLIDE 3

Introduction New Distinguisher Application to PRESENT Conclusion

Block Cipher

Definition

A block cipher E : {0, 1}k × {0, 1}n → {0, 1}n is a family of efficiently invertible permutations on n-bit values, whose index is a k-bit key value.

Applications in Cryptography: a fundamental primitive

◮ Encryption Scheme: ECB, CBC, CFB, OFB, CTR ◮ Message Authentication Code: EMAC, CMAC, PMAC ◮ Authenticated Encryption: GCM, OCB, EAX, CCM ◮ Hash Function: PGV schemes, MDC-2, MJH, Hirose Scheme

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-4
SLIDE 4

Introduction New Distinguisher Application to PRESENT Conclusion

Security Requirement on Block Cipher

A classical security notion: the indistinguishability from an ideal block cipher.

Ideal Block Cipher

Each permutation indexed by a key value is a random permutation. Moreover, any two permutations indexed by distinct key values are completely independent.

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-5
SLIDE 5

Introduction New Distinguisher Application to PRESENT Conclusion

Attack Models on Block Cipher

Secret-key Model

◮ Secret key value ◮ Impact to Encryption, MAC ◮ Single-key attack ◮ Related-key attack

Open-Key Model

◮ Public key value ◮ Impact to Hash Function ◮ Known-key attack ◮ Chosen-key attack

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-6
SLIDE 6

Introduction New Distinguisher Application to PRESENT Conclusion

Attack Models on Block Cipher

  • Open-key model is more generous to adversary.
  • More rounds are expected to be attacked in open-key model.
  • For AES-128 as an example, the number of attacked rounds is

Secret-key model: 7 rounds [DFJ13]; Open-key model: 10 (full) rounds [Gilbert14].

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-7
SLIDE 7

Introduction New Distinguisher Application to PRESENT Conclusion

Attack Models on Block Cipher

  • Open-key model is more generous to adversary.
  • More rounds are expected to be attacked in open-key model.
  • For AES-128 as an example, the number of attacked rounds is

Secret-key model: 7 rounds [DFJ13]; Open-key model: 10 (full) rounds [Gilbert14]. Interestingly the situation for standardized lightweight block cipher PRESENT is rather different, which motivates this research.

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-8
SLIDE 8

Introduction New Distinguisher Application to PRESENT Conclusion

PRESENT Cipher

  • ISO/IEC standard lightweight block cipher
  • Block size is 64 bits; Key size is 80 bits (referred to as

PRESENT-80) or 128 bits (referred to as PRESENT-128).

  • Composed of 31 rounds:

Each round consists of a round-key XOR, an Sbox layer and a simple linear bit permutation layer

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

Figure: One round of PRESENT

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-9
SLIDE 9

Introduction New Distinguisher Application to PRESENT Conclusion

Previous Analysis Results on PRESENT

  • Most scrutinized lightweight cipher.
  • Multidimensional linear attack is the most powerful one:

easy-to-trace linear trails with large correlations

  • Link between differential property and linear correlation in

[BN14]: A multidimensional linear distinguisher can be converted to a truncated differential distinguisher.

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-10
SLIDE 10

Introduction New Distinguisher Application to PRESENT Conclusion

Previous Analysis Results on PRESENT

#rounds Version Attack Reference Secret-key Model 16 80 differential [Wang08] 19 128 algebraic differential [AC09] 19 128 multiple differential [BN13] 25 128 linear [NSZ+09] 26 80 multidimensional linear [Cho10] 26 80 truncated differential [BN14] Open-key Model 18 80 differential rebound [KS+12] 26 80 linear [LR15] 27 128 linear [LR15]

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-11
SLIDE 11

Introduction New Distinguisher Application to PRESENT Conclusion

Our Results on PRESENT

#rounds Version Attack Reference Secret-key Model 16 80 differential [Wang08] 19 128 algebraic differential [AC09] 19 128 multiple differential [BN13] 25 128 linear [NSZ+09] 26 80 multidimensional linear [Cho10] 26 80 truncated differential [BN14] Open-key Model 18 80 differential rebound [KS+12] 26 80 linear [LR15] 27 128 linear [LR15] 31 (full) 80/128 truncated differential Ours

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-12
SLIDE 12

Introduction New Distinguisher Application to PRESENT Conclusion

Known-Key Distinguisher

  • Key is known to the distinguisher
  • Improve estimation of the security margin of block cipher
  • Encompass the scenario of block cipher-based hash function
  • The goal for an attacker:

generate input/output pairs with a certain property, such that the complexity for the target block cipher is lower than the generic complexity when dealing with an ideal block cipher − target block cipher: open access to internal states to exploit structural weakness; − ideal block cipher: black-box access to encryption and decryption oracles

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-13
SLIDE 13

Introduction New Distinguisher Application to PRESENT Conclusion

Our Known-Key Distinguisher

Distinguishing property

Find a set of N plaintexts, such that they all have the same value

  • n s pre-determined bits and such that there is a bias on the

number of collisions observed on q pre-determined bits of corresponding ciphertexts Block Cipher E ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗ ∗∗∗∗∗∗∗∗∗∗0∗∗∗∗∗

Figure: Our distinguisher model

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-14
SLIDE 14

Introduction New Distinguisher Application to PRESENT Conclusion

Our Known-Key Distinguisher

Distinguishing property

Find a set of N plaintexts, such that they all have the same value

  • n s pre-determined bits and such that there is a bias on the

number of collisions observed on q pre-determined bits of corresponding ciphertexts Generic attack on an ideal block cipher:

  • 1. Pick N random plaintexts having

the same values on s pre-determined bit positions

  • 2. Query them, and count the number
  • f collisions on the q

pre-determined bit positions of corresponding ciphertexts

Block Cipher E ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗ ∗∗∗∗∗∗∗∗∗∗0∗∗∗∗∗

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-15
SLIDE 15

Introduction New Distinguisher Application to PRESENT Conclusion

Application to PRESENT

It is important to study known-key distinguishers on PRESENT.

  • a natural candidate to build a lightweight hash function
  • DM-PRESENT and H-PRESENT in [BL+08]

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-16
SLIDE 16

Introduction New Distinguisher Application to PRESENT Conclusion

Application to PRESENT

It is important to study known-key distinguishers on PRESENT.

  • a natural candidate to build a lightweight hash function
  • DM-PRESENT and H-PRESENT in [BL+08]

We decided to base our distinguisher on truncated differential attacks, because

  • it can reach the maximum number of attacked rounds
  • it is easier to handle than multidimensional linear attack in

the known-key setting

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-17
SLIDE 17

Introduction New Distinguisher Application to PRESENT Conclusion

Application to PRESENT

It is important to study known-key distinguishers on PRESENT.

  • a natural candidate to build a lightweight hash function
  • DM-PRESENT and H-PRESENT in [BL+08]

We decided to base our distinguisher on truncated differential attacks, because

  • it can reach the maximum number of attacked rounds
  • it is easier to handle than multidimensional linear attack in

the known-key setting On the other hand,

  • its statistical bias is small, and a large number of plaintexts is

necessary

  • pre- and post-adding extra differential characteristics cannot

work well, since they reduce #available plaintexts.

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-18
SLIDE 18

Introduction New Distinguisher Application to PRESENT Conclusion

Overview of Our Distinguisher on PRESENT

It consists of

  • Meet-in-the-middle layer
  • Truncated differential layer

Strong truncated differential distinguisher Extension using a MitM layer r1 ≤ 24 r0 = 7 Λ ∆ Γ ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗ ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗ ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗

Figure: Overview of our distinguisher

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-19
SLIDE 19

Introduction New Distinguisher Application to PRESENT Conclusion

Truncated Differential Layer

  • [BN14] studies the link between the probability of a truncated

differential and the capacity of a multidimensional linear approximation.

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-20
SLIDE 20

Introduction New Distinguisher Application to PRESENT Conclusion

Truncated Differential Layer

  • [BN14] studies the link between the probability of a truncated

differential and the capacity of a multidimensional linear approximation.

  • Truncated differential with strong bias on PRESENT:

both plaintext and ciphertext have only one Sbox with no difference.

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-21
SLIDE 21

Introduction New Distinguisher Application to PRESENT Conclusion

Truncated Differential Layer

  • [BN14] studies the link between the probability of a truncated

differential and the capacity of a multidimensional linear approximation.

  • Truncated differential with strong bias on PRESENT:

both plaintext and ciphertext have only one Sbox with no difference.

  • The truncated differential in our attack:

− Plaintext: S13 has no difference − Ciphertext: one of S5, S7, S13 or S15 has no difference

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-22
SLIDE 22

Introduction New Distinguisher Application to PRESENT Conclusion

Truncated Differential Layer

  • [BN14] studies the link between the probability of a truncated

differential and the capacity of a multidimensional linear approximation.

  • Truncated differential with strong bias on PRESENT:

both plaintext and ciphertext have only one Sbox with no difference.

  • The truncated differential in our attack:

− Plaintext: S13 has no difference − Ciphertext: one of S5, S7, S13 or S15 has no difference

  • Such a truncated differential on 24-round PRESENT:

− its probability is 2−4 + 2−62.77 − for an ideal block cipher, the probability is 2−4

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-23
SLIDE 23

Introduction New Distinguisher Application to PRESENT Conclusion

Meet-in-the-Middle Layer

It sets constraints only on its input and output, which maintains as many as possible valid inputs to truncated differential layer

  • input bit constraints: define the distinguishing property.
  • output bit constraints: consistent with truncated differential.

Strong truncated differential distinguisher Extension using a MitM layer r1 ≤ 24 r0 = 7 Λ ∆ Γ ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗ ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗ ∗∗0∗∗∗∗∗∗∗∗∗∗∗∗∗

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-24
SLIDE 24

Introduction New Distinguisher Application to PRESENT Conclusion

Meet-in-the-Middle Layer

Identify all valid plaintexts efficiently:

  • meet-in-the-middle approach due to small Sbox and

bit-permutation linear layer: in two rounds, an input bit interacts with few other bits, and impacts to only partial outputs bits

⊕⊕⊕⊕

S13

⊕⊕⊕⊕ ⊕⊕⊕⊕ ⊕⊕⊕⊕ ⊕⊕⊕⊕

S15 S11 S 7 S 3

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

Figure: Propagation for one bit in two rounds

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-25
SLIDE 25

Introduction New Distinguisher Application to PRESENT Conclusion

Meet-in-the-Middle Layer

Attack procedure on 7-round PRESENT:

  • 1. Guess and forward compute the first two rounds
  • 2. Guess and backward compute the last one round and half
  • 3. Gradually match the two independent computations through

the middle three rounds

⊕⊕⊕⊕

S13

⊕⊕⊕⊕ ⊕⊕⊕⊕ ⊕⊕⊕⊕ ⊕⊕⊕⊕

S15 S11 S 7 S 3

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S 7 S 6 S 5 S 4

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-26
SLIDE 26

Introduction New Distinguisher Application to PRESENT Conclusion

Meet-in-the-Middle Layer

Gradually match through the middle three rounds

  • divide into 4-Sbox groups
  • forward: [S4i, S4i+1, S4i+2, S4i+3] as group TFi

group TF0 as an example: red color

  • backward: [S4i, S4i+4, S4i+8, S4i+12] as group TBi

group TB0 as an example: blue color

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-27
SLIDE 27

Introduction New Distinguisher Application to PRESENT Conclusion

Meet-in-the-Middle Layer

The procedure of gradually matching:

  • 1. guess and compute each group independently
  • 2. merge TFi and TBi, and store the results in table Ti
  • 3. merge T0 and T1, T2 and T3, independently, and store the results in

T0,1 and T2,3 respectively

  • 4. merge T0,1 and T2,3

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

S15 S14 S13 S12 S11 S10 S 9 S 8 S 7 S 6 S 5 S 4 S 3 S 2 S 1 S 0

⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕⊕

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-28
SLIDE 28

Introduction New Distinguisher Application to PRESENT Conclusion

Our Results on PRESENT

  • #valid messages from MitM layer: 256

it contributes to 2111 pairs

  • Complexity: 256 table lookups and 256 encryptions
  • Success probability:

#Rounds C ′

r−7

PS(2111) PS(2109) 27 2−48.33 100% 100% 28 2−50.94 99.8% 93.0% 29 2−53.55 68.6% 59.5% 30 2−56.16 53.2% 51.5% 31 2−58.77 50.5% 50.3%

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-29
SLIDE 29

Introduction New Distinguisher Application to PRESENT Conclusion

Our Results on PRESENT

  • #valid messages from MitM layer: 256

it contributes to 2111 pairs

  • Complexity: 256 table lookups and 256 encryptions
  • Success probability:

#Rounds C ′

r−7

PS(2111) PS(2109) 27 2−48.33 100% 100% 28 2−50.94 99.8% 93.0% 29 2−53.55 68.6% 59.5% 30 2−56.16 53.2% 51.5% 31 2−58.77 50.5% 50.3% Overall, with 256 plaintexts and 256 computations, we distinguish PRESENT-80/128 from ideal block cipher with success probability 50.5%.

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-30
SLIDE 30

Introduction New Distinguisher Application to PRESENT Conclusion

Conclusion

  • a known-key distinguisher on full PRESENT
  • the very first non-random property found for full PRESENT
  • it is also applicable to DM-PRESENT and H-PRESENT
  • our work raises first concerns on the possibility to use

PRESENT to build hash functions

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-31
SLIDE 31

Introduction New Distinguisher Application to PRESENT Conclusion

Conclusion

  • a known-key distinguisher on full PRESENT
  • the very first non-random property found for full PRESENT
  • it is also applicable to DM-PRESENT and H-PRESENT
  • our work raises first concerns on the possibility to use

PRESENT to build hash functions Future work:

  • can our attack be simplified or complexity be improved ?
  • can we gain something more by choosing the key instead of
  • nly knowing it?

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang
slide-32
SLIDE 32

Introduction New Distinguisher Application to PRESENT Conclusion

Thank you for your attention!

Known-Key Distinguisher on Full PRESENT

  • C. Blondeau, T. Peyrin, L.Wang