Resynchronization Attacks on WG and LEX Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC.

Slides:



Advertisements
Similar presentations
1 KCipher-2 KDDI R&D Laboratories Inc.. ©KDDI R&D Laboratories Inc. All rights Reserved. 2 Introduction LFSR-based stream ciphers Linear recurrence between.
Advertisements

ECE454/CS594 Computer and Network Security
“Advanced Encryption Standard” & “Modes of Operation”
Xiutao Feng Institute of Software Chinese Academy of Sciences A Byte-Based Guess and Determine Attack on SOSEMANUK.
CS470, A.SelcukStream Ciphers1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
1 Introduction to Practical Cryptography Lectures 3/4 Stream Ciphers.
Modern Symmetric-Key Ciphers
Modern Symmetric-Key Ciphers
Syed Safi Uddin Qadri BETL/F07/0112 GSM Stream Cipher Algorithm Presented To Sir Adnan Ahmed Siddiqui.
Dan Boneh Stream ciphers Real-world Stream Ciphers Online Cryptography Course Dan Boneh.
An Introduction to Stream Ciphers Zahra Ahmadian Electrical Engineering Department Sahrif University of Technology
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
1`` ```` ```` ```` ```` ```` ```` ```` ```` ```` `` AEGIS A Fast Authenticated Encryption Algorithm Hongjun Wu Bart Preneel Nanyang Technological University.
Wide Collisions in Practice Xin Ye, Thomas Eisenbarth Florida Atlantic University, USA 10 th ACNS Singapore.
 We spoke about defense challenges  Crypto introduction o Secret key, public algorithms o Symmetric, asymmetric crypto, one-way hashes  Attacks on cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 6 Triple DES, Block Cipher Modes of Operation.
1 Chapter 5 Hashes and Message Digests Instructor: 孫宏民 Room: EECS 6402, Tel: , Fax :
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
The Design of Improved Dynamic AES and Hardware Implementation Using FPGA 游精允.
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 5 Wenbing Zhao Department of Electrical and Computer Engineering.
Stream Ciphers 1 Stream Ciphers. Stream Ciphers 2 Stream Ciphers  Generalization of one-time pad  Trade provable security for practicality  Stream.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Lecture 23 Symmetric Encryption
6. Practical Constructions of Symmetric-Key Primitives
CS470, A.SelcukModes of Operation1 Encrypting with Block Ciphers CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Lecture 3: Cryptographic Tools modified from slides of Lawrie Brown.
Cryptography and Network Security
Cryptography and Network Security Chapter 6. Multiple Encryption & DES  clear a replacement for DES was needed theoretical attacks that can break it.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Stream Ciphers Making the one-time pad practical.
Rijndael Advanced Encryption Standard. Overview Definitions Definitions Who created Rijndael and the reason behind it Who created Rijndael and the reason.
Chapter 20 Symmetric Encryption and Message Confidentiality.
The Misuse of RC4 in Microsoft Office A paper by: Hongjun Wu Institute for Infocomm Research, Singapore ECE 578 Matthew Fleming.
Cryptanalysis of the Stream Cipher DECIM Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC.
Cryptography Team Presentation 2
3DES and Block Cipher Modes of Operation CSE 651: Introduction to Network Security.
Multiple Encryption & DES  clearly a replacement for DES was needed Vulnerable to brute-force key search attacks Vulnerable to brute-force key search.
Encryption Types & Modes Chapter 9 Encryption Types –Stream Ciphers –Block Ciphers Encryption Modes –ECB - Electronic Codebook –CBC - Cipher Block Chaining.
Modes of Usage Dan Fleck CS 469: Security Engineering These slides are modified with permission from Bill Young (Univ of Texas) 11 Coming up: Modes of.
1 Symmetric-Key Encryption CSE 5351: Introduction to Cryptography Reading assignment: Chapter 3 Read sections first (skipping 3.2.2)
Exploiting Cache-Timing in AES: Attacks and Countermeasures Ivo Pooters March 17, 2008 Seminar Information Security Technology.
Lecture 23 Symmetric Encryption
A High-Speed Hardware Implementation of the LILI-II Keystream Generator Paris Kitsos...in cooperation with Nicolas Sklavos and Odysseas Koufopavlou Digital.
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
A Ultra-Light Block Cipher KB1 Changhoon Lee Center for Information Security Technologies, Korea University.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
1 Chapter 12: Hash and MAC Algorithms Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal, U of Kentucky)
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
1 Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Souradyuti Paul and Bart Preneel K.U. Leuven, ESAT/COSIC Indocrypt 2003 India.
Cipher Transmission and Storage Modes Part 2: Stream Cipher Modes CSCI 5857: Encoding and Encryption.
1 A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher Souradyuti Paul and Bart Preneel K.U. Leuven, ESAT/COSIC.
Slide 1 Vitaly Shmatikov CS 378 Stream Ciphers. slide 2 Stream Ciphers uRemember one-time pad? Ciphertext(Key,Message)=Message  Key Key must be a random.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Modes of Operation block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key need some way to en/decrypt arbitrary amounts.
Triple DES.
Cryptography Lecture 16.
Cryptography Lecture 15.
Symmetric-Key Encryption
Chapter -3 ADVANCED ENCRYPTION STANDARD & BLOCK CIPHER OPERATION
CH 6. Stream Ciphers Information Security & IoT Lab 김해용
Cryptography Lecture 15.
Presentation transcript:

Resynchronization Attacks on WG and LEX Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven ESAT/COSIC

KULeuven, ESAT/COSIC2 Overview 1. Introduction to WG 2. Differential Attack on WG 3. Introduction to LEX 4. Slide Attack on LEX

KULeuven, ESAT/COSIC3 Description of WG (1) submission to the eStream key up to 128 bits, IV up to 128 bits hardware efficient stream cipher (profile II) consists of a regularly clocked LFSR over GF(2 29 ) a regularly clocked LFSR over GF(2 29 ) defined by γ defined by p(x) = x 11 + x 10 + x 9 + x 6 + x 3 + x + γ and a WG transform that maps GF(2 29 )  GF(2) and a WG transform that maps GF(2 29 )  GF(2)

KULeuven, ESAT/COSIC4 Description of WG (2) Keystream generation of WG

KULeuven, ESAT/COSIC5 Description of WG (3) WG Transformation

KULeuven, ESAT/COSIC6 Description of WG (4) Key and IV setup of WG (22 Steps)

KULeuven, ESAT/COSIC7 Differential Attack on WG (1) Overview of the Attack the taps of LFSR are poorly chosen the taps of LFSR are poorly chosen 22 steps fail to randomize the differential propagation 22 steps fail to randomize the differential propagation at the end of the 22 nd step, the differential in the at the end of the 22 nd step, the differential in the LFSR is exploited to recover the secret key LFSR is exploited to recover the secret key => 48 key bits recovered with about 2 31 chosen IVs => 48 key bits recovered with about 2 31 chosen IVs (80-bit key and 80-bit IV) (80-bit key and 80-bit IV)

KULeuven, ESAT/COSIC8 Differential Attack on WG (2) Attack - differential propagation in key/IV setup of WG

KULeuven, ESAT/COSIC9 Differential Attack on WG (3) Attack - differential propagation in key/IV setup of WG (Contd.)

KULeuven, ESAT/COSIC10 Differential Attack on WG (4) At the end of the 22 nd step, the difference at S(10) is S(10) is related to the first keystream bit. Observing the values of the first keystream bits generated from the related IV, we are able to determine whether the value of is 0, then we can recover 29 bits of key IVs for the version with 80-bit IV, 80-bit key (details are omitted here)

KULeuven, ESAT/COSIC11 Differential Attack on WG (5) The differential attack on WG is different from the differential attack on block ciphers Difference generation -- change the input difference and SOME input value to generate many different change the input difference and SOME input value to generate many different Filtering -- change OTHER input value (without modifying ) to generate keystream bits to see whether the related keystream bits are always identical, then to identify whether is 0 change OTHER input value (without modifying ) to generate keystream bits to see whether the related keystream bits are always identical, then to identify whether is 0

KULeuven, ESAT/COSIC12 How to Improve WG WG designers proposed 44-step key/IV setup => small change secure against the differential attack secure against the differential attack => but not that efficient with properly chosen LFSR taps and output tap, with properly chosen LFSR taps and output tap, it is possible to use only 22 steps it is possible to use only 22 steps

KULeuven, ESAT/COSIC13 Description of LEX (1) submission to the eStream 128-bit key, 128-bit IV software and hardware efficient (profile I & II) Design: based on AES OFB mode based on AES OFB mode 4 bytes extracted from each round to form keystream 4 bytes extracted from each round to form keystream

KULeuven, ESAT/COSIC14 Description of LEX (2) Initialization and keystream generation

KULeuven, ESAT/COSIC15 Description of LEX (3) Extracted bytes in the even and odd rounds

KULeuven, ESAT/COSIC16 Slide Attack on LEX (1) Security of LEX depends on that only a small fraction of information is leaked from each round If one round input in LEX is known, then the key could be recovered easily.

KULeuven, ESAT/COSIC17 Slide Attack on LEX (2) In LEX, the same key with two IVs, if keystream 1 is the shifted version of keystream 2, then one input to AES for generating keystream 1 is equivalent to IV 2 => The input to AES is known 32 bits of the first round output are known 32 bits of the first round output are known => 32 bits of the key could be recovered easily

KULeuven, ESAT/COSIC18 Slide Attack on LEX (3) If each IV is used to generate about 500 outputs, then with about 2 61 IVs, 3 pairs of the shifted keystreams could be observed and 96 key bits could be recovered.

KULeuven, ESAT/COSIC19 Slide Attack on LEX (4) LEX is as strong as AES counter mode? No. AES counter mode => A particular key can never be recovered faster A particular key can never be recovered faster than brute force search than brute force search LEX => A particular key recovered with random IVs, A particular key recovered with random IVs, 20,000 bytes from each IV, faster than brute force search 20,000 bytes from each IV, faster than brute force search

KULeuven, ESAT/COSIC20 How to Improve LEX Our suggestion => For each LEX IV, use LEX key and LEX IV to generate an AES key and AES IV

KULeuven, ESAT/COSIC21 Conclusion (1) Lesson from the WG design => To ensure that the tap distances are co-prime To ensure that the tap distances are co-prime in a FSR (including the LFSR on GF(2 m )) in a FSR (including the LFSR on GF(2 m ))

KULeuven, ESAT/COSIC22 Conclusion (2) Lessons from the LEX design => 1) It is better to mix the key and IV in a non-linear way, then use the mixed values to generate the keystream use the mixed values to generate the keystream 2) try to avoid using the stream cipher key directly in the keystream generation keystream generation (more general, try to avoid using static secret parameters in the (more general, try to avoid using static secret parameters in the keystream generation) (LEX, Salsa20, ABC, SEAL …) keystream generation) (LEX, Salsa20, ABC, SEAL …)

KULeuven, ESAT/COSIC23 Thank you! Q & A