On Reverse-Engineering S-Boxes Alex Biryukov 1 , Lo Perrin 1 , - - PowerPoint PPT Presentation

on reverse engineering s boxes
SMART_READER_LITE
LIVE PREVIEW

On Reverse-Engineering S-Boxes Alex Biryukov 1 , Lo Perrin 1 , - - PowerPoint PPT Presentation

On Reverse-Engineering S-Boxes Alex Biryukov 1 , Lo Perrin 1 , Aleksei Udovenko 1 1 SnT, University of Luxembourg https://www.cryptolux.org March 28, 2017 CryptoAction Symposium 2017 Introduction S-Box? An S-Box is a small non-linear function


slide-1
SLIDE 1

On Reverse-Engineering S-Boxes

Alex Biryukov1, Léo Perrin1, Aleksei Udovenko1

1SnT, University of Luxembourg

https://www.cryptolux.org

March 28, 2017

CryptoAction Symposium 2017

slide-2
SLIDE 2

Introduction

S-Box?

An S-Box is a small non-linear function mapping m bits to n usually specified via its look-up table.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 1 / 28

slide-3
SLIDE 3

Introduction

S-Box?

An S-Box is a small non-linear function mapping m bits to n usually specified via its look-up table. Typically, m = n, n ∈ {4, 8} Used by many block ciphers/hash functions/stream ciphers. Necessary for the wide trail strategy.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 1 / 28

slide-4
SLIDE 4

Introduction

Example

Screen capture from [GOST, 2015].

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 2 / 28

slide-5
SLIDE 5

Introduction

S-Box Design

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 3 / 28

slide-6
SLIDE 6

Introduction

S-Box Design

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 3 / 28

slide-7
SLIDE 7

Introduction

S-Box Design

AES → ← Whirlpool ← Scream

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 3 / 28

slide-8
SLIDE 8

Introduction

S-Box Reverse-Engineering

s

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 4 / 28

slide-9
SLIDE 9

Introduction

S-Box Reverse-Engineering

s

? ? ?

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 4 / 28

slide-10
SLIDE 10

Talk Outline

Outline

1

Introduction

2

Mathematical Background

3

Detailed Analysis of the Two Tables

4

TU-Decomposition

5

Conclusion

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 5 / 28

slide-11
SLIDE 11

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Plan

1

Introduction

2

Mathematical Background The Two Tables Coefficients Distribution

3

Detailed Analysis of the Two Tables

4

TU-Decomposition

5

Conclusion

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 5 / 28

slide-12
SLIDE 12

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

The Two Tables

Let S : Fn

2 → Fn 2 be an S-Box.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 6 / 28

slide-13
SLIDE 13

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

The Two Tables

Let S : Fn

2 → Fn 2 be an S-Box.

Definition (DDT)

The Difference Distribution Table of f is a matrix of size 2n × 2n such that DDT[a, b] = #{x ∈ Fn

2 | S (x ⊕ a) ⊕ S(x) = b}.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 6 / 28

slide-14
SLIDE 14

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

The Two Tables

Let S : Fn

2 → Fn 2 be an S-Box.

Definition (DDT)

The Difference Distribution Table of f is a matrix of size 2n × 2n such that DDT[a, b] = #{x ∈ Fn

2 | S (x ⊕ a) ⊕ S(x) = b}.

Definition (LAT)

The Linear Approximations Table of S is a matrix of size 2n × 2n such that LAT[a, b] = #{x ∈ Fn

2 | x · a = S(x) · b} − 2n−1.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 6 / 28

slide-15
SLIDE 15

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Example

S = [4, 2, 1, 6, 0, 5, 7, 3] The DDT of S.                

8 2 2 2 2 2 2 2 2 4 4 2 2 2 2 4 4 4 4 2 2 2 2

                The LAT of S.                

4 2 2 2 −2 2 2 2 −2 2 2 −2 2 2 −2 −2 −2 −2 2 −2 −2 −2 2 −2 −2 −4

               

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 7 / 28

slide-16
SLIDE 16

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Coefficient Distribution in the DDT

If an n-bit S-Box is bijective, then its DDT coefficients behave like independent and identically distributed random variables following a Poisson distribution: Pr [DDT[a, b] = 2z] = e−1/2 2zz .

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 8 / 28

slide-17
SLIDE 17

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Coefficient Distribution in the LAT

If an n-bit S-Box is bijective, then its LAT coefficients behave like independent and identically distributed random variables following this distribution: Pr [LAT[a, b] = 2z] = 2n−1

2n−2+z

  • 2n

2n−1

.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 9 / 28

slide-18
SLIDE 18

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Plan

1

Introduction

2

Mathematical Background

3

Detailed Analysis of the Two Tables Maximum Values in the Tables Application to Skipjack

4

TU-Decomposition

5

Conclusion

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 9 / 28

slide-19
SLIDE 19

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Looking Only at the Maximum

δ log2 (Pr [max(D) ≤ δ]) 4

  • 1359.530

6

  • 164.466

8

  • 16.148

10

  • 1.329

12

  • 0.094

14

  • 0.006

DDT ℓ log2 (Pr [max(L) ≤ ℓ]) 22

  • 371.609

24

  • 161.900

26

  • 66.415

28

  • 25.623

30

  • 9.288

32

  • 3.160

34

  • 1.008

36

  • 0.302

38

  • 0.084

LAT Probability that the maximum coefficient in the DDT/LAT of an 8-bit permutation is at most equal to a certain threshold.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 10 / 28

slide-20
SLIDE 20

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Taking Number of Maximum Values into Account

−160 −140 −120 −100 −80 −60 −40 −20

N30

5 10 15

Probability (log2)

−160 −140 −120 −100 −80 −60 −40 −20

N26

10 20 30 40 50 60 70 −160 −140 −120 −100 −80 −60 −40 −20

N28

10 20 30

Pr [max(LAT) = 24], Pr [max(LAT) = 26], Pr [max(LAT) = 28], Pr [max(LAT) = 30]

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 11 / 28

slide-21
SLIDE 21

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

What is Skipjack? (1/2)

Type Block cipher Bloc 64 bits Key 80 bits Authors NSA Publication 1998

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 12 / 28

slide-22
SLIDE 22

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

What is Skipjack? (2/2)

Skipjack was supposed to be secret... ... but eventually published in 1998 [National Security Agency, 1998],

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 13 / 28

slide-23
SLIDE 23

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

What is Skipjack? (2/2)

Skipjack was supposed to be secret... ... but eventually published in 1998 [National Security Agency, 1998], It uses a 8 × 8 S-Box (F) specified only by its LUT,

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 13 / 28

slide-24
SLIDE 24

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

What is Skipjack? (2/2)

Skipjack was supposed to be secret... ... but eventually published in 1998 [National Security Agency, 1998], It uses a 8 × 8 S-Box (F) specified only by its LUT, Skipjack was to be used by the Clipper Chip.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 13 / 28

slide-25
SLIDE 25

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

What is Skipjack? (2/2)

Skipjack was supposed to be secret... ... but eventually published in 1998 [National Security Agency, 1998], It uses a 8 × 8 S-Box (F) specified only by its LUT, Skipjack was to be used by the Clipper Chip.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 13 / 28

slide-26
SLIDE 26

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Reverse-Engineering F

For Skipjack, max(LAT) = 28 and #28 = 3.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 14 / 28

slide-27
SLIDE 27

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Reverse-Engineering F

For Skipjack, max(LAT) = 28 and #28 = 3.

−160 −140 −120 −100 −80 −60 −40 −20

N30

5 10 15

Probability (log2)

−160 −140 −120 −100 −80 −60 −40 −20

N26

10 20 30 40 50 60 70 −160 −140 −120 −100 −80 −60 −40 −20

N28

10 20 30

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 14 / 28

slide-28
SLIDE 28

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Reverse-Engineering F

For Skipjack, max(LAT) = 28 and #28 = 3.

−160 −140 −120 −100 −80 −60 −40 −20

N30

5 10 15 −160 −140 −120 −100 −80 −60 −40 −20

N28

10 20 30

Probability (log2)

−160 −140 −120 −100 −80 −60 −40 −20

N26

10 20 30 40 50 60 70

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 14 / 28

slide-29
SLIDE 29

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Reverse-Engineering F

For Skipjack, max(LAT) = 28 and #28 = 3.

−160 −140 −120 −100 −80 −60 −40 −20

N30

5 10 15 −160 −140 −120 −100 −80 −60 −40 −20

N28

10 20 30

Probability (log2)

−160 −140 −120 −100 −80 −60 −40 −20

N26

10 20 30 40 50 60 70

Pr [max(LAT) = 28 and #28 = 3] ≈ 2−55

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 14 / 28

slide-30
SLIDE 30

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

What Can We Deduce?

F has not been picked uniformly at random. F has not been picked among a feasibly large set of random S-Boxes. Its linear properties were optimized (though poorly).

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 15 / 28

slide-31
SLIDE 31

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

What Can We Deduce?

F has not been picked uniformly at random. F has not been picked among a feasibly large set of random S-Boxes. Its linear properties were optimized (though poorly). The S-Box of Skipjack was built using a dedicated algorithm.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 15 / 28

slide-32
SLIDE 32

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion for Skipjack

F

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 16 / 28

slide-33
SLIDE 33

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Plan

1

Introduction

2

Mathematical Background

3

Detailed Analysis of the Two Tables

4

TU-Decomposition Principle Results on Kuznyechik/Streebog

5

Conclusion

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 16 / 28

slide-34
SLIDE 34

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

TU-Decomposition in a Nutshell

1 Identify linear paterns in zeroes of

LAT;

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 17 / 28

slide-35
SLIDE 35

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

TU-Decomposition in a Nutshell

1 Identify linear paterns in zeroes of

LAT;

2 Deduce linear layers µ,η such that

π is decomposed as in right picture; T U µ η

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 17 / 28

slide-36
SLIDE 36

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

TU-Decomposition in a Nutshell

1 Identify linear paterns in zeroes of

LAT;

2 Deduce linear layers µ,η such that

π is decomposed as in right picture;

3 Decompose U, T;

T U µ η

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 17 / 28

slide-37
SLIDE 37

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

TU-Decomposition in a Nutshell

1 Identify linear paterns in zeroes of

LAT;

2 Deduce linear layers µ,η such that

π is decomposed as in right picture;

3 Decompose U, T; 4 Put it all together.

T U µ η

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 17 / 28

slide-38
SLIDE 38

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Kuznyechik/Stribog

Stribog

Type Hash function Publication [GOST, 2012]

Kuznyechik

Type Block cipher Publication [GOST, 2015]

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 18 / 28

slide-39
SLIDE 39

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Kuznyechik/Stribog

Stribog

Type Hash function Publication [GOST, 2012]

Kuznyechik

Type Block cipher Publication [GOST, 2015]

Common ground

Both are standard symmetric primitives in Russia. Both were designed by the FSB (TC26). Both use the same 8 × 8 S-Box, π.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 18 / 28

slide-40
SLIDE 40

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

The LAT of π

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 19 / 28

slide-41
SLIDE 41

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

The LAT of η ◦ π ◦ µ

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 20 / 28

slide-42
SLIDE 42

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Final Decomposition Number 1

ω σ ϕ ⊙ ν1 ν0 I ⊙ α ⊙ Multiplication in F24 α Linear permutation I Inversion in F24 ν0,ν1,σ 4 × 4 permutations ϕ 4 × 4 function ω Linear permutation

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 21 / 28

slide-43
SLIDE 43

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Final Decomposition Number 1

ω σ ϕ ⊙ ν1 ν0 I ⊙ α ⊙ Multiplication in F24 α Linear permutation I Inversion in F24 ν0,ν1,σ 4 × 4 permutations ϕ 4 × 4 function ω Linear permutation P[ν1(x ⊕ 0x9) ⊕ ν1(x) = 0x2] = 1

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 21 / 28

slide-44
SLIDE 44

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion for Kuznyechik/Stribog?

The Russian S-Box was built like a strange Feistel...

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 22 / 28

slide-45
SLIDE 45

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion for Kuznyechik/Stribog?

The Russian S-Box was built like a strange Feistel... ... or was it?

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 22 / 28

slide-46
SLIDE 46

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion for Kuznyechik/Stribog?

The Russian S-Box was built like a strange Feistel... ... or was it?

Belarussian inspiration

The last standard of Belarus [STB 34.101.31-2011, 2011] uses an 8-bit S-box, somewhat similar to π...

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 22 / 28

slide-47
SLIDE 47

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion for Kuznyechik/Stribog?

The Russian S-Box was built like a strange Feistel... ... or was it?

Belarussian inspiration

The last standard of Belarus [STB 34.101.31-2011, 2011] uses an 8-bit S-box, somewhat similar to π... ... based on a finite field exponential!

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 22 / 28

slide-48
SLIDE 48

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion for Kuznyechik/Stribog?

The Russian S-Box was built like a strange Feistel... ... or was it?

Belarussian inspiration

The last standard of Belarus [STB 34.101.31-2011, 2011] uses an 8-bit S-box, somewhat similar to π... ... based on a finite field exponential!

Exponential in π

π ◦ exp has max(DDT) = 128 (Pr < 2−340) and a TU-decomposition!

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 22 / 28

slide-49
SLIDE 49

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Final Decomposition Number 2 (!)

ω′ ⊗ −1 ⊞ q′ logw,16 T

0 1 2 3 4 5 6 7 8 9 a b c d e f T0 0 1 2 3 4 5 6 7 8 9 a b c d e f T1 0 1 2 3 4 5 6 7 8 9 a b c d e f T2 0 1 2 3 4 5 6 7 8 9 a b c d f e T3 0 1 2 3 4 5 6 7 8 9 a b c f d e T4 0 1 2 3 4 5 6 7 8 9 a b f c d e T5 0 1 2 3 4 5 6 7 8 9 a f b c d e T6 0 1 2 3 4 5 6 7 8 9 f a b c d e T7 0 1 2 3 4 5 6 7 8 f 9 a b c d e T8 0 1 2 3 4 5 6 7 f 8 9 a b c d e T9 0 1 2 3 4 5 6 f 7 8 9 a b c d e Ta 0 1 2 3 4 5 f 6 7 8 9 a b c d e Tb 0 1 2 3 4 f 5 6 7 8 9 a b c d e Tc 0 1 2 3 f 4 5 6 7 8 9 a b c d e Td 0 1 2 f 3 4 5 6 7 8 9 a b c d e Te 0 1 f 2 3 4 5 6 7 8 9 a b c d e Tf 0 f 1 2 3 4 5 6 7 8 9 a b c d e

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 23 / 28

slide-50
SLIDE 50

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion on Kuznyechik/Stribog

π

Feistel-like Exponential-like

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 24 / 28

slide-51
SLIDE 51

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion on Kuznyechik/Stribog

π

Feistel-like Exponential-like

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 24 / 28

slide-52
SLIDE 52

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion on Kuznyechik/Stribog

π

Feistel-like Exponential-like

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 24 / 28

slide-53
SLIDE 53

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion on Kuznyechik/Stribog

Feistel-like Exponential-like

?

? ?

??

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 24 / 28

slide-54
SLIDE 54

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Plan

1

Introduction

2

Mathematical Background

3

Detailed Analysis of the Two Tables

4

TU-Decomposition

5

Conclusion

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 24 / 28

slide-55
SLIDE 55

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

For More Information (1/2)

Theoretical background + S-Box of Skipjack

Biryukov, A. and Perrin, L. (2015). On Reverse-Engineering S-Boxes with Hidden Design Criteria or Structure. In Advances in Cryptology – CRYPTO 2015, pages 116–140

S-Box of Stribog/Kuznechik (Feistel)

Biryukov, A., Perrin, L., and Udovenko, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In Advances in Cryptology – EUROCRYPT 2016, pages 372–402

S-Box of Stribog/Kuznechik (Exponential)

Perrin, L. and Udovenko, A. (2017). Exponential S-boxes: a link between the S-boxes

  • f BelT and Kuznyechik/Streebog.

IACR Transactions on Symmetric Cryptology, 2016(2):99–124

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 25 / 28

slide-56
SLIDE 56

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

For More Information (2/2)

APN Permutation

Perrin, L., Udovenko, A., and Biryukov, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In Advances in Cryptology – CRYPTO 2016, pages (93–122)

Online

1

https://eprint.iacr.org/2015/976 (Skipjack)

2

https://eprint.iacr.org/2016/071 (Stribog/Kuznechik 1)

3

https://eprint.iacr.org/2016/539 (6-bit APN)

4

http://tosc.iacr.org/index.php/ToSC/article/view/567/509 (Stribog/Kuznechik 2)

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 26 / 28

slide-57
SLIDE 57

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion

We can recover a lot from an LUT white-box crypto is all the hardest, we can use cryptanalysis to discover new math results, secret services’ algorithms are all the more suspicious!

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 27 / 28

slide-58
SLIDE 58

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Conclusion

We can recover a lot from an LUT white-box crypto is all the hardest, we can use cryptanalysis to discover new math results, secret services’ algorithms are all the more suspicious!

Nothing-up-my-sleeve

Always justify your constants!

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 27 / 28

slide-59
SLIDE 59

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Open Positions @ uni.lu

post-doc in real-world crypto/blockchain/ privacy post-doc in lightweight crypto and side-channel atacks (FDISC project) PhDs in applied crypto (PRIDE project) https://www.cryptolux.org/index.php/Home

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 28 / 28

slide-60
SLIDE 60

Introduction Mathematical Background Detailed Analysis of the Two Tables TU-Decomposition Conclusion

Open Positions @ uni.lu

post-doc in real-world crypto/blockchain/ privacy post-doc in lightweight crypto and side-channel atacks (FDISC project) PhDs in applied crypto (PRIDE project) https://www.cryptolux.org/index.php/Home Thank you!

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 28 / 28

slide-61
SLIDE 61

Appendix

Details About Skipjack

Number of occurrences

100 200 300

Absolute value of the coefficients in the LAT

22 23 24 25 26 27 28

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 1 / 4

slide-62
SLIDE 62

Appendix

Bibliography I

Biryukov, A. and Perrin, L. (2015). On Reverse-Engineering S-Boxes with Hidden Design Criteria

  • r Structure.

In Advances in Cryptology – CRYPTO 2015, pages 116–140. Biryukov, A., Perrin, L., and Udovenko, A. (2016). Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1. In Advances in Cryptology – EUROCRYPT 2016, pages 372–402. GOST (2012). Gost r 34.11-2012: Streebog hash function. https://www.streebog.net/.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 2 / 4

slide-63
SLIDE 63

Appendix

Bibliography II

GOST (2015). (GOST R 34.12–2015) information technology – cryptographic data security – block ciphers. http: //tc26.ru/en/standard/gost/GOST_R_34_12_2015_ENG.pdf. National Security Agency, N. S. A. (1998). SKIPJACK and KEA Algorithm Specifications. Perrin, L. and Udovenko, A. (2017). Exponential S-boxes: a link between the S-boxes of BelT and Kuznyechik/Streebog. IACR Transactions on Symmetric Cryptology, 2016(2):99–124.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 3 / 4

slide-64
SLIDE 64

Appendix

Bibliography III

Perrin, L., Udovenko, A., and Biryukov, A. (2016). Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem. In Advances in Cryptology – CRYPTO 2016, pages (93–122). STB 34.101.31-2011 (2011). “Information technologies. Data protection. Cryptographic algorithms for encryption and integrity control.”. State Standard of Republic of Belarus (STB 34.101.31-2011). http://apmi.bsu.by/assets/files/std/belt-spec27.pdf.

Biryukov, Perrin, Udovenko On Reverse-Engineering S-Boxes 4 / 4