The LED Block Cipher Jian Guo, Thomas Peyrin, Axel Poschmann and - - PowerPoint PPT Presentation

the led block cipher
SMART_READER_LITE
LIVE PREVIEW

The LED Block Cipher Jian Guo, Thomas Peyrin, Axel Poschmann and - - PowerPoint PPT Presentation

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results The LED Block Cipher Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw I2R, NTU and Orange Labs CHES 2011 Nara, Japan


slide-1
SLIDE 1

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

The LED Block Cipher

Jian Guo, Thomas Peyrin, Axel Poschmann and Matt Robshaw

I2R, NTU and Orange Labs

CHES 2011

Nara, Japan

slide-2
SLIDE 2

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Outline

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

slide-3
SLIDE 3

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Current picture of lightweight primitives - graphically

internal memory GE 64 128 192 256 2500 2000 1500 1000 500

  • Th. optimum

PHOTON-256/32/32 TRIVIUM PHOTON-224/32/32 AES DESXL S-QUARK PHOTON-160/36/36 PRESENT-128 D-QUARK GRAIN KLEIN-96 PHOTON-128/16/16 KATAN-64 PRESENT-80 KLEIN-80 KLEIN-64 U-QUARK DESL PHOTON-80/20/16 PRINTcipher-96 PRINTcipher-48 KTANTAN32 KTANTAN64

slide-4
SLIDE 4

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Current picture of lightweight block ciphers - graphically

internal memory GE 64 128 192 256 2500 2000 1500 1000 500

  • Th. optimum

AES DESXL PRESENT-128/PICCOLO-128 KLEIN-96 KATAN-64 PRESENT-80/PICCOLO-80 KLEIN-80 KLEIN-64 DESL PRINTcipher-96 KTANTAN64 KTANTAN32 PRINTcipher-48

slide-5
SLIDE 5

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Lightweight block ciphers are too provocative ?

  • ARMADILLO: key-recovery attacks [A+-2011]
  • HIGHT: related-key attacks [K+-2010]
  • Hummingbird-1: practical related-IV attacks [S-2011]
  • KTANTAN: practical related-key attacks [ ˚

A-2011]

  • PRINTcipher: large weak-keys classes [ ˚

AJ-2011] PRESENT is still unbroken.

slide-6
SLIDE 6

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Light Encryption Device

We propose a new 64-bit block cipher LED:

  • as small as PRESENT
  • faster than PRESENT in software (and slower in hardware)
  • significant security margin
  • can take any key size from 64 to 128 bits
  • key can be directly hardwired (without any modification)
  • provable resistance to classical differential and linear attacks ...
  • ... both in the single-key and related-key models
slide-7
SLIDE 7

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Outline

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

slide-8
SLIDE 8

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

A single round of LED

AddConstants 4 cells 4 cells 4 bits SubCells

S S S S S S S S S S S S S S S S

ShiftRows MixColumnsSerial

The 64-bit round function is an SP-network:

  • AddConstants: xor round-dependent constants to the two first

columns

  • SubCells: apply the PRESENT 4-bit Sbox to each cell
  • ShiftRows: rotate the i-th line by i positions to the left
  • MixColumnsSerial: apply the special MDS matrix to each columns

independently

slide-9
SLIDE 9

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

A =                 1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                

slide-10
SLIDE 10

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

                1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                 ·                 v0 v1 . . . vd−4 vd−3 vd−2 vd−1                 =

slide-11
SLIDE 11

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

                1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                 ·                 v0 v1 . . . vd−4 vd−3 vd−2 vd−1                 =                 v1 . . .                

slide-12
SLIDE 12

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

                1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                 ·                 v0 v1 . . . vd−4 vd−3 vd−2 vd−1                 =                 v1 v2 . . .                

slide-13
SLIDE 13

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

                1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                 ·                 v0 v1 . . . vd−4 vd−3 vd−2 vd−1                 =                 v1 v2 . . . vd−3                

slide-14
SLIDE 14

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

                1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                 ·                 v0 v1 . . . vd−4 vd−3 vd−2 vd−1                 =                 v1 v2 . . . vd−3 vd−2                

slide-15
SLIDE 15

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

                1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                 ·                 v0 v1 . . . vd−4 vd−3 vd−2 vd−1                 =                 v1 v2 . . . vd−3 vd−2 vd−1                

slide-16
SLIDE 16

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Efficient Serially Computable MDS Matrices MDS Matrices (“Maximum Distance Separable”) have excellent diffusion properties: for a d-cell vector, we are ensured that at least d + 1 input /

  • utput cells will be active.

We use the same trick as in PHOTON (CRYPTO 2011): implement an MDS matrix that can be efficiently computed in a serial way. We keep the same good diffusion properties and good software performances as the classical MDS constructions, but the hardware is improved since no additional memory cell is needed (for both ciphering and deciphering).

                1 · · · 1 · · · . . . . . . · · · 1 · · · 1 · · · 1 Z0 Z1 Z2 Z3 · · · Zd−4 Zd−3 Zd−2 Zd−1                 ·                 v0 v1 . . . vd−4 vd−3 vd−2 vd−1                 =                 v1 v2 . . . vd−3 vd−2 vd−1 v′                

slide-17
SLIDE 17

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

The MixColumnsSerial matrix for LED

The serial decomposition of our MixColumnsSerial matrix is very lightweight (the matrix (B)4 is MDS):

(B)4 =      1 1 1 4 1 2 2     

4

=      4 1 2 2 8 6 5 6 B E A 9 2 2 F B     

So is its inverse:

(B−1)4 =      1 2 2 4 1 1 1     

4

=      C C D 4 3 8 4 5 7 6 2 E D 9 9 D     

slide-18
SLIDE 18

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Outline

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

slide-19
SLIDE 19

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

The Key Schedule of LED

Recent lessons learned in block ciphers design:

  • designing key schedules is hard (see recent attacks on AES), same for

message expansions in hash functions (look at the SHA-3 competition)

  • obtaining security proofs when also considering differences in the key

schedule is not trivial ...

  • either you use the very same function (can be bad, see attacks on

Whirlpool)

  • either you use a purposely different function in order to make

cryptanalysis hard (see AES, PRESENT, ...)

Our rationale: use NO key schedule

  • much simpler for cryptanalysts, not relying on the difficulty to analyze
  • only leverages the quality of the permutation and we DO know how

to build good permutations

  • you can directly hardwire the key in some particular scenarios
slide-20
SLIDE 20

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

First attempt

Key repeated every round P

1 round

K

1 round

K

1 round

K K

1 round

K K C But paths exist with only 1 active Sbox per round on average

1 round AC SB ShR MC

slide-21
SLIDE 21

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Second attempt

Key repeated every two rounds P

2 rounds

K

2 rounds

K

2 rounds

K K

2 rounds

K K C But paths exist with only 2.5 active Sboxes per round on average

1 round AC SB ShR MC 1 round AC SB ShR MC

slide-22
SLIDE 22

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Third attempt

Key repeated every four rounds P

4 rounds

K

4 rounds

K

4 rounds

K K

4 rounds

K K C The best path has 3.125 active Sboxes per round on average

1 round AC SB ShR MC 1 round AC SB ShR MC 1 round AC SB ShR MC 1 round AC SB ShR MC

slide-23
SLIDE 23

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

LED key schedule

For 64-bit key, we xored it to the internal state every four rounds. We apply a total of 8 steps (or 32 rounds): P

4 rounds

K

4 rounds

K

4 rounds

K K

4 rounds

K K C For up to 128-bit key, we divide it into two equal chunks K1 and K2 that are alternatively xored to the internal state every four rounds. We apply a total of 12 steps (or 48 rounds): P

4 rounds

K1

4 rounds

K2

4 rounds

K1 K2

4 rounds

K2 K1 C

slide-24
SLIDE 24

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Outline

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

slide-25
SLIDE 25

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Differential/linear attacks

  • AES-like permutations are simple to understand, well studied,

provide very good security

  • In single-key model: one can easily derive proofs on the

minimal number of active Sboxes for 4 rounds of the permutation: (d + 1)2 = 25 active Sboxes for 4 rounds of LED

  • In related-key model: we have at least half of the 4-round steps

active, using the same reasoning we obtain: (d + 1)2 = 25 active Sboxes for 8 rounds of LED

LED-64 SK LED-64 RK LED-128 SK LED-128 RK minimal no. of active Sboxes 200 100 300 150 differential path probability 2−400 2−200 2−600 2−300 linear approx. probability 2−400 2−200 2−600 2−300

slide-26
SLIDE 26

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Rebound attack and improvements

1 round 4 rounds 4 rounds 4 rounds 2 rounds

In the chosen-related-key model, one can distinguish 15 rounds (over 32)

  • f LED-64 with complexity 216

1 round 8 rounds 4 rounds 4 rounds 8 rounds 2 rounds

In the chosen-related-key model, one can distinguish 27 rounds (over 48)

  • f LED-128 with complexity 216

Improvements are unlikely since no key is used during four rounds of the permutation, so the amount of freedom degrees given to the attacker is limited to the minimum.

slide-27
SLIDE 27

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Other cryptanalysis techniques

  • cube testers: the best we could find within practical time complexity is

at most 3 rounds

  • zero-sum partitions: distinguishers for at most 12 rounds with 264

complexity in the known-key model

  • algebraic attacks: the entire system for a 64-bit fixed-key LED

permutation consists of 10752 quadratic equations in 4096 variables

  • slide attacks: all rounds are made different thanks to the

round-dependent constants addition

  • rotational cryptanalysis: any rotation property in a cell will be directly

removed by the application of the Sbox layer

  • integral attacks: currently can’t even break 2 steps
slide-28
SLIDE 28

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Outline

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

slide-29
SLIDE 29

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Hardware implementation

00 01 02 03 10 11 12 13 20 21 22 23 30 31 32 33

4 4 4 input A RC

S

4 IC 4 2

  • utput

State AC Controler 4 MCS 4 4 enAC

00 01 02 03 10 11 12 13 20 21 22 23 30 31 32 33

4 4 4 4 enAK Key SC enAC enAK IC RC AK

  • utReady

Key State

slide-30
SLIDE 30

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Hardware implementation

slide-31
SLIDE 31

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Hardware implementation results

internal memory GE 64 128 192 256 2500 2000 1500 1000 500

  • Th. optimum

AES DESXL LED-128 PRESENT-128/PICCOLO-128 KLEIN-96 LED-96 KATAN-64 PRESENT-80/PICCOLO-80/LED-80 KLEIN-80 LED-64 KLEIN-64 DESL PRINTcipher-96 KTANTAN64 LED-64 KTANTAN32 PRINTcipher-48

slide-32
SLIDE 32

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Software implementation results

Table: Software implementation results of LED.

table-based implementation LED-64 57 cycles/byte LED-128 86 cycles/byte One can use “Super-Sbox” implementations (ongoing work).

slide-33
SLIDE 33

Introduction The LED Round Function Minimalism for Key Schedule Security Analysis Implementations and Results

Conclusion

The LED block cipher:

  • is very simple and clean
  • is as small as PRESENT
  • faster than PRESENT in software (and slower in hardware)
  • key can be hardwired without modification of the algorithm
  • provides provable security against classical linear/differential

cryptanalysis both in the single-key and related-key models

  • extremely large security margin in the single-key model
  • security analysis done in the very optimistic

known/chosen-keys model Latest results on https://sites.google.com/site/ledblockcipher/