DIFFERENTIAL CRYPTANALYSIS Chapter 3.4. Ciphertext only attack. The cryptanalyst knows the cryptograms. This happens, if he can eavesdrop the communication.

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

1 The 2-to-4 decoder is a block which decodes the 2-bit binary inputs and produces four output All but one outputs are zero One output corresponding to.
Differential Fault Analysis on AES Variants Kazuo Sakiyama, Yang Li The University of Electro-Communications Nagoya, Japan.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
SBSeg 2007, NCE/UFRJ, Rio de Janeiro Linear Analysis of reduced- round CAST-128 and CAST-256 Jorge Nakahara Jr 1 Mads Rasmussen 2 1 UNISANTOS, Brazil 2.
Stream ciphers 2 Session 2. Contents PN generators with LFSRs Statistical testing of PN generator sequences Cryptanalysis of stream ciphers 2/75.
Cryptography and Network Security Chapter 3
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Block ciphers 1 Session 3. Contents Design of block ciphers Non-linear transformations 2/25.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Session 6: Introduction to cryptanalysis part 2. Symmetric systems The sources of vulnerabilities regarding linearity in block ciphers are S-boxes. Example.
JLM :161 Homework 6 – Problem 1 S-box 4 is observed to have the indicated output xor when presented with the indicated inputs In1: 0x22, In2:
Introduction to Symmetric Block Cipher Jing Deng Based on Prof. Rick Han’s Lecture Slides Dr. Andreas Steffen’s Security Tutorial.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Lecture 2.2: Private Key Cryptography II CS 436/636/736 Spring 2012 Nitesh Saxena.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
CSE 651: Introduction to Network Security
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Cryptanalysis. The Speaker  Chuck Easttom  
Cryptanalysis of Modern Symmetric-Key Block Ciphers [Based on “A Tutorial on Linear and Differential Cryptanalysis” by Howard Heys.] Modern block ciphers.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Cryptography and Network Security
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Block ciphers 2 Session 4. Contents Linear cryptanalysis Differential cryptanalysis 2/48.
Chapter 1 Introduction Cryptography-Principles and Practice Harbin Institute of Technology School of Computer Science and Technology Zhijun Li
Differential Cryptanalysis - quite similar to linear cryptanalysis - exploits the relationship between the difference of two inputs and the difference.
Blowfish A widely used block cipher. Blowfish Designed by Bruce Schneier (1993) A variant of it (Twofish) was an AES finalist candidate 64-bit block size,
One-Time Pad Or Vernam Cipher Sayed Mahdi Mohammad Hasanzadeh Spring 2004.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Introduction to Modern Symmetric-key Ciphers
Chapter 20 Symmetric Encryption and Message Confidentiality.
Block ciphers Structure of a multiround block cipher
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Cryptographic Attacks on Scrambled LZ-Compression and Arithmetic Coding By: RAJBIR SINGH BIKRAM KAHLON.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
Introduction to Modern Symmetric-key Ciphers
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Introduction to Information Security Lect. 6: Block Ciphers.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Block Ciphers and the Advanced Encryption Standard
Linear Cryptanalysis of DES
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
CS519, © A.SelcukDifferential & Linear Cryptanalysis1 CS 519 Cryptography and Network Security Instructor: Ali Aydin Selcuk.
Linear Cryptanalysis of DES M. Matsui. 1.Linear Cryptanalysis Method for DES Cipher. EUROCRYPT 93, 1994.Linear Cryptanalysis Method for DES Cipher 2.The.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Computer and Information Security Chapter 6 Advanced Cryptanalysis 1.
Chapter3: Block Ciphers and the Data Encryption Standard
Introduction to Modern Symmetric-key Ciphers
Cryptanalysis of Block Ciphers
Differential Cryptanalysis
Florida State University
Presentation transcript:

DIFFERENTIAL CRYPTANALYSIS Chapter 3.4

Ciphertext only attack. The cryptanalyst knows the cryptograms. This happens, if he can eavesdrop the communication channels. Known-plaintext attack. The adversary can access not only the communication channels but also parts of plaintext.

Chosen-plaintext attack. This is a known plaintext attack for which the cryptanalyst may choose messages and corresponding cryptograms. Chosen-ciphertext attack. The enemy selects his own cryptogram and corresponding message and then tries to find the secret key of the cryptosystem.

The function to transfer the input string of an S- box. such that and then or where XOR profiles

Define and four-tuples and denote the number of four-tuples in the set. For example, and

The XOR profile of an S-box defined by is a table which has 2 n rows and 2 m columns. Each row and column is indexed by  and  respectively. Each entry ( ,  ) of the table shows the number of elements in the set

The example of an element of XOR profiles If the set is Then the element (19, 1) in the table of XOR profile is

The properties of XOR profiles All entries in the table are zeroes or positive even integers. The row for  = 0 has only one nonzero entry equal to 2 n (n is the number of input bits of the S-box).

The sum of entries in each row is equal to 2 n. An input difference  may cause output difference  with probability. If an entry ( ,  ) is zero, then the input difference  cannot cause the difference  on the output.

What can we say about value of the input? The XOR profile does not depend on the cryptographic key used. What can we say about the key?

Example: Let an input have the output difference. The set

The input is The applied key must be in the set that is The following demonstrate how to calculate the bit-to-bit addition.

If the second input is and Then the set is as following.

The set of input is The key set is Take another observation,

and then and The key must be contained in the three set, so the key is

The XOR profile of an S-box with the secret key XORed with the input is identical to the XOR profile of the S-box without the key. Every input observation (s 1, s 2 ) and the corresponding output difference  enable the cryptanalyst to find the set  of key candidates. The analysis of differences for a single S-box allows one to retrieve the key that is XORed to the input of a S-box.

3.4.2 DES Round Characteristics An m-round characteristic of a Feistel-type cryptosystem is a sequence Where  in and  out are input and output differences. The pairs are consecutive input and output difference for the round f k. Let input sequences be and.

A single round characteristic of DES The first part of difference is  A and the second part is 0.

Our goal is to find a characteristic that feeds a nonzero input difference in to S 1 while other input differences of S 2 … S 8 are set to zero and the characteristic should work with a high probability.

Another single round characteristic of DES

The input difference  in = (  A, x ). The binary string ( x ) obtained by permuting (E x ) using permutation block P For this case, the pair of difference (C x, E x ) happens with probability 14/64. And then we get the output

Any characteristic has a probability attached to it. Let the m-round characteristic be Then its probability where is the probability that input difference  i causes the output difference  i for the function f k in the ith round.

A two-round characteristic of DES The probability of the second round happening is one.

3.4.3 Cryptanalysis of 4-Round DES Our purpose is to recover the key. To concentrate on the last round of the DES. In last figure, we use characteristic  A = ( x ), which works always (p=1). In the last round

Four round DES Input Difference Output Difference

 1 = 0 and  1 = 0. So the input difference becomes (001000) on S 1 and all other 7 S-boxes are zero. Thus 28-bits of  2 are known. From the last equation, 28-bits of  4 are known. Another characteristic  A = ( x ). The the missing part of key is recovered by the differential analysis of S 1.

Finding the partial key k 4. Strip off the last round and find k 3. Then k 2.

Input Difference Output Difference Six-round DES

First 3-Round Characteristic f f f

Second 3-Round Characteristic f f f

3.4.5 The main features of differential analysis The differential analysis can be applied to Feistal cryptosystems with t rounds, where it is possible to use input to the round function and deduce or guess the corresponding output differences Characteristics are useful in guessing the correct output differences of the round function. It is enough to have (t-3)-round characteristic to find out output differences in the t-round Feistel cryptosystem.

As the differential analysis enables to find keys applied in the last round function, it by-passes the key schedule. It works under the assumption that round keys are statistacally independent. Once the key in the last round is found, the last round can be stripped off by applying the extra round.

Feistel cryptosystem immune against the differential analysis: The XOR profile must not have entries with large number. The best (t-3)-round characteristics should work with the probability smaller than the probability of guessing the right key (t is the number of rounds in the cryptosystem). The S-boxes should depend upon the secret key in a nonlinear way. This will cause that XOR profile of S-boxes become more complex. One way of implementation of this idea would be an on-the-fly selection of S-boxes depending on the round key.