More Accurate Differential Properties of LED64 and Midori64 Ling Sun - - PowerPoint PPT Presentation

more accurate differential properties of led64 and
SMART_READER_LITE
LIVE PREVIEW

More Accurate Differential Properties of LED64 and Midori64 Ling Sun - - PowerPoint PPT Presentation

More Accurate Differential Properties of LED64 and Midori64 Ling Sun 1 , 2 , Wei Wang 1 , Meiqin Wang 1 1. Shandong University, Jinan, China 2. Nanyang Technological University, Singapore FSE 2019, Paris, France @ March 25, 2019 Outline


slide-1
SLIDE 1

More Accurate Differential Properties of LED64 and Midori64

Ling Sun1,2, Wei Wang1, Meiqin Wang1

  • 1. Shandong University, Jinan, China
  • 2. Nanyang Technological University, Singapore

FSE 2019, Paris, France @ March 25, 2019

slide-2
SLIDE 2

Outline

Background & Contribution Preliminaries Automatic Search of Differentials Differential Analysis of the LED64 Block Cipher Differentials of Midori64 Considering Key-Schedule Conclusion

slide-3
SLIDE 3

Background & Contribution

Differential Cryptanalysis

Most fundamental techniques Biham and Shamir @ CRYPTO 1990 More accurate distribution of the fixed-key differential probability

Automatic Search

Automatic tools for the search of differential trails or differentials

Essential Problems

Fixed-key probability of a differential trail Fixed-key probability of a differential when multiple trails are available Weak-key ratio of the differential distinguisher

Contribution

Automatic method based on SAT for the search of differentials Automatically search for right pairs of the STEP functions of LED64 ◮ Improved differential attacks Models for the estimation of the weak-key space of a differential ◮ Applying to the analysis of Midori64

slide-4
SLIDE 4

Outline

Background & Contribution Preliminaries Automatic Search of Differentials Differential Analysis of the LED64 Block Cipher Differentials of Midori64 Considering Key-Schedule Conclusion

slide-5
SLIDE 5

Preliminaries

Differential Cryptanalysis

An r-round differential characteristic/trail C = (C0, C1, . . . , Cr). The differential probability (DP) of a differential (α, β) is

DPf (α, β) = {x ∈ Fn

2 | f (x) ⊕ f (x ⊕ α) = β}

2n .

◮ For a keyed function f (·, k): DPf [k](α, β) & DPf [k](C) Expected differential probability (EDP):

EDPf (α, β) = mean

k∈K

  • DPf [k](α, β)
  • .

The weight of a differential or a trail:

− log2 (EDPf (α, β)) .

slide-6
SLIDE 6

Preliminaries

Markov Cipher Theory (Lai et al. @ EUROCRYPT 1991)

A Markov cipher is an iterative cipher for which the average differential

probability over one round is independent of the input of the round function.

Ci−1 fi Ci fi+1 Ci+1

With the assumption of independent round keys, we have

EDPf (C) =

r

  • i=1

EDPfi (Ci−1, Ci), EDPf (α, β) =

  • C0=α,Cr =β

EDPf (C).

Since Markov cipher is an ideal primitive, the EDP may deviate from the

real differential probability. Hypothesis of Stochastic Equivalence For all differentials (α, β), it holds that for most values of the key k, DPf [k](α, β) = EDPf (α, β).

slide-7
SLIDE 7

Preliminaries

Distribution of the Fixed-key Probability

Theorem 1 (Daemen and Rijmen @ 2007) In a key-alternating cipher f (·, k), the fixed-key cardinality Nf [k](α, β) of a differential (α, β) is a stochastic variable with the following distribution: Pr(Nf [k](α, β) = i) ≈ Poisson(i; 2n−1EDP(α, β)), where the distribution function measures the probability over all possible values

  • f the key and all possible choices of the key schedule.

ki−1 fi ki fi+1 ki+1

0.5 2n−1EDP(α, β)

Since the key-alternating cipher is an abstract of the real cipher, the

distribution might not fit the real one, entirely.

We call the keys fulfilling N[k](α, β) 2n−1EDP(α, β) the weak-keys. The set of weak-keys is denoted as WK(α, β).

slide-8
SLIDE 8

Outline

Background & Contribution Preliminaries Automatic Search of Differentials Differential Analysis of the LED64 Block Cipher Differentials of Midori64 Considering Key-Schedule Conclusion

slide-9
SLIDE 9

Automatic Search of Differentials

Main Idea

SAT Problem

The boolean satisfiability problem (SAT) considers the satisfiability of a

given Boolean formula.

Cryptominisat ◮ Compatible with the XOR operation ◮ The usage of searching for multiple solutions

P-layer S-layer Objective Function Model Model Model CNF SAT Solver Trail Differential

slide-10
SLIDE 10

Automatic Search of Differentials

Main Idea

P-layer S-layer Objective Function Model Model Model CNF SAT Solver Trail Differential

The number of solutions handled by the solver is determined by the

individual SAT problem.

According to our experience, 232 is an upper-bound. The crucial problem is how to use these trails to conduct differential

cryptanalysis more accurately.

slide-11
SLIDE 11

Outline

Background & Contribution Preliminaries Automatic Search of Differentials Differential Analysis of the LED64 Block Cipher Differentials of Midori64 Considering Key-Schedule Conclusion

slide-12
SLIDE 12

Differential Analysis of the LED64 Block Cipher

Main Idea

Computing the probability

  • f a differential

Equivalent

Searching for the right pairs

  • f a differential

Differential Trail 0 Trail 1

. . .

Trail m − 1

Planar mapping

Constraints on the values

  • f the right pairs

Planar mapping

Constraints on the values

  • f the right pairs

Planar mapping

Constraints on the values

  • f the right pairs

SAT solver

Right pairs for Trail 0 Right pairs for Trail 1 Right pairs for Trail 1 Right pairs for the differential

slide-13
SLIDE 13

Differential Analysis of the LED64 Block Cipher

Planar Differentials and Maps

For the differential (α, β) of the function f ,

Ff (α, β) = {x | f (x) ⊕ f (x ⊕ α) = β}, Gf (α, β) = {y | y = f (x), x ∈ Ff (α, β)}.

(α, β) is called a planar differential if Ff (α, β) and Gf (α, β) are affine

subspaces.

A mapping is planar if all differentials over it are planar. The S-layer composed of the parallel applications of S-boxes is planar

when all the S-boxes have differential uniformity of 4. ∆xi xi S yi ∆yi P ki ∆xi+1 xi+1 S yi+1 ∆yi+1 P ki+1 ∆xi+2 xi+2 xi ∈ FS(∆xi, ∆y i) if and only if Mati

F · xi = Veci F,

y i ∈ GS(∆xi, ∆y i) if and only if Mati

G · y i = Veci G.

slide-14
SLIDE 14

Differential Analysis of the LED64 Block Cipher

Constraints for the Right Pairs

AC (ci) ∆xi xi SC ∆yi yi SR MC

  • Mati

G

Mati+1

F

· P

  • ·
  • y i

=

  • Veci

G

Veci+1

F

⊕ Mati+1

F

· ci+1

  • .

y i = SC(xi). xi+1 = MC ◦ SR(y i) ⊕ ci+1. Framework for the Search of Right Pairs

To obtain the right pairs of a given differential ◮ Searching for many characteristics within the differential ◮ Generating MatG, MatF, VecG and VecF corresponding to the

differential trail

◮ Applying SAT solver to get the right pairs for every trail

slide-15
SLIDE 15

Differential Analysis of the LED64 Block Cipher

Improved Differential Attacks

3-STEP Related-key Attack for LED64 (Mendel et al. @ ASIACRYPT 2012)

∆ ⊕ ∆∗ ∆ Fi

∆∗ → ∆

∆ Fi+1

Probability 1

∆ Fi+2

∆ → ?

∆ ∆C

259.00 ց 256.50 4-STEP Related-key Attack for LED64 (Mendel et al. @ ASIACRYPT 2012)

∆ ∆ Fi

Probability 1

∆ Fi+1

∆ → ∆

∆ Fi+2

Probability 1

∆ Fi+3

∆ → ?

∆ ∆C

262.71 ց 260.82 5-STEP Related-key Attack for LED64 (Nikolić et al. @ FSE 2013)

∆ ∆ Fi

Probability 1

∆ Fi+1 ∆ Fi+2 ∆ Fi+3

Probability 1

∆ Fi+4

∆ → ∆∗

∆ ∆C

Meet-in-the-middle

260.20 ց 257.70

slide-16
SLIDE 16

Outline

Background & Contribution Preliminaries Automatic Search of Differentials Differential Analysis of the LED64 Block Cipher Differentials of Midori64 Considering Key-Schedule Conclusion

slide-17
SLIDE 17

Differentials of Midori64 Considering Key-Schedule

Outline

Differential Trail 0 Trail 1

. . .

Trail m − 1

Designer View Attacker View

V (0)

K

V (1)

K

V (m−1)

K

K Minimising the weak-key ratio

V (0)

K

V (1)

K

V (m−1)

K

K Detecting the maximum number

  • f compatible characteristics

V (0)

K

V (1)

K

V (m−1)

K

K

slide-18
SLIDE 18

Weak-key Space of a Differential

∆xi xi S yi ∆yi P ki ∆xi+1 xi+1 S yi+1 ∆yi+1 P ki+1 ∆xi+2 xi+2 y i ∈ GS(∆xi, ∆y i) if and only if Mati

G · y i = Veci G.

Mati+1

F

· xi+1 = Mati+1

F

·

  • P · y i ⊕ ki

= Mati+1

F

· P · y i ⊕ Mati+1

F

· ki = Veci+1

F

. ⇒

  • Mati

U

Mati

K

  • ·

y i ki

  • =

Veci

U

Veci

K

  • .

Necessary Condition

The i-th subkey ki falls into the affine space {x | Mati

K · x = Veci K}.

For an r-round differential consisting of m characteristics, if a particular

key leads all m characteristics to become impossible trails, the differential under this fixed-key turns into an impossible differential.

For the differential (α, β), we denote the set of these keys as IK(α, β),

which satisfies WK(α, β) ⊆ K − IK(α, β).

slide-19
SLIDE 19

Upper-Bound for Weak-key Ratio of Differential

Estimating the Cardinality of the Weak-key Space

WK(α, β) ⊆

m−1

  • j=0

V (j)

K .

Pr{K | K ∈

m−1

  • j=0

V (j)

K }: a natural

upper-bound for the weak-key ratio.

V (0)

K

V (1)

K

V (m−1)

K

K By De Morgan’s laws, we know

K −

m−1

  • j=0

V (j)

K

=

m−1

  • j=0
  • K − V (j)

K

  • .

Main idea: converting the restrictions on the set into clauses in CNF.

slide-20
SLIDE 20

Upper-Bound for Weak-key Ratio of Differential

4-round Differentials with Weak-key Ratio Lower than 50%

The First Example 0x0022022202200202 → 0x2220000022022022.

Pr

  • K
  • K ∈ K −

m−1

  • j=0

V (j)

K

  • ≈ 78.64%.

The weak-key ratio for this differential is less than 21.36%. The experimental results illustrate that the probability for a fixed-key with

no right pair is about 78.66%. The Second Example 0x7000000000a0000a → 0x5ffa05ff5faf00aa.

Pr

  • K
  • K ∈ K −

m−1

  • j=0

V (j)

K

  • ≈ 96.06%.

For 96.06% of the keys, the differential is an impossible one. The experimental results illustrate that the probability for a fixed-key with

no right pair is about 96.09%.

slide-21
SLIDE 21

Maximum Number of Compatible Characteristics

Max-PoSSo Problem

F = {f0(x), f1(x), . . . , fm−1(x)}, where

fi(x)’s are polynomial functions over Fn

2,

x ∈ Fn

2.

The Max-PoSSo problem is to find any

x ∈ Fn

2 that satisfies the maximum

number of polynomials in F.

V (0)

K

V (1)

K

V (m−1)

K

K If fj(K) denotes fj(K) = M(j) · K ⊕ V (j), we know

K ∈ V (j)

K

if and only if fj(K) = 0.

Determining the maximum

number of compatible characteristics

Finding K under which the

number of functions following fj(K) = 0 is maximised

We use an automatic method based on SAT to settle this problem.

slide-22
SLIDE 22

Maximum Number of Compatible Characteristics

Application

#{Trails} 212 211 208 128 #{Groups} 3 4 1 8 Rank 15 15 15 16 EDPP 2−16 2−16 2−16 2−18 The EDP on the eight subspaces is improved to 2−16 (EDP = 2−23.79). For a randomly drawn key, the possibility that the EDP of the differential

under this key is no less than 2−16 is at least 2−15 × 8 = 2−12.

To verify the validity of this probability, we do some tests for the

randomly selected keys. The probability is about 2−12.18.

50 100 150 8 10 12 14 16 log2#(Right Pairs) The number of keys
slide-23
SLIDE 23

Outline

Background & Contribution Preliminaries Automatic Search of Differentials Differential Analysis of the LED64 Block Cipher Differentials of Midori64 Considering Key-Schedule Conclusion

slide-24
SLIDE 24

Conclusion

Automatic method based on SAT for the search of differentials Automatically search for right pairs of the STEP functions of LED64 ◮ Improved differential attacks Models for the estimation of the weak-key space of a differential ◮ Applying to the analysis of Midori64

Discussion

All automatic methods can be generalised to analyse other ciphers. For some lightweight block ciphers with a simple key schedule, we need to

pay more attention to the analysis of the differential.

How to utilise automatic tools to provide more precise evaluation for the

linear hull effect considering the key schedule is an open problem.

slide-25
SLIDE 25

Thank you for your attention!