Related-Tweak Statistical Saturation Cryptanalysis and Its - - PowerPoint PPT Presentation

related tweak statistical saturation cryptanalysis and
SMART_READER_LITE
LIVE PREVIEW

Related-Tweak Statistical Saturation Cryptanalysis and Its - - PowerPoint PPT Presentation

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Muzhou Li Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University, China Joint work with Kai Hu, Meiqin Wang March 27,


slide-1
SLIDE 1

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA

Muzhou Li

Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University, China Joint work with Kai Hu, Meiqin Wang March 27, 2019 @ Paris

slide-2
SLIDE 2

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Motivation and Contributions

Outline

1

Motivation and Contributions

2

KDIB Technique in Key-Alternating Ciphers

3

Related-Tweak Statistical Saturation Cryptanalysis

4

Searching for KDIB Distinguishers with STP

5

Application to QARMA

2 / 28

slide-3
SLIDE 3

Motivation and Contributions

Motivation Previous statistical saturation attacks are all implemented under single-key setting No public attack model under related-key/tweak setting Contributions New cryptanalytic method: related-key/tweak statistical saturation attack New distinguishers are conditional equivalent with those utilized in the key/tweak difference invariant bias (KDIB/TDIB) technique Automatically search for KDIB/TDIB distinguishers for key-alternating ciphers Related-tweak statistical saturation and TDIB attacks on QARMA

slide-4
SLIDE 4

Motivation and Contributions

Motivation Previous statistical saturation attacks are all implemented under single-key setting No public attack model under related-key/tweak setting Contributions New cryptanalytic method: related-key/tweak statistical saturation attack New distinguishers are conditional equivalent with those utilized in the key/tweak difference invariant bias (KDIB/TDIB) technique Automatically search for KDIB/TDIB distinguishers for key-alternating ciphers Related-tweak statistical saturation and TDIB attacks on QARMA

slide-5
SLIDE 5

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA KDIB Technique in Key-Alternating Ciphers

Outline

1

Motivation and Contributions

2

KDIB Technique in Key-Alternating Ciphers

3

Related-Tweak Statistical Saturation Cryptanalysis

4

Searching for KDIB Distinguishers with STP

5

Application to QARMA

4 / 28

slide-6
SLIDE 6

KDIB Technique in Key-Alternating Ciphers

Key-Alternating Block Ciphers [Daemen & Rijmen] εθi−1,θi: bias of round i Bias of θ under κ: εθ(κ) = 2r−1(−1)θt·K r

i=1 εθi−1,θi

Bias of linear hull (Γ, Λ) under κ: ε(κ) =

θ:θ0=Γ,θr=Λ(−1)θt·Kεθ(0) = θ:θ0=Γ,θr=Λ(−1)dθ+θt·Kεθ

θt · K = θt · K′ holds for all θ with εθ = 0 in the linear hull (Γ, Λ) (KDIB condition) ⇒ ε(κ) = ε(κ′) [Bogdanov et al. @ ASIACRYPT’13]

slide-7
SLIDE 7

KDIB Technique in Key-Alternating Ciphers

KDIB Distinguisher Many linear hulls (Γ, Λ) + a fixed ∆ ⇒ KDIB distinguisher, if there exist κ and κ′ with K ⊕ K′ = ∆ satisfying the KDIB condition for each (Γ, Λ) TDIB Distinguisher KDIB attack ⇒ TDIB (tweak difference invariant bias) attack, if tweak is alternated Tweak has the same effect on the bias of linear hull with key θt · T = θt · T ′ holds for all θ with εθ = 0 in the linear hull (Γ, Λ) (TDIB condition) ⇒ ε(t) = ε(t′)

slide-8
SLIDE 8

KDIB Technique in Key-Alternating Ciphers

KDIB Distinguisher Many linear hulls (Γ, Λ) + a fixed ∆ ⇒ KDIB distinguisher, if there exist κ and κ′ with K ⊕ K′ = ∆ satisfying the KDIB condition for each (Γ, Λ) TDIB Distinguisher KDIB attack ⇒ TDIB (tweak difference invariant bias) attack, if tweak is alternated Tweak has the same effect on the bias of linear hull with key θt · T = θt · T ′ holds for all θ with εθ = 0 in the linear hull (Γ, Λ) (TDIB condition) ⇒ ε(t) = ε(t′)

slide-9
SLIDE 9

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Related-Tweak Statistical Saturation Cryptanalysis

Outline

1

Motivation and Contributions

2

KDIB Technique in Key-Alternating Ciphers

3

Related-Tweak Statistical Saturation Cryptanalysis

4

Searching for KDIB Distinguishers with STP

5

Application to QARMA

7 / 28

slide-10
SLIDE 10

Related-Tweak Statistical Saturation Cryptanalysis

Statistical Saturation Cryptanalysis [Collard & Standaert @ CT-RSA’09] Fix a part of plaintext bits and take all possible values for the other plaintext bits Consider the distribution of a part of the ciphertext value

slide-11
SLIDE 11

Related-Tweak Statistical Saturation Cryptanalysis

Related-Key/Tweak Statistical Saturation Cryptanalysis Fix a part of plaintext bits and take all possible values for the other plaintext bits Consider distributions of a part of the ciphertext value under related-key/tweak pairs (z, z′), where z′ = z ⊕ ∆ and ∆ is a fixed value for all possible values of z

slide-12
SLIDE 12

Conditional Equivalent Property

Decomposition of the Target Cipher H : Fn

2 × Fk 2 → Fn 2 : target cipher with n-bit block and k-bit tweak

Split the input and output into two parts each: H : Fr

2 × Fs 2 × Fk 2 → Ft 2 × Fu 2, H(x, y, z) = (H1(x, y, z), H2(x, y, z))

Define TI : Fs

2 × Fk 2 → Ft 2, TI(y, z) = H1(I, y, z)

slide-13
SLIDE 13

Conditional Equivalent Property

Theorem 1 (Γ, Λ): the linear hull of H with Γ = (Γin, 0) and Λ = (Λout, 0), where Γin ∈ Fr

2 and Λout ∈ Ft 2\{0}

Given a fixed ∆, we have: the bias is invariant under related-tweak pairs (z, z′ = z ⊕ ∆) for all possible mask pairs (Γin, Λout) ⇐ ⇒ TI(y, z) has the same value distribution with TI(y, z′)

slide-14
SLIDE 14

Conditional Equivalent Property

Theorem 1 (Γ, Λ): the linear hull of H with Γ = (Γin, 0) and Λ = (Λout, 0), where Γin ∈ Fr

2 and Λout ∈ Ft 2\{0}

Given a fixed ∆, we have: the bias is invariant under related-tweak pairs (z, z′ = z ⊕ ∆) for all possible mask pairs (Γin, Λout) ⇐ ⇒ TI(y, z) has the same value distribution with TI(y, z′)

slide-15
SLIDE 15

Key Recovery Attack Using Proposed Method

Reject right key α0 = 0 Accept wrong key α1 fulfills log2(α1) ≤

2t − 1 − t 2s+1 − 2s(2t−1)/2

slide-16
SLIDE 16

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Searching for KDIB Distinguishers with STP

Outline

1

Motivation and Contributions

2

KDIB Technique in Key-Alternating Ciphers

3

Related-Tweak Statistical Saturation Cryptanalysis

4

Searching for KDIB Distinguishers with STP

5

Application to QARMA

14 / 28

slide-17
SLIDE 17

Searching for KDIB Distinguishers with STP

STP: a decision procedure to confirm if there is a solution to a set

  • f equations

From previous KDIB attacks (Bogdanov et al. @ ASIACRYPT’13), distinguishers were derived at word-level for linear masks and bit-level for key difference Our searching algorithm: word-level mask propagation, bit-level difference propagation

slide-18
SLIDE 18

Searching for KDIB Distinguishers with STP

Part 1. Word-Level Mask Propagation Properties Substitution: θout = θin XOR: θout = θin1 = θin2 Three-Branch: θ3 = 1, if θ1 = 1 or θ2 = 1 holds

slide-19
SLIDE 19

Searching for KDIB Distinguishers with STP

Part 1. Word-Level Mask Propagation Properties Deterministic Pattern: Mout is unique given Min G = {Min | (Min, Mout) is a deterministic pattern} Matrix-Based Linear Layer: column-wise active state of input is θin, column-wise active state

  • f output is θout. Then θout = Mout if θin ∈ G. Otherwise,

θout = (1, 1, 1, 1)t

slide-20
SLIDE 20

Searching for KDIB Distinguishers with STP

Part 2. Bit-Level Difference Propagation Properties Substitution: p = DDT(δin, δout) and p = 0 XOR: δout = δin1 ⊕ δin2 Three-Branch: δout1 = δout2 = δin

slide-21
SLIDE 21

Searching for KDIB Distinguishers with STP

Part 3. Depicting the KDIB Condition An r-round linear hull (θ0, θr) and the difference on key {δ0, δ1, · · · , δr} KDIB condition: ⊕r

j=0θj · δj = 0 holds for all possible linear trails

{θ0, θ1, . . . , θr} with εθ = 0 in this linear hull word-level linear masks ⇒ word-level KDIB condition

slide-22
SLIDE 22

Searching for KDIB Distinguishers with STP

Part 4. Extra Equations At least one round key difference is non-zero ⇒ exclude trivial solutions Describing the active state of input and output mask Restricting the total propagation probabilities, for ciphers containing S-box in their key schedule

slide-23
SLIDE 23

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Application to QARMA

Outline

1

Motivation and Contributions

2

KDIB Technique in Key-Alternating Ciphers

3

Related-Tweak Statistical Saturation Cryptanalysis

4

Searching for KDIB Distinguishers with STP

5

Application to QARMA

21 / 28

slide-24
SLIDE 24

Brief Introduction to QARMA

The Structure of (2r + 2)-Round QARMA [Avanzi @ ToSC’17] Two kinds of block sizes: n = 64 (QARMA-64), 128 (QARMA-128) Key size: 2n, separated into two parts w0||k0 with same length Tweak size: n 16 rounds (QARMA-64), 24 rounds (QARMA-128)

slide-25
SLIDE 25

One of TDIB Distinguishers for 8-Round QARMA-64

slide-26
SLIDE 26

Related-Tweak SS Distinguishers for 8-Round QARMA-64

slide-27
SLIDE 27

Convert TDIB into Related-Tweak SS for QARMA-64

Theorem 3 (Γ, Λ): linear hull contained in the TDIB distinguishers of the block cipher H Γ = (Γ[in0]||Γ[in1], 0) and Λ = (Λ[out0]||Λ[out1], 0), where Λ[out0] = Λ[out1] C[out0] ⊕ C[out1] and C′[out0] ⊕ C′[out1]: same value distribution

slide-28
SLIDE 28

Related-Tweak SS Attacks on 10-Round QARMA-64

S S

C ek0 sk1 Y0

8-Round Related-Tweak Statistical Saturation Distinguisher

τ

M

Y1

X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X

Attacks Rounds Data Time Memory #tks Reference MITM 8 216 CPT 233 289 64-bit 1 Li & Jin @ 2018 MITM 9 216 CPT 248 289 64-bit 1 Li & Jin @ 2018 RT SS 10 259 CPT 259 229.6 bits 8 Our Result

slide-29
SLIDE 29

TDIB Attacks on 11-Round QARMA-128

S

sk0 P X0

X X X X X X X X

S S

C ek0 sk1 Y0

8-Round TDIB Distinguisher

τ

M

Y1

X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X

Attacks Rounds Data Time Memory #tks Reference MITM 10 288 CPT 2156 2145 128-bit 1 Li & Jin @ 2018 TDIB 11 2126.1 KPT 2126.1 271 bits 4 Our Result

slide-30
SLIDE 30

Thanks for Your Attention!