Low Complexity Differential Cryptanalysis and Fault Analysis of AES
Michael Tunstall May/June, 2011
Michael Tunstall (University of Bristol) May/June, 2011 1 / 34
Low Complexity Differential Cryptanalysis and Fault Analysis of AES - - PowerPoint PPT Presentation
Low Complexity Differential Cryptanalysis and Fault Analysis of AES Michael Tunstall May/June, 2011 Michael Tunstall (University of Bristol) May/June, 2011 1 / 34 Introduction We present a survey of low complexity differential cryptanalysis
Michael Tunstall (University of Bristol) May/June, 2011 1 / 34
◮ A low number of plaintext-ciphertext pairs. ◮ A feasible amount of computing power.
Michael Tunstall (University of Bristol) May/June, 2011 2 / 34
Michael Tunstall (University of Bristol) May/June, 2011 3 / 34
◮ AddRoundkey — An XOR with a subkey. ◮ SubBytes — A bytewise substitution (we will refer to a function S). ◮ ShiftRows — The bytes in each row are rotated by 0, 1, 2, 3 places
◮ MixColumns — A matrix multiplication with
Michael Tunstall (University of Bristol) May/June, 2011 4 / 34
◮ Four with probability
1 256
◮ Two with probability 126
256
◮ Zero with probability 128
256
Michael Tunstall (University of Bristol) May/June, 2011 5 / 34
Michael Tunstall (University of Bristol) May/June, 2011 6 / 34
4 255 ≈ 1 26 251 255
2 12675 ≈ 1 213.4 1004 65025 ≈ 1 26 12803 13005
4 16581375 ≈ 1 222 502 5527125 ≈ 1 213.4 51212 3316275 ≈ 1 26 3264761 3316275
Michael Tunstall (University of Bristol) May/June, 2011 7 / 34
Michael Tunstall (University of Bristol) May/June, 2011 8 / 34
◮ That is, a difference where the number and position of bytes can be
Michael Tunstall (University of Bristol) May/June, 2011 9 / 34
Michael Tunstall (University of Bristol) May/June, 2011 10 / 34
Michael Tunstall (University of Bristol) May/June, 2011 11 / 34
Michael Tunstall (University of Bristol) May/June, 2011 12 / 34
◮ (Time complexity) Michael Tunstall (University of Bristol) May/June, 2011 13 / 34
◮ (Time complexity) Michael Tunstall (University of Bristol) May/June, 2011 14 / 34
Michael Tunstall (University of Bristol) May/June, 2011 15 / 34
Michael Tunstall (University of Bristol) May/June, 2011 16 / 34
Michael Tunstall (University of Bristol) May/June, 2011 17 / 34
Michael Tunstall (University of Bristol) May/June, 2011 18 / 34
Michael Tunstall (University of Bristol) May/June, 2011 19 / 34
◮ For each i ∈ {1, 2, . . ., 9} and j = i + 1.
◮ four bytes of K0 and K5 and one bytes K1 and K4. Michael Tunstall (University of Bristol) May/June, 2011 20 / 34
Michael Tunstall (University of Bristol) May/June, 2011 21 / 34
Michael Tunstall (University of Bristol) May/June, 2011 22 / 34
Michael Tunstall (University of Bristol) May/June, 2011 23 / 34
Michael Tunstall (University of Bristol) May/June, 2011 24 / 34
Michael Tunstall (University of Bristol) May/June, 2011 25 / 34
Michael Tunstall (University of Bristol) May/June, 2011 26 / 34
Michael Tunstall (University of Bristol) May/June, 2011 27 / 34
Michael Tunstall (University of Bristol) May/June, 2011 28 / 34
Michael Tunstall (University of Bristol) May/June, 2011 29 / 34
Michael Tunstall (University of Bristol) May/June, 2011 30 / 34
Michael Tunstall (University of Bristol) May/June, 2011 31 / 34
Michael Tunstall (University of Bristol) May/June, 2011 32 / 34
Michael Tunstall (University of Bristol) May/June, 2011 33 / 34
◮ Applicable to both the Chosen Plaintext and Chosen Difference Models.
Michael Tunstall (University of Bristol) May/June, 2011 34 / 34