首页 > 最新文献

IACR Transactions on Symmetric Cryptology最新文献

英文 中文
Bounds for the Security of Ascon against Differential and Linear Cryptanalysis Ascon对微分和线性密码分析的安全性界
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-03-11 DOI: 10.46586/tosc.v2022.i1.64-87
John Erlacher, Florian Mendel, Maria Eichlseder
The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices. One essential criterion for the evaluation of the 10 finalists is the evidence for their security against attacks like linear and differential cryptanalysis. For Ascon, one of the finalists and previous winner of the CAESAR competition in the ‘lightweight’ category, there is a large gap between the proven bounds and the best known characteristics found with heuristic tools: The bounds only cover up to 3 rounds with 15 differentially and 13 linearly active S-boxes, insufficient for proving a level of security for the full constructions.In this paper, we propose a new modeling strategy for SAT solvers and derive strong bounds for the round-reduced Ascon permutation. We prove that 4 rounds already ensure that any single characteristic has a differential probability or squared correlation of at most 2−72, and 6 rounds at most 2−108. This is significantly below the bound that could be exploited within the query limit for keyed Ascon modes. These bounds are probably not tight. To achieve this result, we propose a new search strategy of dividing the search space into a large number of subproblems based on ‘girdle patterns’, and show how to exploit the rotational symmetry of Ascon using necklace theory. Additionally, we evaluate and optimize several aspects of the pure SAT model, including the counter implementation and parallelizability, which we expect to be useful for future applications to other models.
NIST轻量级加密项目旨在标准化对称加密设计,包括适用于受限设备的身份验证加密和散列。评估10个最终入选者的一个重要标准是它们抵御线性和差分密码分析等攻击的安全性证据。Ascon是CAESAR竞赛“轻量级”类别的决赛选手之一,也是之前的获胜者。对于Ascon来说,已证明的边界与启发式工具发现的最知名特征之间存在很大差距:边界仅涵盖最多3轮,其中包含15个差分和13个线性活动s盒,不足以证明完整结构的安全级别。在本文中,我们提出了一种新的SAT求解器建模策略,并推导出了约圆Ascon置换的强界。我们证明了4轮已经保证任何单个特征的微分概率或平方相关不超过2−72,6轮不超过2−108。这明显低于查询限制中键控Ascon模式可以利用的范围。这些界限可能并不严格。为了实现这一结果,我们提出了一种新的搜索策略,将搜索空间划分为基于“束带模式”的大量子问题,并展示了如何利用项链理论利用Ascon的旋转对称性。此外,我们评估和优化了纯SAT模型的几个方面,包括计数器实现和并行性,我们希望这对其他模型的未来应用有用。
{"title":"Bounds for the Security of Ascon against Differential and Linear Cryptanalysis","authors":"John Erlacher, Florian Mendel, Maria Eichlseder","doi":"10.46586/tosc.v2022.i1.64-87","DOIUrl":"https://doi.org/10.46586/tosc.v2022.i1.64-87","url":null,"abstract":"The NIST Lightweight Cryptography project aims to standardize symmetric cryptographic designs, including authenticated encryption and hashing, suitable for constrained devices. One essential criterion for the evaluation of the 10 finalists is the evidence for their security against attacks like linear and differential cryptanalysis. For Ascon, one of the finalists and previous winner of the CAESAR competition in the ‘lightweight’ category, there is a large gap between the proven bounds and the best known characteristics found with heuristic tools: The bounds only cover up to 3 rounds with 15 differentially and 13 linearly active S-boxes, insufficient for proving a level of security for the full constructions.In this paper, we propose a new modeling strategy for SAT solvers and derive strong bounds for the round-reduced Ascon permutation. We prove that 4 rounds already ensure that any single characteristic has a differential probability or squared correlation of at most 2−72, and 6 rounds at most 2−108. This is significantly below the bound that could be exploited within the query limit for keyed Ascon modes. These bounds are probably not tight. To achieve this result, we propose a new search strategy of dividing the search space into a large number of subproblems based on ‘girdle patterns’, and show how to exploit the rotational symmetry of Ascon using necklace theory. Additionally, we evaluate and optimize several aspects of the pure SAT model, including the counter implementation and parallelizability, which we expect to be useful for future applications to other models.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"172 1","pages":"64-87"},"PeriodicalIF":3.5,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86934333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Formal Analysis of Boomerang Probabilities 回旋镖概率的形式化分析
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-03-11 DOI: 10.46586/tosc.v2022.i1.88-109
Andreas B. Kidmose, Tyge Tiessen
In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying differential trails that are not well-founded. We underline the problems inherent in these independence assumptions by using them to prove that for any boomerang there exists a differential trail over the entire cipher with a higher probability than the boomerang.While cryptanalysts today have a clear understanding that the trails can be dependent, the focus of previous research has mostly gone into using these dependencies to improve attacks but little effort has been put into giving boomerangs and their success probabilities a stronger theoretical underpinning. With this publication, we provide such a formalization.We provide a framework which allows us to formulate and prove rigorous statements about the probabilities involved in boomerang attacks without relying on independence assumptions of the trails. Among these statements is a proof that two-round boomerangs on SPNs with differentially 4-uniform S-boxes always deviate from the classical probability estimate to the largest degree possible.We applied the results of this formalization to analyze the validity of some of the first boomerang attacks. We show that the boomerang constructed in the amplified boomerang attack on Serpent by Kelsey, Kohno, and Schneier has probability zero. For the rectangle attack on Serpent by Dunkelman, Biham, and Keller, we demonstrate that a minuscule fraction of only 2−43.4 of all differential trail combinations used in the original attack have a non-zero probability. In spite of this, the probability of the boomerang is in fact a little higher than the original estimate suggests as the non-zero trails have a vastly higher probability than the classical estimate predicts.
在过去的20年里,回旋镖攻击已经成为分组密码分析中的一个重要工具。在对其成功概率的经典估计中,对潜在差异轨迹的独立性做出了假设,这些假设是没有充分根据的。我们强调了这些独立性假设中固有的问题,通过使用它们来证明对于任何回飞镖,在整个密码中存在一个比回飞镖更高概率的微分轨迹。虽然今天的密码分析师已经清楚地认识到轨迹可能是依赖的,但以前的研究主要集中在利用这些依赖关系来改进攻击,但很少努力为回旋镖及其成功概率提供更强大的理论基础。在本出版物中,我们提供了这样一种形式。我们提供了一个框架,使我们能够制定和证明关于回旋镖攻击所涉及的概率的严格陈述,而不依赖于轨迹的独立假设。在这些陈述中,有一个证明,具有差分4-均匀s盒的spn上的两轮回飞镖总是最大程度地偏离经典概率估计。我们应用这种形式化的结果来分析一些第一次回旋镖攻击的有效性。我们证明了Kelsey, Kohno和Schneier在放大回飞镖攻击Serpent中构造的回飞镖的概率为零。对于Dunkelman, Biham和Keller对Serpent的矩形攻击,我们证明了在原始攻击中使用的所有差分轨迹组合中只有极小部分的2−43.4具有非零概率。尽管如此,回旋镖的概率实际上比原来的估计要高一些,因为非零轨迹的概率比经典估计预测的要高得多。
{"title":"A Formal Analysis of Boomerang Probabilities","authors":"Andreas B. Kidmose, Tyge Tiessen","doi":"10.46586/tosc.v2022.i1.88-109","DOIUrl":"https://doi.org/10.46586/tosc.v2022.i1.88-109","url":null,"abstract":"In the past 20 years since their conception, boomerang attacks have become an important tool in the cryptanalysis of block ciphers. In the classical estimate of their success probability, assumptions are made about the independence of the underlying differential trails that are not well-founded. We underline the problems inherent in these independence assumptions by using them to prove that for any boomerang there exists a differential trail over the entire cipher with a higher probability than the boomerang.While cryptanalysts today have a clear understanding that the trails can be dependent, the focus of previous research has mostly gone into using these dependencies to improve attacks but little effort has been put into giving boomerangs and their success probabilities a stronger theoretical underpinning. With this publication, we provide such a formalization.We provide a framework which allows us to formulate and prove rigorous statements about the probabilities involved in boomerang attacks without relying on independence assumptions of the trails. Among these statements is a proof that two-round boomerangs on SPNs with differentially 4-uniform S-boxes always deviate from the classical probability estimate to the largest degree possible.We applied the results of this formalization to analyze the validity of some of the first boomerang attacks. We show that the boomerang constructed in the amplified boomerang attack on Serpent by Kelsey, Kohno, and Schneier has probability zero. For the rectangle attack on Serpent by Dunkelman, Biham, and Keller, we demonstrate that a minuscule fraction of only 2−43.4 of all differential trail combinations used in the original attack have a non-zero probability. In spite of this, the probability of the boomerang is in fact a little higher than the original estimate suggests as the non-zero trails have a vastly higher probability than the classical estimate predicts.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"65 1","pages":"88-109"},"PeriodicalIF":3.5,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81617268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n (F_p)^n上对称格式中的Legendre符号和模-2算子
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-03-11 DOI: 10.46586/tosc.v2022.i1.5-37
Lorenzo Grassi, D. Khovratovich, Sondre Rønjom, Markus Schofnegger
Motivated by modern cryptographic use cases such as multi-party computation (MPC), homomorphic encryption (HE), and zero-knowledge (ZK) protocols, several symmetric schemes that are efficient in these scenarios have recently been proposed in the literature. Some of these schemes are instantiated with low-degree nonlinear functions, for example low-degree power maps (e.g., MiMC, HadesMiMC, Poseidon) or the Toffoli gate (e.g., Ciminion). Others (e.g., Rescue, Vision, Grendel) are instead instantiated via high-degree functions which are easy to evaluate in the target application. A recent example for the latter case is the hash function Grendel, whose nonlinear layer is constructed using the Legendre symbol. In this paper, we analyze high-degree functions such as the Legendre symbol or the modulo-2 operation as building blocks for the nonlinear layer of a cryptographic scheme over Fnp.Our focus regards the security analysis rather than the efficiency in the mentioned use cases. For this purpose, we present several new invertible functions that make use of the Legendre symbol or of the modulo-2 operation.Even though these functions often provide strong statistical properties and ensure a high degree after a few rounds, the main problem regards their small number of possible outputs, that is, only three for the Legendre symbol and only two for the modulo-2 operation. By fixing them, it is possible to reduce the overall degree of the function significantly. We exploit this behavior by describing the first preimage attack on full Grendel, and we verify it in practice.
受现代密码学用例(如多方计算(MPC)、同态加密(HE)和零知识(ZK)协议)的推动,最近在文献中提出了几种在这些场景中有效的对称方案。其中一些方案是用低阶非线性函数实例化的,例如低阶功率映射(例如,MiMC, HadesMiMC, Poseidon)或Toffoli门(例如,Ciminion)。其他(例如,Rescue, Vision, Grendel)则通过高阶函数实例化,这些函数在目标应用程序中易于评估。后一种情况的一个最近的例子是哈希函数Grendel,它的非线性层是用Legendre符号构造的。在本文中,我们分析了高次函数,如Legendre符号或模-2运算,作为Fnp上密码方案的非线性层的构建块。我们关注的是安全性分析,而不是上述用例中的效率。为此,我们提出了几个利用勒让德符号或模-2运算的新的可逆函数。尽管这些函数通常提供了强大的统计特性,并在几轮之后确保了很高的程度,但主要问题在于它们可能的输出数量很少,也就是说,只有三个用于勒让德符号,只有两个用于模-2运算。通过修复它们,可以显著降低功能的总体程度。我们通过描述全格伦德尔的第一次预映像攻击来利用这种行为,并在实践中验证了它。
{"title":"The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over (F_p)^n","authors":"Lorenzo Grassi, D. Khovratovich, Sondre Rønjom, Markus Schofnegger","doi":"10.46586/tosc.v2022.i1.5-37","DOIUrl":"https://doi.org/10.46586/tosc.v2022.i1.5-37","url":null,"abstract":"Motivated by modern cryptographic use cases such as multi-party computation (MPC), homomorphic encryption (HE), and zero-knowledge (ZK) protocols, several symmetric schemes that are efficient in these scenarios have recently been proposed in the literature. Some of these schemes are instantiated with low-degree nonlinear functions, for example low-degree power maps (e.g., MiMC, HadesMiMC, Poseidon) or the Toffoli gate (e.g., Ciminion). Others (e.g., Rescue, Vision, Grendel) are instead instantiated via high-degree functions which are easy to evaluate in the target application. A recent example for the latter case is the hash function Grendel, whose nonlinear layer is constructed using the Legendre symbol. In this paper, we analyze high-degree functions such as the Legendre symbol or the modulo-2 operation as building blocks for the nonlinear layer of a cryptographic scheme over Fnp.Our focus regards the security analysis rather than the efficiency in the mentioned use cases. For this purpose, we present several new invertible functions that make use of the Legendre symbol or of the modulo-2 operation.Even though these functions often provide strong statistical properties and ensure a high degree after a few rounds, the main problem regards their small number of possible outputs, that is, only three for the Legendre symbol and only two for the modulo-2 operation. By fixing them, it is possible to reduce the overall degree of the function significantly. We exploit this behavior by describing the first preimage attack on full Grendel, and we verify it in practice.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"44 1","pages":"5-37"},"PeriodicalIF":3.5,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76722614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security of COFB against Chosen Ciphertext Attacks COFB对选定密文攻击的安全性
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-03-11 DOI: 10.46586/tosc.v2022.i1.138-157
Mustafa Khairallah
COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project. It comes with provable security results that guarantee its security up to the birthday bound in the nonce-respecting model. However, the designers offer multiple versions of the analysis with different details and the implications of attacks against the scheme are not discussed deeply. In this article, we look at a group of possible forgery and privacy attacks against COFB. We show that the security for both forgery and privacy is bounded by the number of forgery attempts. We show the existence of forgery and privacy attacks with success probability qd/2n/2, given qd forgery attempts. In particular, we show an attack with 2n/2 attempts using only a single known-plaintext encryption query against COFB. While these attacks do not contradict the claims made by the designers of GIFT-COFB, they show its limitations in terms of the number of forgery attempts. They also show that, while COFB generates a 128-bit tag, it behaves in a very similar manner to an AEAD scheme with 64-bit tag. As a result of independent interest, our analysis provides a contradiction to the main theorem of Journal of Cryptology volume 33, pages 703–741 (2020), which includes an improved security proof of COFB compared to the CHES 2017 version. Finally, we discuss the term nqd/2n/2 that appears in the security proof of GIFT-COFB and CHES 2017, showing why there is a security gap between the provable results and the attacks. We emphasize that the results in this article do not threaten the security of GIFT-COFB in the scope of the NIST lightweight cryptography requirements or the claims made by the designers in the specification document of the design.
COFB是一种轻量级的基于分组密码的关联数据认证加密(AEAD)模式。它是在2017年CHES上提出的,是GIFT-COFB的基础,GIFT-COFB是NIST轻量级标准化项目的决赛入围者。它具有可证明的安全性结果,保证其安全性直到不尊重模型中的生日界限。然而,设计人员提供了具有不同细节的多个版本的分析,并且没有深入讨论针对该方案的攻击的含义。在本文中,我们将研究针对COFB的一组可能的伪造和隐私攻击。我们证明了伪造和隐私的安全性都受到伪造尝试次数的限制。我们证明了伪造和隐私攻击的存在性,其成功概率为qd/2n/2,给定qd伪造尝试。特别是,我们展示了一种针对COFB的2n/2次尝试的攻击,仅使用一个已知明文加密查询。虽然这些攻击与GIFT-COFB的设计者所声称的并不矛盾,但它们显示了其在伪造尝试数量方面的局限性。它们还表明,虽然COFB生成128位标记,但其行为方式与具有64位标记的AEAD方案非常相似。由于独立的兴趣,我们的分析与《密码学杂志》第33卷,第703-741页(2020)的主要定理相矛盾,其中包括与CHES 2017版本相比改进的COFB安全性证明。最后,我们讨论了GIFT-COFB和CHES 2017的安全证明中出现的术语nqd/2n/2,说明了为什么可证明的结果与攻击之间存在安全差距。我们强调,本文的结果不会威胁到NIST轻量级加密要求范围内GIFT-COFB的安全性,也不会威胁到设计者在设计规范文档中所做的声明。
{"title":"Security of COFB against Chosen Ciphertext Attacks","authors":"Mustafa Khairallah","doi":"10.46586/tosc.v2022.i1.138-157","DOIUrl":"https://doi.org/10.46586/tosc.v2022.i1.138-157","url":null,"abstract":"COFB is a lightweight Authenticated Encryption with Associated Data (AEAD) mode based on block ciphers. It was proposed in CHES 2017 and is the basis for GIFT-COFB, a finalist in the NIST lightweight standardization project. It comes with provable security results that guarantee its security up to the birthday bound in the nonce-respecting model. However, the designers offer multiple versions of the analysis with different details and the implications of attacks against the scheme are not discussed deeply. In this article, we look at a group of possible forgery and privacy attacks against COFB. We show that the security for both forgery and privacy is bounded by the number of forgery attempts. We show the existence of forgery and privacy attacks with success probability qd/2n/2, given qd forgery attempts. In particular, we show an attack with 2n/2 attempts using only a single known-plaintext encryption query against COFB. While these attacks do not contradict the claims made by the designers of GIFT-COFB, they show its limitations in terms of the number of forgery attempts. They also show that, while COFB generates a 128-bit tag, it behaves in a very similar manner to an AEAD scheme with 64-bit tag. As a result of independent interest, our analysis provides a contradiction to the main theorem of Journal of Cryptology volume 33, pages 703–741 (2020), which includes an improved security proof of COFB compared to the CHES 2017 version. Finally, we discuss the term nqd/2n/2 that appears in the security proof of GIFT-COFB and CHES 2017, showing why there is a security gap between the provable results and the attacks. We emphasize that the results in this article do not threaten the security of GIFT-COFB in the scope of the NIST lightweight cryptography requirements or the claims made by the designers in the specification document of the design.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"18 1","pages":"138-157"},"PeriodicalIF":3.5,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75926216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Towards Low-Latency Implementation of Linear Layers 迈向线性层的低延迟实现
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2022-03-11 DOI: 10.46586/tosc.v2022.i1.158-182
Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang
Lightweight cryptography features a small footprint and/or low computational complexity. Low-cost implementations of linear layers usually play an important role in lightweight cryptography. Although it has been shown by Boyar et al. that finding the optimal implementation of a linear layer is a Shortest Linear Program (SLP) problem and NP-hard, there exist a variety of heuristic methods to search for near-optimal solutions. This paper considers the low-latency criteria and focuses on the heuristic search of lightweight implementation for linear layers. Most of the prior approach iteratively combines the inputs (of linear layers) to reach the output, which can be regarded as the forward search. To better adapt the low-latency criteria, we propose a new framework of backward search that attempts to iteratively split every output (into an XORing of two bits) until all inputs appear. By bounding the time of splitting, the new framework can find a sub-optimal solution with a minimized depth of circuits.We apply our new search algorithm to linear layers of block ciphers and find many low-latency candidates for implementations. Notably, for AES Mixcolumns, we provide an implementation with 103 XOR gates with a depth of 3, which is among the best hardware implementations of the AES linear layer. Besides, we obtain better implementations in XOR gates for 54.3% of 4256 Maximum Distance Separable (MDS) matrices proposed by Li et al. at FSE 2019. We also achieve an involutory MDS matrix (in M4(GL(8, F2))) whose implementation uses the lowest number (i.e., 86, saving 2 from the state-of-the-art result) of XORs with the minimum depth.
轻量级加密的特点是占用空间小和/或计算复杂度低。线性层的低成本实现通常在轻量级密码学中发挥重要作用。虽然Boyar等人已经表明,寻找线性层的最优实现是一个最短线性规划(SLP)问题和np困难,但存在各种启发式方法来搜索近最优解。本文考虑了低延迟标准,重点研究了线性层轻量化实现的启发式搜索。大多数先前的方法迭代地组合(线性层的)输入来达到输出,这可以看作是前向搜索。为了更好地适应低延迟标准,我们提出了一个新的向后搜索框架,它试图迭代地分割每个输出(分成两个比特的XORing),直到所有输入都出现。通过限定分裂时间,新框架可以在最小的电路深度下找到次优解。我们将新的搜索算法应用于分组密码的线性层,并找到许多低延迟的候选实现。值得注意的是,对于AES Mixcolumns,我们提供了103个深度为3的异或门的实现,这是AES线性层的最佳硬件实现之一。此外,我们在XOR门中获得了Li等人在FSE 2019上提出的4256个最大距离可分离(MDS)矩阵中的54.3%的更好实现。我们还实现了一个对合MDS矩阵(在M4(GL(8, F2)),其实现使用最小深度的最小xor数(即86个,从最先进的结果中节省2个)。
{"title":"Towards Low-Latency Implementation of Linear Layers","authors":"Qun Liu, Weijia Wang, Yanhong Fan, Lixuan Wu, Ling Sun, Meiqin Wang","doi":"10.46586/tosc.v2022.i1.158-182","DOIUrl":"https://doi.org/10.46586/tosc.v2022.i1.158-182","url":null,"abstract":"Lightweight cryptography features a small footprint and/or low computational complexity. Low-cost implementations of linear layers usually play an important role in lightweight cryptography. Although it has been shown by Boyar et al. that finding the optimal implementation of a linear layer is a Shortest Linear Program (SLP) problem and NP-hard, there exist a variety of heuristic methods to search for near-optimal solutions. This paper considers the low-latency criteria and focuses on the heuristic search of lightweight implementation for linear layers. Most of the prior approach iteratively combines the inputs (of linear layers) to reach the output, which can be regarded as the forward search. To better adapt the low-latency criteria, we propose a new framework of backward search that attempts to iteratively split every output (into an XORing of two bits) until all inputs appear. By bounding the time of splitting, the new framework can find a sub-optimal solution with a minimized depth of circuits.We apply our new search algorithm to linear layers of block ciphers and find many low-latency candidates for implementations. Notably, for AES Mixcolumns, we provide an implementation with 103 XOR gates with a depth of 3, which is among the best hardware implementations of the AES linear layer. Besides, we obtain better implementations in XOR gates for 54.3% of 4256 Maximum Distance Separable (MDS) matrices proposed by Li et al. at FSE 2019. We also achieve an involutory MDS matrix (in M4(GL(8, F2))) whose implementation uses the lowest number (i.e., 86, saving 2 from the state-of-the-art result) of XORs with the minimum depth.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"41 1","pages":"158-182"},"PeriodicalIF":3.5,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77646334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Automatic Search of Cubes for Attacking Stream Ciphers 攻击流密码的立方体自动搜索
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-12-03 DOI: 10.46586/tosc.v2021.i4.100-123
Yao Sun
Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stream ciphers. As the problem that how to recover the superpolys accurately was resolved by Hao et al. in EUROCRYPT 2020, another important problem is how to find “good” superpolys, which is equivalent to finding “good” cubes. However, there are two difficulties in finding “good” cubes. Firstly, the number of candidate cubes is enormous and most of the cubes are not “good”. Secondly, it is costly to evaluate whether a cube is “good”.In this paper, we present a new algorithm to search for a kind of “good” cubes, called valuable cubes. A cube is called valuable, if its superpoly has (at least) a balanced secret variable. A valuable cube is “good”, because its superpoly brings in 1 bit of information about the key. More importantly, the superpolys of valuable cubes could be used in both theoretical and practical analyses. To search for valuable cubes, instead of testing a set of cubes one by one, the new algorithm deals with the set of cubes together, such that the common computations can be done only once for all candidate cubes and duplicated computations are avoided. Besides, the new algorithm uses a heuristic method to reject useless cubes efficiently. This heuristic method is based on the divide-and-conquer strategy as well as an observation.For verifications of this new algorithm, we applied it to Trivium and Kreyvium, and obtained three improvements. Firstly, we found two valuable cubes for 843-round Trivium, such that we proposed, as far as we know, the first theoretical key-recovery attack against 843-round Trivium, while the previous highest round of Trivium that can be attacked was 842, given by Hao et al. in EUROCRYPT 2020. Secondly, by finding many small valuable cubes, we presented practical attacks against 806- and 808-round Trivium for the first time, while the previous highest round of Trivium that can be attacked practically was 805. Thirdly, based on the cube used to attack 892-round Kreyvium in EUROCRYPT 2020, we found more valuable cubes and mounted the key-recovery attacks against Kreyvium to 893-round.
立方体攻击是由Dinur和Shamir提出的,它已经成为分析流密码的重要工具。正如Hao等人在EUROCRYPT 2020中解决了如何准确地恢复超多边形的问题一样,另一个重要的问题是如何找到“好的”超多边形,这相当于找到“好的”立方体。然而,找到“好的”立方体有两个困难。首先,候选立方体的数量非常大,而且大多数立方体都不是“好”的。其次,评估一个立方体是否“好”是很昂贵的。在本文中,我们提出了一种新的算法来搜索一类“好”立方体,称为有价值立方体。一个立方体被称为有价值的,如果它的超多边形(至少)有一个平衡的秘密变量。一个有价值的立方体是“好的”,因为它的超聚带来了1位关于密钥的信息。更重要的是,有价立方的超多元可以用于理论和实际分析。为了搜索有价值的数据集,该算法不是逐个测试一组数据集,而是将一组数据集放在一起处理,这样对所有候选数据集只需进行一次公共计算,避免了重复计算。此外,该算法采用启发式方法有效地剔除了无用的多维数据集。这种启发式方法是基于分而治之的策略和观察。为了验证新算法的有效性,我们将其应用于Trivium和Kreyvium,得到了三个改进。首先,我们找到了843轮Trivium的两个有价值的立方体,因此,据我们所知,我们提出了针对843轮Trivium的第一个理论密钥恢复攻击,而之前可以攻击的最高轮Trivium是842,由Hao等人在EUROCRYPT 2020中给出。其次,通过寻找许多有价值的小方块,我们首次展示了针对806和808回合的Trivium的实际攻击,而之前Trivium的最高可攻击回合是805。第三,基于EUROCRYPT 2020中用于攻击892轮Kreyvium的立方体,我们发现了更多有价值的立方体,并将针对Kreyvium的密钥恢复攻击增加到893轮。
{"title":"Automatic Search of Cubes for Attacking Stream Ciphers","authors":"Yao Sun","doi":"10.46586/tosc.v2021.i4.100-123","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i4.100-123","url":null,"abstract":"Cube attack was proposed by Dinur and Shamir, and it has become an important tool for analyzing stream ciphers. As the problem that how to recover the superpolys accurately was resolved by Hao et al. in EUROCRYPT 2020, another important problem is how to find “good” superpolys, which is equivalent to finding “good” cubes. However, there are two difficulties in finding “good” cubes. Firstly, the number of candidate cubes is enormous and most of the cubes are not “good”. Secondly, it is costly to evaluate whether a cube is “good”.In this paper, we present a new algorithm to search for a kind of “good” cubes, called valuable cubes. A cube is called valuable, if its superpoly has (at least) a balanced secret variable. A valuable cube is “good”, because its superpoly brings in 1 bit of information about the key. More importantly, the superpolys of valuable cubes could be used in both theoretical and practical analyses. To search for valuable cubes, instead of testing a set of cubes one by one, the new algorithm deals with the set of cubes together, such that the common computations can be done only once for all candidate cubes and duplicated computations are avoided. Besides, the new algorithm uses a heuristic method to reject useless cubes efficiently. This heuristic method is based on the divide-and-conquer strategy as well as an observation.For verifications of this new algorithm, we applied it to Trivium and Kreyvium, and obtained three improvements. Firstly, we found two valuable cubes for 843-round Trivium, such that we proposed, as far as we know, the first theoretical key-recovery attack against 843-round Trivium, while the previous highest round of Trivium that can be attacked was 842, given by Hao et al. in EUROCRYPT 2020. Secondly, by finding many small valuable cubes, we presented practical attacks against 806- and 808-round Trivium for the first time, while the previous highest round of Trivium that can be attacked practically was 805. Thirdly, based on the cube used to attack 892-round Kreyvium in EUROCRYPT 2020, we found more valuable cubes and mounted the key-recovery attacks against Kreyvium to 893-round.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"10 1","pages":"100-123"},"PeriodicalIF":3.5,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81425593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improved Security Bound of (E/D)WCDM 改进的(E/D)WCDM安全边界
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-12-03 DOI: 10.46586/tosc.v2021.i4.138-176
N. Datta, Avijit Dutta, Kushankur Dutta
In CRYPTO’16, Cogliati and Seurin proposed a block cipher based nonce based MAC, called Encrypted Wegman-Carter with Davies-Meyer (EWCDM), that gives 2n/3 bit MAC security in the nonce respecting setting and n/2 bit security in the nonce misuse setting, where n is the block size of the underlying block cipher. However, this construction requires two independent block cipher keys. In CRYPTO’18, Datta et al. came up with a single-keyed block cipher based nonce based MAC, called Decrypted Wegman-Carter with Davies-Meyer (DWCDM), that also provides 2n/3 bit MAC security in the nonce respecting setting and n/2 bit security in the nonce misuse setting. However, the drawback of DWCDM is that it takes only 2n/3 bit nonce. In fact, authors have shown that DWCDM cannot achieve beyond the birthday bound security with n bit nonces. In this paper, we prove that DWCDM with 3n/4 bit nonces provides MAC security up to O(23n/4) MAC queries against all nonce respecting adversaries. We also improve the MAC bound of EWCDM from 2n/3 bit to 3n/4 bit. The backbone of these two results is a refined treatment of extended mirror theory that systematically estimates the number of solutions to a system of bivariate affine equations and non-equations, which we apply on the security proofs of the constructions to achieve 3n/4 bit security.
在CRYPTO ' 16中,Cogliati和Seurin提出了一种基于nonce的分组密码MAC,称为Encrypted Wegman-Carter with Davies-Meyer (EWCDM),它在nonce尊重设置下给出了2n/3位的MAC安全性,在nonce误用设置下给出了n/2位的安全性,其中n为底层分组密码的块大小。然而,这种构造需要两个独立的分组密码密钥。在CRYPTO ' 18中,Datta等人提出了一种基于nonce的单键分组密码MAC,称为Decrypted Wegman-Carter with Davies-Meyer (DWCDM),它还在nonce尊重设置中提供2n/3位MAC安全性,在nonce误用设置中提供n/2位安全性。然而,DWCDM的缺点是它只需要2n/3比特的nonce。事实上,作者已经证明DWCDM不能实现超过n位随机数的生日界限安全性。在本文中,我们证明了具有3n/4位随机数的DWCDM对所有尊重随机数的对手提供高达O(23n/4)个MAC查询的MAC安全性。我们还将EWCDM的MAC界从2n/3位提高到3n/4位。这两个结果的主干是对扩展镜像理论的精细处理,该理论系统地估计了二元仿射方程和非方程系统的解的数量,我们将其应用于结构的安全性证明,以实现3n/4位安全性。
{"title":"Improved Security Bound of (E/D)WCDM","authors":"N. Datta, Avijit Dutta, Kushankur Dutta","doi":"10.46586/tosc.v2021.i4.138-176","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i4.138-176","url":null,"abstract":"In CRYPTO’16, Cogliati and Seurin proposed a block cipher based nonce based MAC, called Encrypted Wegman-Carter with Davies-Meyer (EWCDM), that gives 2n/3 bit MAC security in the nonce respecting setting and n/2 bit security in the nonce misuse setting, where n is the block size of the underlying block cipher. However, this construction requires two independent block cipher keys. In CRYPTO’18, Datta et al. came up with a single-keyed block cipher based nonce based MAC, called Decrypted Wegman-Carter with Davies-Meyer (DWCDM), that also provides 2n/3 bit MAC security in the nonce respecting setting and n/2 bit security in the nonce misuse setting. However, the drawback of DWCDM is that it takes only 2n/3 bit nonce. In fact, authors have shown that DWCDM cannot achieve beyond the birthday bound security with n bit nonces. In this paper, we prove that DWCDM with 3n/4 bit nonces provides MAC security up to O(23n/4) MAC queries against all nonce respecting adversaries. We also improve the MAC bound of EWCDM from 2n/3 bit to 3n/4 bit. The backbone of these two results is a refined treatment of extended mirror theory that systematically estimates the number of solutions to a system of bivariate affine equations and non-equations, which we apply on the security proofs of the constructions to achieve 3n/4 bit security.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"8 1","pages":"138-176"},"PeriodicalIF":3.5,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73227361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation CTET+:一种使用单个伪随机排列的超过生日限制的安全可调加密方案
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-12-03 DOI: 10.46586/tosc.v2021.i4.1-35
Benoît Cogliati, J. Ethan, Virginie Lallemand, ByeongHak Lee, Jooyoung Lee, M. Minier
In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using a single secret S-box. This construction is based on non-linear permutation layers using independent round keys, and achieves security beyond the birthday bound in the random permutation model. When instantiated with an n-bit block cipher with ωn-bit keys, the resulting tweakable block cipher, dubbed CTET+, can be viewed as a tweakable enciphering scheme that encrypts ωκ-bit messages for any integer ω ≥ 2 using 5n + κ-bit keys and n-bit tweaks, providing 2n/3-bit security.Compared to the 2-round non-linear SPN analyzed in [CDK+18], we both minimize it by requiring a single permutation, and weaken the requirements on the middle linear layer, allowing better performance. As a result, CTET+ becomes the first tweakable enciphering scheme that provides beyond-birthday-bound security using a single permutation, while its efficiency is still comparable to existing schemes including AES-XTS, EME, XCB and TET. Furthermore, we propose a new tweakable enciphering scheme, dubbed AES6-CTET+, which is an actual instantiation of CTET+ using a reduced round AES block cipher as the underlying secret S-box. Extensivecryptanalysis of this algorithm allows us to claim 127 bits of security.Such tweakable enciphering schemes with huge block sizes become desirable in the context of disk encryption, since processing a whole sector as a single block significantly worsens the granularity for attackers when compared to, for example, AES-XTS, which treats every 16-byte block on the disk independently. Besides, as a huge amount of data is being stored and encrypted at rest under many different keys in clouds, beyond-birthday-bound security will most likely become necessary in the short term.
在这项工作中,我们提出了一个使用单个秘密s盒的2轮可调替代置换网络的构造。该构造基于非线性排列层,使用独立的轮密钥,在随机排列模型中实现了超越生日界的安全性。当用一个带有ωn位密钥的n位分组密码实例化时,所得到的可调整分组密码被称为CTET+,可以看作是一个可调整的加密方案,它使用5n + κ位密钥和n位调整对任意整数ω≥2的ωκ位消息进行加密,提供2n/3位安全性。与[CDK+18]中分析的2轮非线性SPN相比,我们既通过要求单次排列将其最小化,又削弱了对中间线性层的要求,从而获得更好的性能。因此,CTET+成为第一个使用单一排列提供超过生日限制安全性的可调整加密方案,而其效率仍可与现有方案(包括AES-XTS, EME, XCB和TET)相媲美。此外,我们提出了一种新的可调整的加密方案,称为AES6-CTET+,它是CTET+的实际实例,使用简化的圆形AES分组密码作为底层秘密s盒。对该算法进行广泛的加密分析使我们能够声称127位的安全性。这种具有巨大块大小的可调整加密方案在磁盘加密上下文中变得非常理想,因为与单独处理磁盘上的每个16字节块的AES-XTS相比,将整个扇区作为单个块处理会大大降低攻击者的粒度。此外,由于大量数据在云中以许多不同的密钥静态存储和加密,短期内很可能需要超越生日限制的安全性。
{"title":"CTET+: A Beyond-Birthday-Bound Secure Tweakable Enciphering Scheme Using a Single Pseudorandom Permutation","authors":"Benoît Cogliati, J. Ethan, Virginie Lallemand, ByeongHak Lee, Jooyoung Lee, M. Minier","doi":"10.46586/tosc.v2021.i4.1-35","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i4.1-35","url":null,"abstract":"In this work, we propose a construction of 2-round tweakable substitutionpermutation networks using a single secret S-box. This construction is based on non-linear permutation layers using independent round keys, and achieves security beyond the birthday bound in the random permutation model. When instantiated with an n-bit block cipher with ωn-bit keys, the resulting tweakable block cipher, dubbed CTET+, can be viewed as a tweakable enciphering scheme that encrypts ωκ-bit messages for any integer ω ≥ 2 using 5n + κ-bit keys and n-bit tweaks, providing 2n/3-bit security.Compared to the 2-round non-linear SPN analyzed in [CDK+18], we both minimize it by requiring a single permutation, and weaken the requirements on the middle linear layer, allowing better performance. As a result, CTET+ becomes the first tweakable enciphering scheme that provides beyond-birthday-bound security using a single permutation, while its efficiency is still comparable to existing schemes including AES-XTS, EME, XCB and TET. Furthermore, we propose a new tweakable enciphering scheme, dubbed AES6-CTET+, which is an actual instantiation of CTET+ using a reduced round AES block cipher as the underlying secret S-box. Extensivecryptanalysis of this algorithm allows us to claim 127 bits of security.Such tweakable enciphering schemes with huge block sizes become desirable in the context of disk encryption, since processing a whole sector as a single block significantly worsens the granularity for attackers when compared to, for example, AES-XTS, which treats every 16-byte block on the disk independently. Besides, as a huge amount of data is being stored and encrypted at rest under many different keys in clouds, beyond-birthday-bound security will most likely become necessary in the short term.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"62 1","pages":"1-35"},"PeriodicalIF":3.5,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75426738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis 相关差分统计模型与相关密钥线性密码分析
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-12-03 DOI: 10.46586/tosc.v2021.i4.124-137
K. Nyberg
The goal of this work is to propose a related-key model for linear cryptanalysis. We start by giving the mean and variance of the difference of sampled correlations of two Boolean functions when using the same sample of inputs to compute both correlations. This result is further extended to determine the mean and variance of the difference of correlations of a pair of Boolean functions taken over a random data sample of fixed size and over a random pair of Boolean functions. We use the properties of the multinomial distribution to achieve these results without independence assumptions. Using multivariate normal approximation of the multinomial distribution we obtain that the distribution of the difference of related-key correlations is approximately normal. This result is then applied to existing related-key cryptanalyses. We obtain more accurate right-key and wrong-key distributions and remove artificial assumptions about independence of sampled correlations. We extend this study to using multiple linear approximations and propose a Χ2-type statistic, which is proven to be Χ2 distributed if the linear approximations are independent. We further examine this statistic for multidimensional linear approximation and discuss why removing the assumption about independence of linear approximations does not work in the related-key setting the same way as in the single-key setting.
这项工作的目标是提出一个线性密码分析的相关密钥模型。当使用相同的输入样本来计算两个布尔函数的相关性时,我们首先给出两个布尔函数的采样相关性差异的均值和方差。这一结果进一步推广到确定在固定大小的随机数据样本和随机布尔函数对上的一对布尔函数的相关性差的均值和方差。我们使用多项分布的性质来获得这些结果,而不需要独立的假设。利用多项分布的多元正态逼近,得到了相关键相关差的近似正态分布。然后将此结果应用于现有的相关密钥密码分析。我们获得了更准确的右键和错键分布,并消除了关于采样相关性独立性的人为假设。我们将此研究扩展到使用多个线性近似,并提出一个Χ2-type统计量,证明如果线性近似是独立的,则该统计量是Χ2分布的。我们进一步检查多维线性近似的统计量,并讨论为什么在相关键设置中删除关于线性近似独立性的假设与在单键设置中相同的方式不起作用。
{"title":"Statistical Model of Correlation Difference and Related-Key Linear Cryptanalysis","authors":"K. Nyberg","doi":"10.46586/tosc.v2021.i4.124-137","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i4.124-137","url":null,"abstract":"The goal of this work is to propose a related-key model for linear cryptanalysis. We start by giving the mean and variance of the difference of sampled correlations of two Boolean functions when using the same sample of inputs to compute both correlations. This result is further extended to determine the mean and variance of the difference of correlations of a pair of Boolean functions taken over a random data sample of fixed size and over a random pair of Boolean functions. We use the properties of the multinomial distribution to achieve these results without independence assumptions. Using multivariate normal approximation of the multinomial distribution we obtain that the distribution of the difference of related-key correlations is approximately normal. This result is then applied to existing related-key cryptanalyses. We obtain more accurate right-key and wrong-key distributions and remove artificial assumptions about independence of sampled correlations. We extend this study to using multiple linear approximations and propose a Χ2-type statistic, which is proven to be Χ2 distributed if the linear approximations are independent. We further examine this statistic for multidimensional linear approximation and discuss why removing the assumption about independence of linear approximations does not work in the related-key setting the same way as in the single-key setting.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"124 5 1","pages":"124-137"},"PeriodicalIF":3.5,"publicationDate":"2021-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70563881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment 高频无线电自动链路建立SoDark密码的密码分析
IF 3.5 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2021-09-17 DOI: 10.46586/tosc.v2021.i3.36-53
Marcus Dansarie
The SoDark cipher is used to protect transmitted frames in the second and third generation automatic link establishment (ALE) standards for high frequency (HF) radios. The cipher is primarily meant to prevent unauthorized linking and attacks on the availability of HF radio networks. This paper represents the first known security analysis of the cipher used by the second generation ALE protocol—the de facto world standard—and presents a related-tweak attack on the full eight round version of the algorithm. Under certain conditions, collisions of intermediate states several rounds into the cipher can be detected from the ciphertext with high probability. This enables testing against the intermediate states using only parts of the key. The best attack is a chosen-ciphertext attack which can recover the secret key in about an hour with 100% probability, using 29 chosen ciphertexts.
SoDark密码用于保护第二代和第三代高频(HF)无线电自动链路建立(ALE)标准中的传输帧。该密码主要是为了防止未经授权的链接和对高频无线电网络可用性的攻击。本文对第二代ALE协议(事实上的世界标准)使用的密码进行了首次已知的安全分析,并对该算法的完整八轮版本提出了相关的调整攻击。在一定条件下,可以高概率地从密文中检测到数轮中间状态的碰撞。这样就可以只使用部分键对中间状态进行测试。最好的攻击是选择密文攻击,使用29个选择的密文,可以在大约一个小时内以100%的概率恢复密钥。
{"title":"Cryptanalysis of the SoDark Cipher for HF Radio Automatic Link Establishment","authors":"Marcus Dansarie","doi":"10.46586/tosc.v2021.i3.36-53","DOIUrl":"https://doi.org/10.46586/tosc.v2021.i3.36-53","url":null,"abstract":"The SoDark cipher is used to protect transmitted frames in the second and third generation automatic link establishment (ALE) standards for high frequency (HF) radios. The cipher is primarily meant to prevent unauthorized linking and attacks on the availability of HF radio networks. This paper represents the first known security analysis of the cipher used by the second generation ALE protocol—the de facto world standard—and presents a related-tweak attack on the full eight round version of the algorithm. Under certain conditions, collisions of intermediate states several rounds into the cipher can be detected from the ciphertext with high probability. This enables testing against the intermediate states using only parts of the key. The best attack is a chosen-ciphertext attack which can recover the secret key in about an hour with 100% probability, using 29 chosen ciphertexts.","PeriodicalId":37077,"journal":{"name":"IACR Transactions on Symmetric Cryptology","volume":"12 1","pages":"36-53"},"PeriodicalIF":3.5,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86522089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
IACR Transactions on Symmetric Cryptology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1