25
Formalizing Known-Key “Distinguishers” - New Attacks on Feistel Ciphers Yu Sasaki and Kan Yasuda NTT Corporation CRYPTO 2010 Rump Session 17/Aug./2010 @ UCSB

Formalizing Known-Key “Distinguishers”

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Formalizing Known-Key “Distinguishers”

Formalizing Known-Key “Distinguishers”- New Attacks on Feistel Ciphers

Yu Sasaki and Kan Yasuda

NTT Corporation

CRYPTO 2010 Rump Session 17/Aug./2010 @ UCSB

Page 2: Formalizing Known-Key “Distinguishers”

Formalizing Known-Key “Distinguishers”- New Attacks on Feistel Ciphers

Yu Sasaki and Kan Yasuda

NTT Corporation

CRYPTO 2010 Rump Session 17/Aug./2010 @ UCSB

1.

2.

Page 3: Formalizing Known-Key “Distinguishers”

(3-bit) Block Cipher

KEY

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Key Dependent Permutation

BLOCK CIPHER

Page 4: Formalizing Known-Key “Distinguishers”

(3-bit) Block Cipher

KEY

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Choose a key. Permutation is fixed.

Page 5: Formalizing Known-Key “Distinguishers”

Attacker’s Goal on Block Ciphers

???

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Distinguish / Key Recovery

Secret

Adv.

Page 6: Formalizing Known-Key “Distinguishers”

Attack Models (Classic)

???

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Differential Attack

DP

Page 7: Formalizing Known-Key “Distinguishers”

???

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

DP

DC

Attack Models (Classic)

Differential Attack

Page 8: Formalizing Known-Key “Distinguishers”

???

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Boomerang Attack

DP1

DC1DC2

Choose adaptively

Attack Models (Adaptively Chosen)

Page 9: Formalizing Known-Key “Distinguishers”

???

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Boomerang Attack

DP1

DC1DC2

DP2

Choose adaptively

Attack Models (Adaptively Chosen)

Page 10: Formalizing Known-Key “Distinguishers”

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Related-Key (Differential) Attack

DP1?A?

?B?

Relation

Attack Models (Related-Key)

Page 11: Formalizing Known-Key “Distinguishers”

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Related-Key (Differential) Attack

?B?

DP1

DC1

?A?

Encrypt with AEncrypt with B

Attack Models (Related-Key)

Page 12: Formalizing Known-Key “Distinguishers”

• More and more complicated attack models are considered to recover the key.

Page 13: Formalizing Known-Key “Distinguishers”

• More and more complicated attack models are considered to recover the key.

• Another simple attack model:

Known-Key Attack

The concept was proposed by Knudsen and Rijmen at Asiacrypt 2007.

Page 14: Formalizing Known-Key “Distinguishers”

Known-Key Model

???

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

Page 15: Formalizing Known-Key “Distinguishers”

Known-Key Model

The key is given to the attacker !!

???

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

KEY

Page 16: Formalizing Known-Key “Distinguishers”

Known-Key Model

KEY

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

The attacker can do everything !!

distinguishrecoveryencryptiondecryption

Page 17: Formalizing Known-Key “Distinguishers”

Known-Key Model

KEY

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

distinguishrecoveryencryptiondecryption

What’s the point??

The attacker can do everything !!

Page 18: Formalizing Known-Key “Distinguishers”

Undesired Situation

KEY

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

secure? if the fixed permutation is identity map

Randomly chosen key

Page 19: Formalizing Known-Key “Distinguishers”

KEY

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

secure? if the fixed permutation has strong bias

Undesired Situation

Randomly chosen key

Page 20: Formalizing Known-Key “Distinguishers”

Randomly chosen key

KEY

1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8

Plaintext

Ciphertext

secure? if the fixed permutation has strong bias

Undesired Situation

Page 21: Formalizing Known-Key “Distinguishers”

Known-Key Attacks

• Evaluate whether or not the fixed permutation with a randomly chosen key is ideal.

• Useful because block ciphers are often used as key-less primitives such as hash functions.

Goal is different. No secret any more!!

Block

Plaintext

Ciphertext

Key

Block

ConstantBlock Cipher

Hash Function

Message

Digest

Secure Secure

cipher cipher

Page 22: Formalizing Known-Key “Distinguishers”

Our Recent Results

Page 23: Formalizing Known-Key “Distinguishers”

Our Results 1• Give a formalization of known-key attacks

which can cover all previous results.

• Show the separation of known-key and secret-key settings.

Ciphers secure in secret-key model

Ciphers secure in known-key model

security in one security in the other

Page 24: Formalizing Known-Key “Distinguishers”

Our Results 2

• Known-key attacks up to 11-rounds of Feistel-SP

K

F

K

F

Previous [KR07]

Ours

Feistel

• Round function F :

• 7 rounds are not ideal.

f

K

• Round function F :

• 11 rounds are not ideal.

MD

S

K SS

S

S-layer P-layer

Page 25: Formalizing Known-Key “Distinguishers”

Conclusions

• Known-key distinguishers are useful tools to evaluate the security of key-less primitives.

• Our recent work

– Formalization

– Separation of secret/known key settings

–Attacks on 11-rounds of Feistel-SP

Thank you for your attention !!