175 research outputs found
Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA
In order to obtain differential patterns over many rounds of a cryptographic primitive, the cryptanalyst often needs to work on local differential trail analysis. Examples include merging two differential trail parts into one or, in the case of boomerang and rectangle attacks, connecting two short trails within the quartet boomerang setting. In the latter case, as shown by Murphy in 2011, caution should be exercised as there is increased chance of running into contradictions in the middle rounds of the primitive. In this paper, we propose the use of a SAT-based constraint solver URSA as aid in analysis of differential trails and find that previous rectangle/boomerang attacks on XTEA and SHACAL-1 block ciphers and SM3 hash function are based on incompatible trails. Given the C specification of the cryptographic primitive, verifying differential trail portions requires minimal work on the side of the cryptanalyst
Boomerang and Slide-Rotational Analysis of the SM3 Hash Function
SM3 is a hash function designed by Xiaoyun Wang et al., and
published by the Chinese Commercial Cryptography Administration Office
for the use of electronic authentication service system. The design of
SM3 builds upon the design of the SHA-2 hash function, but introduces
additional strengthening features. In this paper, using a higher order
differential cryptanalysis approach, we present a practical 4-sum
distinguisher against the compression function of SM3 reduced to 32
rounds. In addition, we point out a slide-rotational property of
SM3-XOR, which exists due to the fact that constants used in the rounds
are not independent
Cryptanalysis of Symmetric Cryptographic Primitives
Symmetric key cryptographic primitives are the essential building blocks in modern information security systems. The overall security of such systems is crucially dependent on these mathematical functions, which makes the analysis of symmetric key primitives a goal of critical importance. The security argument for the majority of such primitives in use is only a heuristic one and therefore their respective security evaluation continually remains an open question.
In this thesis, we provide cryptanalytic results for several relevant cryptographic hash functions and stream ciphers. First, we provide results concerning two hash functions: HAS-160 and SM3. In particular, we develop a new heuristic for finding compatible differential paths and apply it to the the Korean hash function standard HAS-160. Our heuristic leads to a practical second order collision attack over all of the HAS-160 function steps, which is the first practical-complexity distinguisher on this function. An example of a colliding quartet is provided. In case of SM3, which is a design that builds upon the SHA-2 hash and is published by the Chinese Commercial Cryptography Administration Office for the use in the electronic authentication service system, we study second order collision attacks over reduced-round versions and point out a structural slide-rotational property that exists in the function.
Next, we examine the security of the following three stream ciphers: Loiss, SNOW 3G and SNOW 2.0. Loiss stream cipher is designed by Dengguo Feng et al. aiming to be implemented in byte-oriented processors. By exploiting some differential properties of a particular component utilized in the cipher, we provide an attack of a practical complexity on Loiss in the related-key model. As confirmed by our experimental results, our attack recovers 92 bits of the 128-bit key in less than one hour on a PC with 3
GHz Intel Pentium 4 processor. SNOW 3G stream cipher is used in 3rd Generation Partnership Project (3GPP) and the SNOW 2.0 cipher is an ISO/IEC standard (IS 18033-4). For both of these two ciphers, we show that the initialization procedure admits a sliding property, resulting in several sets of related-key pairs. In addition to allowing related-key key recovery attacks against SNOW 2.0 with 256-bit keys, the presented properties reveal non-random behavior of the primitives, yield related-key distinguishers for the two ciphers and question the validity of the security proofs of protocols based on the assumption that these ciphers behave like perfect random functions of the key-IV.
Finally, we provide differential fault analysis attacks against two stream ciphers, namely, HC-128 and Rabbit. In this type of attacks, the attacker is assumed to have physical influence over the device that performs the encryption and is able to introduce random faults into the computational process. In case of HC-128, the fault model in which we analyze the cipher is the one in which the attacker is able to fault a random word of the inner state of the cipher but cannot control its exact location nor its new faulted value. Our attack requires about 7968 faults and recovers the complete internal state of HC-128 by solving a set of 32 systems of linear equations over Z2 in 1024 variables. In case of Rabbit stream cipher, the fault model in which the cipher is analyzed is the one in which a random bit of the internal state of the cipher is faulted,
however, without control over the location of the injected fault. Our attack requires around 128 − 256 faults,
precomputed table of size 2^41.6 bytes and recovers the complete internal state of Rabbit in about 2^38 steps
Approximate Modeling of Signed Difference and Digraph based Bit Condition Deduction: New Boomerang Attacks on BLAKE
The signed difference is a powerful tool for analyzing the Addition, XOR, Rotation (ARX) cryptographic primitives. Currently, solving the accurate model for the signed difference propagation is infeasible.
We propose an approximate MILP modeling method capturing the propagation rules of signed differences. Unlike the accurate signed difference model, the approximate model only focuses on active bits and ignores the possible bit conditions on inactive bits.
To overcome the negative effect of a lower accuracy arising from ignoring bit conditions on inactive bits, we propose an additional tool for deducing all bit conditions automatically.
Such a tool is based on a directed-graph capturing the whole computation process of ARX primitives by drawing links among intermediate words and operations.
The digraph is also applicable in the MILP model construction process:
it enables us to identify the parameters upper bounding the number of bit conditions so as to define the objective function; it is further used to connect the boomerang top and bottom signed differential paths by introducing proper constraints to avoid incompatible intersections.
Benefiting from the approximate model and the directed-graph based tool, the solving time of the new MILP model is significantly reduced,
enabling us to deduce signed differential paths efficiently and accurately.
To show the utility of our method, we propose boomerang attacks on the keyed permutations of three ARX hash functions of BLAKE.
For the first time we mount an attack on the full 7 rounds of BLAKE3, with the complexity as low as .
Our best attack on BLAKE2s can improve the previously best result by 0.5 rounds but with lower complexity.
The attacks on BLAKE-256 cover the same 8 rounds with the previous best result but with complexity times lower.
All our results are verified practically with round-reduced boomerang quartets
Квантовий криптоаналiз геш-функцiї «Купина»
Об’єктом дослiдження є iнформацiйнi процеси в системах
криптографiчного захисту iнформацiї.
Предметом дослiдження є складнiсть застосування алгоритму
Гровера до геш-функцiї «Купина» у квантовiй моделi обчислень.
Метою роботи є побудова атаки з використанням алгоритму
квантового пошуку (алгоритму Гровера) на криптографiчну геш-функцiю
«Купина» у квантовiй моделi обчислень.The object of research is information processes in systems of
cryptographic protection of information.
The subject of the research is the complexity of applying Grover’s
algorithm to the hash function «Kupyna» in the quantum model of
calculations
Branching Heuristics in Differential Collision Search with Applications to SHA-512
In this work, we present practical semi-free-start collisions for SHA-512 on up to 38 (out of 80) steps with complexity . The best previously published result was on 24 steps. The attack is based on extending local collisions as proposed by Mendel et al. in their Eurocrypt 2013 attack on SHA-256. However, for SHA-512, the search space is too large for direct application of these techniques. We achieve our result by improving the branching heuristic of the guess-and-determine approach to find differential characteristics and
conforming message pairs. Experiments show that for smaller problems like 27 steps of SHA-512, the heuristic can also speed up the
collision search by a factor of
Wireless sensor systems in indoor situation modeling II (WISM II)
fi=vertaisarvioimaton|en=nonPeerReviewed
Computer analysis of wing design for general aviation aircraft
The calculation of the two dimensional viscous incompressible flow about
single and multielement aerofoil sections is considered.
A panel method, based on vorticity and source distributions is used for
the calculation of the potential flow. Once the velocity distribution is
known, integral boundary layer methods are employed to predict the viscous
effects. A wake model has also been developed for the calculation of the wake
behind the aerofoil system.
The solution is iterative. At the end of each iteration the velocities
on the aerofoil are corrected for viscosity and wake effects; the wake position
is also relaxed, before the next iteration starts.
The mathematical model of the flow, together with the computer program
written to test the model are described here in detail. The numerical results
obtained using the computer program are found to be in good agreement with
both experimental data and exact solutions
- …