related tweak statistical saturation cryptanalysis and
play

Related-Tweak Statistical Saturation Cryptanalysis and Its - PowerPoint PPT Presentation

Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Muzhou Li Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University, China Joint work with Kai Hu, Meiqin Wang March 27,


  1. Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Muzhou Li Key Lab of Cryptologic Technology and Information Security Ministry of Education, Shandong University, China Joint work with Kai Hu, Meiqin Wang March 27, 2019 @ Paris

  2. Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Motivation and Contributions Outline Motivation and Contributions 1 KDIB Technique in Key-Alternating Ciphers 2 Related-Tweak Statistical Saturation Cryptanalysis 3 Searching for KDIB Distinguishers with STP 4 Application to QARMA 5 2 / 28

  3. Motivation and Contributions Motivation Previous statistical saturation attacks are all implemented under single-key setting No public attack model under related-key/tweak setting Contributions New cryptanalytic method: related-key/tweak statistical saturation attack New distinguishers are conditional equivalent with those utilized in the key/tweak difference invariant bias (KDIB/TDIB) technique Automatically search for KDIB/TDIB distinguishers for key-alternating ciphers Related-tweak statistical saturation and TDIB attacks on QARMA

  4. Motivation and Contributions Motivation Previous statistical saturation attacks are all implemented under single-key setting No public attack model under related-key/tweak setting Contributions New cryptanalytic method: related-key/tweak statistical saturation attack New distinguishers are conditional equivalent with those utilized in the key/tweak difference invariant bias (KDIB/TDIB) technique Automatically search for KDIB/TDIB distinguishers for key-alternating ciphers Related-tweak statistical saturation and TDIB attacks on QARMA

  5. Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA KDIB Technique in Key-Alternating Ciphers Outline Motivation and Contributions 1 KDIB Technique in Key-Alternating Ciphers 2 Related-Tweak Statistical Saturation Cryptanalysis 3 Searching for KDIB Distinguishers with STP 4 Application to QARMA 5 4 / 28

  6. KDIB Technique in Key-Alternating Ciphers Key-Alternating Block Ciphers [Daemen & Rijmen] ε θ i − 1 ,θ i : bias of round i Bias of θ under κ : ε θ ( κ ) = 2 r − 1 (− 1 ) θ t · K � r i = 1 ε θ i − 1 ,θ i Bias of linear hull ( Γ, Λ ) under κ : ε ( κ ) = � θ : θ 0 = Γ,θ r = Λ (− 1 ) θ t · K ε θ ( 0 ) = � θ : θ 0 = Γ,θ r = Λ (− 1 ) d θ + θ t · K ε θ θ t · K = θ t · K ′ holds for all θ with ε θ � = 0 in the linear hull ( Γ, Λ ) ( KDIB condition ) ⇒ ε ( κ ) = ε ( κ ′ ) [Bogdanov et al. @ ASIACRYPT’13]

  7. KDIB Technique in Key-Alternating Ciphers KDIB Distinguisher Many linear hulls ( Γ, Λ ) + a fixed ∆ ⇒ KDIB distinguisher, if there exist κ and κ ′ with K ⊕ K ′ = ∆ satisfying the KDIB condition for each ( Γ, Λ ) TDIB Distinguisher KDIB attack ⇒ TDIB (tweak difference invariant bias) attack, if tweak is alternated Tweak has the same effect on the bias of linear hull with key θ t · T = θ t · T ′ holds for all θ with ε θ � = 0 in the linear hull ( Γ, Λ ) ( TDIB condition ) ⇒ ε ( t ) = ε ( t ′ )

  8. KDIB Technique in Key-Alternating Ciphers KDIB Distinguisher Many linear hulls ( Γ, Λ ) + a fixed ∆ ⇒ KDIB distinguisher, if there exist κ and κ ′ with K ⊕ K ′ = ∆ satisfying the KDIB condition for each ( Γ, Λ ) TDIB Distinguisher KDIB attack ⇒ TDIB (tweak difference invariant bias) attack, if tweak is alternated Tweak has the same effect on the bias of linear hull with key θ t · T = θ t · T ′ holds for all θ with ε θ � = 0 in the linear hull ( Γ, Λ ) ( TDIB condition ) ⇒ ε ( t ) = ε ( t ′ )

  9. Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Related-Tweak Statistical Saturation Cryptanalysis Outline Motivation and Contributions 1 KDIB Technique in Key-Alternating Ciphers 2 Related-Tweak Statistical Saturation Cryptanalysis 3 Searching for KDIB Distinguishers with STP 4 Application to QARMA 5 7 / 28

  10. Related-Tweak Statistical Saturation Cryptanalysis Statistical Saturation Cryptanalysis [Collard & Standaert @ CT-RSA’09] Fix a part of plaintext bits and take all possible values for the other plaintext bits Consider the distribution of a part of the ciphertext value

  11. Related-Tweak Statistical Saturation Cryptanalysis Related-Key/Tweak Statistical Saturation Cryptanalysis Fix a part of plaintext bits and take all possible values for the other plaintext bits Consider distributions of a part of the ciphertext value under related-key/tweak pairs ( z, z ′ ) , where z ′ = z ⊕ ∆ and ∆ is a fixed value for all possible values of z

  12. Conditional Equivalent Property Decomposition of the Target Cipher H : F n 2 × F k 2 → F n 2 : target cipher with n -bit block and k -bit tweak Split the input and output into two parts each: H : F r 2 × F s 2 × F k 2 → F t 2 × F u 2 , H ( x, y, z ) = ( H 1 ( x, y, z ) , H 2 ( x, y, z )) Define T I : F s 2 × F k 2 → F t 2 , T I ( y, z ) = H 1 ( I, y, z )

  13. Conditional Equivalent Property Theorem 1 ( Γ, Λ ) : the linear hull of H with Γ = ( Γ in , 0 ) and Λ = ( Λ out , 0 ) , where Γ in ∈ F r 2 and Λ out ∈ F t 2 \{ 0 } Given a fixed ∆ , we have: the bias is invariant under related-tweak pairs ( z, z ′ = z ⊕ ∆ ) for all possible mask pairs ( Γ in , Λ out ) ⇐ ⇒ T I ( y, z ) has the same value distribution with T I ( y, z ′ )

  14. Conditional Equivalent Property Theorem 1 ( Γ, Λ ) : the linear hull of H with Γ = ( Γ in , 0 ) and Λ = ( Λ out , 0 ) , where Γ in ∈ F r 2 and Λ out ∈ F t 2 \{ 0 } Given a fixed ∆ , we have: the bias is invariant under related-tweak pairs ( z, z ′ = z ⊕ ∆ ) for all possible mask pairs ( Γ in , Λ out ) ⇐ ⇒ T I ( y, z ) has the same value distribution with T I ( y, z ′ )

  15. Key Recovery Attack Using Proposed Method Reject right key α 0 = 0 Accept wrong key α 1 fulfills � 2 s + 1 − 2 s ( 2 t − 1 ) /2 � 2 t − 1 − t log 2 ( α 1 ) ≤

  16. Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Searching for KDIB Distinguishers with STP Outline Motivation and Contributions 1 KDIB Technique in Key-Alternating Ciphers 2 Related-Tweak Statistical Saturation Cryptanalysis 3 Searching for KDIB Distinguishers with STP 4 Application to QARMA 5 14 / 28

  17. Searching for KDIB Distinguishers with STP STP: a decision procedure to confirm if there is a solution to a set of equations From previous KDIB attacks (Bogdanov et al. @ ASIACRYPT’13), distinguishers were derived at word-level for linear masks and bit-level for key difference Our searching algorithm: word-level mask propagation, bit-level difference propagation

  18. Searching for KDIB Distinguishers with STP Part 1. Word-Level Mask Propagation Properties Substitution: θ out = θ in XOR: θ out = θ in 1 = θ in 2 Three-Branch: θ 3 = 1 , if θ 1 = 1 or θ 2 = 1 holds

  19. Searching for KDIB Distinguishers with STP Part 1. Word-Level Mask Propagation Properties Deterministic Pattern: M out is unique given M in G = { M in | ( M in , M out ) is a deterministic pattern } Matrix-Based Linear Layer: column-wise active state of input is θ in , column-wise active state of output is θ out . Then θ out = M out if θ in ∈ G . Otherwise, θ out = ( 1, 1, 1, 1 ) t

  20. Searching for KDIB Distinguishers with STP Part 2. Bit-Level Difference Propagation Properties Substitution: p = DDT ( δ in , δ out ) and p � = 0 XOR: δ out = δ in 1 ⊕ δ in 2 Three-Branch: δ out 1 = δ out 2 = δ in

  21. Searching for KDIB Distinguishers with STP Part 3. Depicting the KDIB Condition An r -round linear hull ( θ 0 , θ r ) and the difference on key { δ 0 , δ 1 , · · · , δ r } KDIB condition: ⊕ r j = 0 θ j · δ j = 0 holds for all possible linear trails { θ 0 , θ 1 , . . . , θ r } with ε θ � = 0 in this linear hull word-level linear masks ⇒ word-level KDIB condition

  22. Searching for KDIB Distinguishers with STP Part 4. Extra Equations At least one round key difference is non-zero ⇒ exclude trivial solutions Describing the active state of input and output mask Restricting the total propagation probabilities, for ciphers containing S-box in their key schedule

  23. Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA Application to QARMA Outline Motivation and Contributions 1 KDIB Technique in Key-Alternating Ciphers 2 Related-Tweak Statistical Saturation Cryptanalysis 3 Searching for KDIB Distinguishers with STP 4 Application to QARMA 5 21 / 28

  24. Brief Introduction to QARMA The Structure of ( 2r + 2 ) -Round QARMA [Avanzi @ ToSC’17] Two kinds of block sizes: n = 64 ( QARMA -64), 128 ( QARMA -128) Key size: 2n , separated into two parts w 0 || k 0 with same length Tweak size: n 16 rounds ( QARMA -64), 24 rounds ( QARMA -128)

  25. One of TDIB Distinguishers for 8-Round QARMA -64

  26. Related-Tweak SS Distinguishers for 8-Round QARMA -64

  27. Convert TDIB into Related-Tweak SS for QARMA -64 Theorem 3 ( Γ, Λ ) : linear hull contained in the TDIB distinguishers of the block cipher H Γ = ( Γ [ in 0 ] || Γ [ in 1 ] , 0 ) and Λ = ( Λ [ out 0 ] || Λ [ out 1 ] , 0 ) , where Λ [ out 0 ] = Λ [ out 1 ] C [ out 0 ] ⊕ C [ out 1 ] and C ′ [ out 0 ] ⊕ C ′ [ out 1 ] : same value distribution

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend