, R ADIO G ATN , a belt-and-mill hash function a belt-and-mill - - PowerPoint PPT Presentation

r adio g at n a belt and mill hash function a belt and
SMART_READER_LITE
LIVE PREVIEW

, R ADIO G ATN , a belt-and-mill hash function a belt-and-mill - - PowerPoint PPT Presentation

R ADIO G ATN , R ADIO G ATN , a belt-and-mill hash function a belt-and-mill hash function Guido Bertoni, Joan Daemen, Michal Peeters * and Gilles Van Assche STMicroelectronics * De Valck Consultants Second Cryptographic Hash Workshop


slide-1
SLIDE 1

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN,

, a belt-and-mill hash function a belt-and-mill hash function

Guido Bertoni, Joan Daemen, Michaël Peeters* and Gilles Van Assche

STMicroelectronics

*De Valck Consultants

slide-2
SLIDE 2

Second Cryptographic Hash Workshop

Introduction Introduction

  • New hash function (family)
  • Alternative design
  • Not based on fixed-length comp. function (Damgård-Merkle)
  • Not based on reduction

 Variable-length input, variable-length output

  • Diversity
  • Building upon PANAMA
  • Generalizing collision-generating attack [Rijmen et al.]
  • Simplify and strengthen
  • Performance in SW and HW
slide-3
SLIDE 3

Second Cryptographic Hash Workshop

Alternating-input construction Alternating-input construction

  • State
  • Starts from 0
  • Iterate with input blocks
  • Input mapping
  • State size > input block size (li)
  • Do blank iterations
  • Iterate with output blocks
  • Output mapping
  • Fixed number for hash function

Input block Round Input block Round ... Round Round Output block Round Output block ... Blank iterations

slide-4
SLIDE 4

Second Cryptographic Hash Workshop

Belt-and-mill structure Belt-and-mill structure

  • State = (mill, belt)
  • Mill function
  • Non-linear function
  • Diffusion and confusion
  • Belt function
  • Linear function
  • Long-term diffusion
  • Belt-to-mill + mill-to-belt
  • Bell + milt
  • Linear mappings

Mill Belt Input mapping Mill function Bell Milt Belt function

slide-5
SLIDE 5

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN

Mill Belt Input mapping Mill function Bell Milt Belt function

  • Parameter: word size
  • RADIOGATÚN[32]
  • RADIOGATÚN[64]

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping

slide-6
SLIDE 6

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN

Mill Belt Input mapping Mill function Bell Milt Belt function

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping

slide-7
SLIDE 7

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN

Mill Belt Input mapping Mill function Bell Milt Belt function

  • The mill function contains:
  • Bitwise logical operations (XOR, AND, NOT)
  • Cyclic shifts

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping

slide-8
SLIDE 8

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN

Mill Belt Input mapping Mill function Bell Milt Belt function

  • The mill function contains:
  • Bitwise logical operations (XOR, AND, NOT)
  • Cyclic shifts

° ¼ µ

a10 a11 a12 a13 a14 a15 a16 a17 a18 a0 a1 a2 a3 a4 a5 a6 a7 a8 a9 A10 A11 A12 A13 A14 A15 A16 A17 A18 A0 A1 A2 A3 A5 A4 A6 A7 A8 A9

1 3 6 10 15 21 28 36 45 55 66 78 91 105 120 136 153 171

slide-9
SLIDE 9

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN

Mill Belt Input mapping Mill function Bell Milt Belt function

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping

slide-10
SLIDE 10

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN

Mill Belt Input mapping Mill function Bell Milt Belt function

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping

slide-11
SLIDE 11

Second Cryptographic Hash Workshop

R RADIO

ADIOG

GATÚN

ATÚN

Mill Belt Input mapping Mill function Bell Milt Belt function

1 2 3 4 5 6 7 8 9 10 11 13 14 15 16 17 18 2 1 1 2 3 4 5 6 7 8 9 1 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 Mill Function Belt Mill Input Block Belt Function Input Mapping 12

slide-12
SLIDE 12

Second Cryptographic Hash Workshop

Differential trails Differential trails

  • Differential trail
  • State differences + input differences
  • Used to find an internal collision
  • Weight
  • Negative (binary) logarithm of probability

s0

p0

Round ... DP

t0 s0

Round DP

t0 s0

Round DP

t0 s0

p0 p0

slide-13
SLIDE 13

Second Cryptographic Hash Workshop

Trail backtracking Trail backtracking

  • Propagate difference
  • Through each round
  • Only if right pair
  • weight > li : fraction thru
  • weight ≤ li : pair creation
  • Complexity
  • Lonesome round
  • Crowded round
  • Backtracking cost
  • Also for algebraic attacks

crowded round lonesome round weight input blocks right pairs coming out (neg. log.) right pairs entering (neg. log.) rounds backtracking cost

slide-14
SLIDE 14

Second Cryptographic Hash Workshop

Analysis Analysis

  • RADIOGATÚN[1, 2, 4, …] useful for analysis
  • Explicit search of collisions
  • Differential trails with lowest complexity
  • Trail for RADIOGATÚN[1] extends to RADIOGATÚN[n]
  • Symmetry destroyed in the mill
  • Specific trails for RADIOGATÚN[n] may exist with lower cost
  • Other aspects
  • Fixed points
  • Algebraic attacks on RADIOGATÚN[1, 2, 3, 4, …, 64]
  • Ongoing
  • Prove bounds
slide-15
SLIDE 15

Second Cryptographic Hash Workshop

Performance Performance

  • Extremely fast in hardware
  • Fast in software

270 55 RADIOGATÚN[64] 175 120 RADIOGATÚN[32] 288 480 PANAMA 80 65 SHA-256 91 90 SHA-1 Linux (x86_64) GCC 3.3.5 Windows (32 bits) Visual Studio 2005

Dell Precision 670 with Intel Xeon 3GHz (in Mbyte/sec)

slide-16
SLIDE 16

Second Cryptographic Hash Workshop

Conclusion Conclusion

  • Belt-and-mill structure
  • Simplicity (analysis)
  • RADIOGATÚN
  • Performance
  • Existence of toy cipher (analysis)
  • No patent
  • Analysis ongoing
  • Do not hesitate to attack!
  • See security claims in RADIOGATÚN paper

http://radiogatun.noekeon.org