cryptanalysis of
play

Cryptanalysis of Round-Reduced LED Ivica Nikoli, Lei Wang and Shuang - PowerPoint PPT Presentation

Cryptanalysis of Round-Reduced LED Ivica Nikoli, Lei Wang and Shuang Wu FSE 2013 Singapore March 11, 2013 1 Outline Backgrounds Specification Previous Analysis Slidex Attack Application Multicollision Application


  1. Cryptanalysis of Round-Reduced LED Ivica Nikolić, Lei Wang and Shuang Wu FSE 2013 Singapore March 11, 2013 1

  2. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 2

  3. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 3

  4. LED • Designed by Guo et al. at CHES 2011 • L ight E ncryption D evice  64-bit block  64- or 128-bit key (primarily) • Conservative security, e.g. concerning  Related-key attack  Distinguishers in hash function setting 4

  5. Specification (1/2) • Extremely simple key schedule  Denote the secret key as K  LED-64: K as each round key  LED-128: K=K 0 ||K 1 , then K 0 and K 1 as round keys alternatively K 0 K 1 K t … P C F 0 F 1 F t 5

  6. Specification (2/2) • LED-64: 8 steps; LED-128: 12 steps • Step functions  AES like  4 rounds and each round as below  Differ in round constants. 6

  7. Timeline of Previous Analysis • Guo et al. at CHES 2011  Distinguishers on 3.75/6.75-step LED-64/-128  Super-Sbox cryptanalysis • Isobe and Shibutani at ACISP 2012  Key recovery on 2/4-step LED-64/-128  Meet-in-the-middle cryptanalysis • Mendel et al. at ASIACRYPT 2012  Key recovery on 4-step LED-128  Related-key key recovery on 4/6-step LED-64/-128  Guess-then-recover, local collision, characteristics and differentials of step functions 7

  8. Security State of LED • The number of attacked steps Key Recovery Distinguisher Single-key Related-key LED-64 2 4 3.75 (8 steps) LED-128 4 6 6.75 (12 steps) 8

  9. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 9

  10. Security State of LED • The number of attacked steps Key Recovery Distinguisher Single-key Related-key LED-64 2 4 3.75 (8 steps) LED-128 4 6 6.75 (12 steps) 10

  11. Slidex Attack • Dunkelman et al. at EUROCRYPT 2012 • Known -plaintext attack • Wok for any public permutation E • Time*Data=2 n  K is n bits long K K P E C 11

  12. Application to 4-Step LED-128 • Guess K 0 K 0 K 0 F 0 F 3 P P' C C' • Recover K 1 E K 1 K 1 K 0 F 1 F 2 C' P' 12

  13. Comparison • Model  Ours: known -plaintext  Previous: chosen -plaintext • Complexity Data Time 2 16 2 112 IS12 2 64 2 96 MRT+12 2 32 2 96 Ours 13

  14. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 14

  15. A 2-Step Even-Mansour • K is n bits long • E 0 and E 1 are public permutations K K K E 0 E 1 P C 15

  16. A 2-Step Even-Mansour • K is n bits long • E 0 and E 1 are public permutations Can we recover K with a complexity less than 2 n ? K K K E 0 E 1 P C 16

  17. An Observation (1/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C K K K E 0 E 1 Y X P C 17

  18. An Observation (2/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C We recover X for some P, which gives us K immediately. K K K E 0 E 1 Y X P C 18

  19. An Observation (3/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C P = -1 (P C X) E 0 (X) E 1 X 19

  20. An Observation (4/7) • K = P X • K = E 0 (X) E 1 -1 (Y) • K = Y C P = -1 ( P C X) E 0 (X) E 1 X 20

  21. An Observation (5/7) • For a t-multicollision on P C, namely = … = = const P 1 C 1 P t C t we get P i = -1 (const X i ) E 0 (X i ) E 1 X i 21

  22. An Observation (6/7) • For a t-multicollision on P C, namely = … = = const P 1 C 1 P t C t we get P i = -1 (const X i ) E 0 (X i ) E 1 X i denoted as P i = G(X i ) 22

  23. An Observation (7/7) • For a t-multicollision on P C, namely = … = = const P 1 C 1 P t C t we recover a X i with a complexity 2 n /t  try 2 n /t random values as X, and match G(X) to {P 1 , P 2 , …, P t }. 23

  24. Application to 6-Step LED-128 • Guess K 0 K 0 K 0 F 0 F 5 C' P P' C • Recover K 1 E 0 E 1 K 1 K 1 K 1 K 0 K 0 F 1 F 2 F 3 F 4 P' C' 24

  25. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 25

  26. Differential vs Characteristic • Differential ∆ in ∆ out ? ? ? ? • Characteristic ∆ in ∆ out ∆ 1 ∆ 2 ∆ 3 ∆ 4  The characteristic probability on an active step function is upper bounded by 2 -50 . 26

  27. Differential on 2-step LED-64 • For a differential �∆ 1 , ∆ 2 ) → ∆ 3  what is the complexity of finding a solution (P, K)? ∆ 2 ∆ 2 ∆ 2 ∆ 3 ∆ 1 F 0 F 1 27

  28. Differential on 2-step LED-64 • Meet-in-the-middle approach  One solution with a birthday complexity • Differential multicollision distinguisher ∆ 2 ∆ 2 ∆ 2 ∆ 3 ∆ 1 F 0 F 1 28

  29. Extend to 4-Step LED-64 • Chosen differentials �∆, ∆� → ∆  Complexity of birthday bound to find a solution (P, K). ∆ ∆ ∆ ∆ ∆ ∆ ∆ F 0 F 1 F 2 F 3 prob=1 prob=1 29

  30. Application to 8-Step LED-128 • Set a random value to K 1 and ∆K 1 =0 K 1 G i F 2*i F 2*i+1 • Set ∆P=∆K 0 =∆, and find a solution �P, K 0 ) ∆ ∆ ∆ ∆ ∆ ∆ ∆ G 0 G 1 G 2 G 3 30

  31. Application to 8-Step LED-128 • Set a random value to K 1 and ∆K 1 =0 K 1 Exploit the freedom of both K 0 and K 1 G i F 2*i F 2*i+1 • Set ∆P=∆K 0 =∆, and find a solution �P, K 0 ) ∆ ∆ ∆ ∆ ∆ ∆ ∆ G 0 G 1 G 2 G 3 31

  32. Random-Difference Distinguisher • On a random difference ∆  Set ∆K 0 =∆, ∆K 1 =0, ∆P=∆ and ∆C=∆  The complexity of finding a solution?  Ideal case: 2 n (n=64) ∆K 0 = ∆ ∆K 1 = 0 LED-128 ∆P= ∆ ∆C= ∆ 32

  33. Distinguisher on 10 Steps • Difference propagation  Passive step function  Active step function ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ 33

  34. Attack Procedure (1/3) • Phase 1 : find solutions for differentials on F 2 and F 3 , and on F 6 and F 7 .  Exploit the freedom of K 1  At Phase 1, the value of K 1 is chosen. ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ 34

  35. Phase 1 • Find a set of (K 1 , X i , Y i )s such that  all K 1 s are equal  (K 1 , X i )s follows differential on F 2 and F 3  (K 1 , Y i )s follows differential on F 6 and F 7 ∆K 1 =0 ∆K 1 =0 ∆X=∆ ∆Y=∆ ∆ ∆ F 2 F 3 F 6 F 7 Find collision on K 1 35

  36. Attack Procedure (2/3) • Phase 2 : match a solution on F 2 and F 3 to a solution on F 6 and F 7  Exploit the freedom of K 0  At Phase 2, the value of K 0 is chosen. ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ 36

  37. Phase 2 • Similar with the key-recovery attack on single-key 1-step Even-Mansour  Utilize the set {(K 1 , X i , Y i )} from Phase 1. E K 0 K 0 K 1 F 4 F 5 X i Y i 37

  38. Attack Procedure (3/3) • Phase 3 : compute P to obtain a solution (P, K 0 , K 1 ). ∆ 0 0 0 0 0 ∆ ∆ ∆ ∆ ∆ ∆ ∆ Prob=1 Prob=1 38

  39. Distinguisher • The complexity of our attack is 2 60.3 , which is smaller than 2 64  10-step LED-128 is “ non- ideal” • Irrespective to the specification of step function. 39

  40. Outline • Backgrounds  Specification  Previous Analysis • Slidex Attack Application • Multicollision Application • Distinguishers  Differential Property  Random-difference Distinguisher • Conclusion 40

  41. Updated State of LED • The number of attacked steps Key Recovery Distinguisher Single-key Related-key LED-64 2 4 �.�� → � (8 steps) LED-128 � → � 6 �.�� → �� (12 steps) 41

  42. Thank you for your attention!

Recommend


More recommend