Chaskey Cryptanalysis Conclusion
On Chaskey
Work in progress... Gaëtan Leurent
Inria
ESC 2015
Gaëtan Leurent (Inria) On Chaskey ESC 2015 1 / 16
On Chaskey Work in progress... Gatan Leurent (Inria) On Chaskey - - PowerPoint PPT Presentation
Chaskey Cryptanalysis Conclusion On Chaskey Work in progress... Gatan Leurent (Inria) On Chaskey ESC 2015 1 / 16 Gatan Leurent Inria ESC 2015 Chaskey Cryptanalysis ESC 2015 On Chaskey Gatan Leurent (Inria) 2 / 16 Chaskey
Chaskey Cryptanalysis Conclusion
Gaëtan Leurent (Inria) On Chaskey ESC 2015 1 / 16
Chaskey Cryptanalysis Conclusion
▶ 128bit key ▶ 128bit state ▶ Security claim: 248 data, 280 time.
Gaëtan Leurent (Inria) On Chaskey ESC 2015 2 / 16
Chaskey Cryptanalysis Conclusion
5 8 16 7 13 16
Gaëtan Leurent (Inria) On Chaskey ESC 2015 3 / 16
Chaskey Cryptanalysis Conclusion
Gaëtan Leurent (Inria) On Chaskey ESC 2015 4 / 16
Chaskey Cryptanalysis Conclusion
▶ Chaskey becomes an EvenMansour cipher
▶ Boomerang not possible ▶ DifferentialLinear cryptanalysis does not require 𝜌−1 Gaëtan Leurent (Inria) On Chaskey ESC 2015 5 / 16
Chaskey Cryptanalysis Conclusion
▶ Chaskey becomes an EvenMansour cipher
▶ Boomerang not possible ▶ DifferentialLinear cryptanalysis does not require 𝜌−1 Gaëtan Leurent (Inria) On Chaskey ESC 2015 5 / 16
Chaskey Cryptanalysis Conclusion
▶ Let y = E1(x), z = E2(y)
▶ Pr E1(x ⊕ 𝜀) = E1(x) ⊕ 𝛿 = p
▶ Pr 𝛽 • y = 𝛾 • E2(y) = 1
Gaëtan Leurent (Inria) On Chaskey ESC 2015 6 / 16
Chaskey Cryptanalysis Conclusion
▶ Proba for wrong pair is not 1/2 ▶ Many differential trails with same 𝜀 ▶ Many linear trails with same 𝛾
▶ Shorter trails 𝜀 → 𝛿′, 𝛽′ → 𝛾 ▶ Single bit difference 𝛿′ ▶ Single bit mask 𝛽′ ▶ Eval Pr 𝛽′ • (E2(x) ⊕ E2(x ⊕ 𝛿′)) = 1 ▶ Biased output bit, with 1bit input
▶ Select the best single bit 𝛿′, 𝛽′
Gaëtan Leurent (Inria) On Chaskey ESC 2015 7 / 16
Chaskey Cryptanalysis Conclusion
▶ v0[26], v1[26], v2[6, 23, 30], v3[23, 30] → v2[22]
▶ v2[22] → v2[16]
▶ v2[16] → v0[5], v1[23, 31], v2[0, 8, 15], v3[5]
Gaëtan Leurent (Inria) On Chaskey ESC 2015 8 / 16
Chaskey Cryptanalysis Conclusion
▶ Improved linear cryptanalysis of addition [Biham Carmeli, SAC ’14] ▶ Salsa20 Probabilistic Neutral Bits
Gaëtan Leurent (Inria) On Chaskey ESC 2015 9 / 16
Chaskey Cryptanalysis Conclusion
▶ Prx[k] = a[k] ⊕ b[k] ⊕ b[k − 1] = 3/4
Gaëtan Leurent (Inria) On Chaskey ESC 2015 10 / 16
Chaskey Cryptanalysis Conclusion
Gaëtan Leurent (Inria) On Chaskey ESC 2015 10 / 16
Chaskey Cryptanalysis Conclusion
Gaëtan Leurent (Inria) On Chaskey ESC 2015 10 / 16
Chaskey Cryptanalysis Conclusion
Gaëtan Leurent (Inria) On Chaskey ESC 2015 10 / 16
Chaskey Cryptanalysis Conclusion
▶ Filter according to candidate bits ▶ Measure bias
▶ Symmetries allow the reduce the number of filtering bits Gaëtan Leurent (Inria) On Chaskey ESC 2015 11 / 16
Chaskey Cryptanalysis Conclusion
▶ Prx ⊕ x′ = 2k = 1/2
Gaëtan Leurent (Inria) On Chaskey ESC 2015 12 / 16
Chaskey Cryptanalysis Conclusion
Gaëtan Leurent (Inria) On Chaskey ESC 2015 12 / 16
Chaskey Cryptanalysis Conclusion
▶ Encrypt structure of plaintexts, build pairs depending on key guess
Gaëtan Leurent (Inria) On Chaskey ESC 2015 12 / 16
Chaskey Cryptanalysis Conclusion
▶ Filter according to candidate bits ▶ Measure probability
▶ Symmetries allow the reduce the number of filtering bits
Gaëtan Leurent (Inria) On Chaskey ESC 2015 13 / 16
Chaskey Cryptanalysis Conclusion
▶ Implemented ▶ Algorithmic tricks to reduce the time complexity (using counters) ▶ Data complexity: 225 (v. 235) ▶ Time complexity: 229 (elementary operations) ▶ Recovers 13 key bits with high probability
Gaëtan Leurent (Inria) On Chaskey ESC 2015 14 / 16
Chaskey Cryptanalysis Conclusion
▶ p = 2−17
▶ Best bias: v0[31] → v2[20], b ≈ 2−6.1
▶ 𝜁 ≈ 2−7.6
Gaëtan Leurent (Inria) On Chaskey ESC 2015 15 / 16
Chaskey Cryptanalysis Conclusion
▶ Input differential can not affect the full state ▶ DL can analyze fewer rounds backward
▶ Smaller bias with forward rounds Gaëtan Leurent (Inria) On Chaskey ESC 2015 16 / 16