the phantom of differential characteristics
play

The Phantom of Differential Characteristics Yunwen Liu joint work - PowerPoint PPT Presentation

The Phantom of Differential Characteristics Yunwen Liu joint work with Bing Sun, Guoqiang Liu, Chao Li and Shaojing Fu ESAT/COSIC, KU Leuven, and imec, Belgium National University of Defense Technology, China ASK, December 2017 1 Motivation 2


  1. Effective Keys and Singular Characteristics Differential probability is dependent on the key Characteristics with zero or nonzero probability Effective keys A key is effective for a characteristic if the characteristic is of nonzero probability under the key. If no effective key exists, it is called a singular characteristic . 10

  2. Effective Keys k S P S SPN cipher with keys XORed after the linear layer

  3. Effective Keys k y x S P S SPN cipher with keys XORed after the linear layer Right output and right input of the Sboxes 11

  4. Effective Keys k y x S P S SPN cipher with keys XORed after the linear layer Right output and right input of the Sboxes Effective key candidates: k = Px ⊕ y 11

  5. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 12

  6. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 12

  7. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 12

  8. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k 12

  9. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k When the difference propagation is legal, the effective key set of a 2-round characteristic is non-empty. 12

  10. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k When the difference propagation is legal, the effective key set of a 2-round characteristic is non-empty. Effective keys derived from two consecutive rounds may not be compatible with the key schedule. 12

  11. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k Procedure: 13

  12. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k Procedure: 1. Conditions on K i to be effective 13

  13. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k Procedure: 1. Conditions on K i to be effective 2. Conditions based on a specific key schedule 13

  14. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k Procedure: 1. Conditions on K i to be effective 2. Conditions based on a specific key schedule 3. Key schedule details 13

  15. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k Procedure: 1. Conditions on K i to be effective 2. Conditions based on a specific key schedule 3. Key schedule details 4. Linear equation systems 13

  16. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k Procedure: 1. Conditions on K i to be effective 2. Conditions based on a specific key schedule 3. Key schedule details 4. Linear equation systems ◮ No solution found → singular 13

  17. Singular Characteristics S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k Procedure: 1. Conditions on K i to be effective 2. Conditions based on a specific key schedule 3. Key schedule details 4. Linear equation systems ◮ No solution found → singular ◮ Key candidates found → Further filter by nonlinear constraints 13

  18. Singular Characteristics in the AES Find singular characteristics in AES-128: S << Picture credit: TikZ for Cryptographers 14

  19. Singular Characteristics in the AES Find singular characteristics in AES-128: Subspaces of effective keys in every two S << consecutive rounds Picture credit: TikZ for Cryptographers 14

  20. Singular Characteristics in the AES Find singular characteristics in AES-128: Subspaces of effective keys in every two S << consecutive rounds Build equation systems with key schedule Picture credit: TikZ for Cryptographers 14

  21. Singular Characteristics in the AES Find singular characteristics in AES-128: Subspaces of effective keys in every two S << consecutive rounds Build equation systems with key schedule 3 out of 4 columns in AES-128 key schedule are linear relations Picture credit: TikZ for Cryptographers 14

  22. Singular Characteristics in the AES Find singular characteristics in AES-128: Subspaces of effective keys in every two S << consecutive rounds Build equation systems with key schedule 3 out of 4 columns in AES-128 key schedule are linear relations Simplify and solve the equation system Picture credit: TikZ for Cryptographers 14

  23. Singular Characteristics in the AES Examples of 5-round singular characteristics can be found in the AES-128.         1 0 0 0 1 0 0 0 2 0 0 0 3 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 S P S         → → →         0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0         0 0 0 0 0 0 0 0 3 0 0 0 2 0 0 0       6 2 1 3 24 27 39 9d 6 0 0 0 3 2 3 2 45 36 36 27 0 5 0 0 P S P       → → →       3 6 2 1 36 f1 2e 2d 0 0 5 0       5 4 1 1 39 2d 1f 3a 0 0 0 36       e 0 0 0 1 0 0 0 1 0 0 0 0 9 0 0 0 0 0 0 0 0 0 0 S P S       → → →  .       0 0 d 0 0 0 0 0 0 0 0 0      0 0 0 b 0 0 0 0 0 0 0 0 15

  24. Singular Characteristics in the AES Examples of 5-round singular characteristics can be found in the AES-128.         ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 0 0 0 0 0 0 0 0 ∗ 0 0 0 ∗ 0 0 0 S P S         → → →         0 0 0 0 0 0 0 0 ∗ 0 0 0 ∗ 0 0 0         0 0 0 0 0 0 0 0 ∗ 0 0 0 ∗ 0 0 0       ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ P S P       → → →       ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗       ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗       ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 0 0 0 0 0 0 0 S P S       → → →       0 0 ∗ 0 0 0 0 0 0 0 0 0       0 0 0 ∗ 0 0 0 0 0 0 0 0 MITM attack 15

  25. Singular Characteristics in the AES Density of singular characteristics: 16

  26. Singular Characteristics in the AES Density of singular characteristics:             ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 ∗ 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ S P S P S             → → → → →             ∗ 0 0 0 ∗ 0 0 0 0 0 ∗ 0 0 0 ∗ 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗             ∗ 0 0 0 ∗ 0 0 0 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ 16

  27. Singular Characteristics in the AES Density of singular characteristics:             ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 ∗ 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ S P S P S             → → → → →             ∗ 0 0 0 ∗ 0 0 0 0 0 ∗ 0 0 0 ∗ 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗             ∗ 0 0 0 ∗ 0 0 0 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ Enumerate all characteristics given a 3-round differential 16

  28. Singular Characteristics in the AES Density of singular characteristics:             ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 ∗ 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ S P S P S             → → → → →             ∗ 0 0 0 ∗ 0 0 0 0 0 ∗ 0 0 0 ∗ 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗             ∗ 0 0 0 ∗ 0 0 0 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ Enumerate all characteristics given a 3-round differential More than 98.47% of all the characteristics are singular 16

  29. Singular Characteristics in the AES Density of singular characteristics:             ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 ∗ 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ S P S P S             → → → → →             ∗ 0 0 0 ∗ 0 0 0 0 0 ∗ 0 0 0 ∗ 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗             ∗ 0 0 0 ∗ 0 0 0 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ Enumerate all characteristics given a 3-round differential More than 98.47% of all the characteristics are singular For the remaining characteristics, we consider the nonlinear constraints from the key schedule and get their effective keys 16

  30. Singular Characteristics in the AES Density of singular characteristics:             ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ 0 0 0 ∗ 0 0 0 0 ∗ 0 0 0 ∗ 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ S P S P S             → → → → →             ∗ 0 0 0 ∗ 0 0 0 0 0 ∗ 0 0 0 ∗ 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗             ∗ 0 0 0 ∗ 0 0 0 0 0 0 ∗ 0 0 0 ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ ∗ Enumerate all characteristics given a 3-round differential More than 98.47% of all the characteristics are singular For the remaining characteristics, we consider the nonlinear constraints from the key schedule and get their effective keys ◮ some of them may also be singular ◮ the number of effective keys is around 2 7 to 2 10 16

  31. Singular Characteristics in the AES Different key schedules affect the singularity of a characteristic 17

  32. Singular Characteristics in the AES Different key schedules affect the singularity of a characteristic ◮ Encrypt a pair of plaintexts under some key with AES-128, track the characteristic 17

  33. Singular Characteristics in the AES Different key schedules affect the singularity of a characteristic ◮ Encrypt a pair of plaintexts under some key with AES-128, track the characteristic ◮ Change the key schedule into AES-192 17

  34. Singular Characteristics in the AES Different key schedules affect the singularity of a characteristic ◮ Encrypt a pair of plaintexts under some key with AES-128, track the characteristic ◮ Change the key schedule into AES-192 ◮ A valid characteristic in AES-128 is highly probable to be singular in AES-192 17

  35. Singular Characteristics in the AES Different key schedules affect the singularity of a characteristic ◮ Encrypt a pair of plaintexts under some key with AES-128, track the characteristic ◮ Change the key schedule into AES-192 ◮ A valid characteristic in AES-128 is highly probable to be singular in AES-192 Differential enumeration + key schedule constraints 17

  36. Singular Characteristics in the AES Different key schedules affect the singularity of a characteristic ◮ Encrypt a pair of plaintexts under some key with AES-128, track the characteristic ◮ Change the key schedule into AES-192 ◮ A valid characteristic in AES-128 is highly probable to be singular in AES-192 Differential enumeration + key schedule constraints Extension to AES-like, Feistel-SP, Feistel 17

  37. Singular Characteristics in Prince 18

  38. Singular Characteristics in Prince           8 0 4 0 8 0 4 0 8 0 4 0 8 0 4 0 8 0 5 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 S M ′ SR S           → → → →           4 0 8 0 8 0 4 0 8 0 4 0 4 0 8 0 8 0 5 0           0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0       8 0 5 0 8 0 5 0 2 0 5 0 0 0 0 0 0 0 0 0 0 0 0 0 M ′ SR S       → → →       8 0 5 0 5 0 8 0 2 0 5 0       0 0 0 0 0 0 0 0 0 0 0 0 18

  39. Singular Characteristics in Prince           8 0 4 0 8 0 4 0 8 0 4 0 8 0 4 0 8 0 5 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 S M ′ SR S           → → → →           4 0 8 0 8 0 4 0 8 0 4 0 4 0 8 0 8 0 5 0           0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0       8 0 5 0 8 0 5 0 2 0 5 0 0 0 0 0 0 0 0 0 0 0 0 0 M ′ SR S       → → →       8 0 5 0 5 0 8 0 2 0 5 0       0 0 0 0 0 0 0 0 0 0 0 0 A 3-round singular characteristic with EDP = 2 − 35 18

  40. Singular Cluster S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k 19

  41. Singular Cluster S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k K ′ K ′ K ′ 1 2 3 S P S P S P S P α ′ β ′ α ′ β ′ α ′ β ′ α ′ β ′ α ′ 0 0 1 1 2 2 3 3 4 19

  42. Singular Cluster S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k K ′ K ′ K ′ 1 2 3 S P S P S P S P α ′ β ′ α ′ β ′ α ′ β ′ α ′ β ′ α ′ 0 0 1 1 2 2 3 3 4 If no effective key in common → singular cluster . 19

  43. Singular Cluster S P S P S P S P α 0 α 1 α 2 α 3 α 4 β 0 β 1 β 2 β 3 K 1 K 2 K 3 Key Schedule k K ′ K ′ K ′ 1 2 3 S P S P S P S P α ′ β ′ α ′ β ′ α ′ β ′ α ′ β ′ α ′ 0 0 1 1 2 2 3 3 4 If no effective key in common → singular cluster . Differentials/truncated differentials/multiple differentials 19

  44. Further Applications Observation: If a differential contains only singular characteristics, it is an impossible differential. 20

  45. Further Applications Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] 20

  46. Further Applications Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule 20

  47. Further Applications Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule Impossible differential by singular characteristics 20

  48. Further Applications Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule Impossible differential by singular characteristics An impossible differential is found in a toy cipher 20

  49. Further Applications Observation: If a differential contains only singular characteristics, it is an impossible differential. Provable security against impossible differential on structures [SLG+16] Focus on the Sbox and the key schedule Impossible differential by singular characteristics An impossible differential is found in a toy cipher Improve distinguishers? 20

  50. Further Applications Consider a 5-round differential D of the AES with active pattern 1-4-16-4-1. The effective keys of each characteristic can be precomputed. By assuming the knowledge on the effective keys of the differential: 21

Recommend


More recommend