26 research outputs found
Efficient Dissection of Bicomposite Problems with Cryptanalytic Applications
In this paper we show that a large class of diverse problems have a
bicomposite structure which makes it possible to solve them with a new
type of algorithm called {\it dissection}, which has much better
time/memory tradeoffs than previously known algorithms. A typical example is the
problem of finding the key of multiple encryption schemes with independent
-bit keys. All the previous error-free attacks required time and
memory satisfying , and even if ``false negatives\u27\u27 are allowed,
no attack could achieve . Our new technique yields the first
algorithm which never errs and finds all the possible keys with a smaller
product of , such as time and memory for breaking
the sequential execution of r=7 block ciphers. The improvement ratio we obtain
increases in an unbounded way as increases, and if we allow algorithms
which can sometimes miss solutions, we can get even better tradeoffs by
combining our dissection technique with parallel collision search.
To demonstrate the generality of the new dissection technique, we show how
to use it in a generic way in order to improve rebound attacks on hash
functions and to solve with better time complexities (for small memory complexities)
hard combinatorial search problems, such as the well known knapsack problem
Quantum attacks against iterated block ciphers
We study the amplification of security against quantum attacks provided by
iteration of block ciphers. In the classical case, the Meet-in-the-middle
attack is a generic attack against those constructions. This attack reduces the
time required to break double iterations to only twice the time it takes to
attack a single block cipher, given that the attacker has access to a large
amount of memory. More abstractly, it shows that security by composition does
not achieve exact multiplicative amplification. We present a quantized version
of this attack based on an optimal quantum algorithm for the Element
Distinctness problem. We then use the generalized adversary method to prove the
optimality of the attack. An interesting corollary is that the time-space
tradeoff for quantum attacks is very different from what classical attacks
allow. This first result seems to indicate that composition resists better to
quantum attacks than to classical ones because it prevents the quadratic
speedup achieved by quantizing an exhaustive search.
We investigate security amplification by composition further by examining the
case of four iterations. We quantize a recent technique called the dissection
attack using the framework of quantum walks. Surprisingly, this leads to better
gains over classical attacks than for double iterations, which seems to
indicate that when the number of iterations grows, the resistance against
quantum attacks decreases.Comment: 14 page
Optimal Merging in Quantum k-xor and k-sum Algorithms
International audienceThe k-xor or Generalized Birthday Problem aims at finding, given k lists of bit-strings, a k-tuple among them XORing to 0. If the lists are unbounded, the best classical (exponential) time complexity has withstood since Wagner's CRYPTO 2002 paper. If the lists are bounded (of the same size) and such that there is a single solution, the dissection algorithms of Dinur et al. (CRYPTO 2012) improve the memory usage over a simple meet-in-the-middle. In this paper, we study quantum algorithms for the k-xor problem. With unbounded lists and quantum access, we improve previous work by Grassi et al. (ASIACRYPT 2018) for almost all k. Next, we extend our study to lists of any size and with classical access only. We define a set of "merging trees" which represent the best known strategies for quantum and classical merging in k-xor algorithms, and prove that our method is optimal among these. Our complexities are confirmed by a Mixed Integer Linear Program that computes the best strategy for a given k-xor problem. All our algorithms apply also when considering modular additions instead of bitwise xors. This framework enables us to give new improved quantum k-xor algorithms for all k and list sizes. Applications include the subset-sum problem, LPN with limited memory and the multiple-encryption problem
Generic Round-Function-Recovery Attacks for Feistel Networks over Small Domains
Feistel Networks (FN) are now being used massively to encrypt credit card numbers through format-preserving encryption. In our work, we focus on FN with two branches, entirely unknown round functions, modular additions (or other group operations), and when the domain size of a branch (called ) is small. We investigate round-function-recovery attacks. The best known attack so far is an improvement of Meet-In-The-Middle (MITM) attack by Isobe and Shibutani from ASIACRYPT~2013 with optimal data complexity and time complexity , where is the round number in FN. We construct an algorithm with a surprisingly better complexity when is too low, based on partial exhaustive search. When the data complexity varies from the optimal to the one of a codebook attack , our time complexity can reach . It crosses the complexity of the improved MITM for . We also estimate the lowest secure number of rounds depending on and the security goal. We show that the format-preserving-encryption schemes FF1 and FF3 standardized by NIST and ANSI cannot offer 128-bit security (as they are supposed to) for and , respectively (the NIST standard only requires ), and we improve the results by Durak and Vaudenay from CRYPTO~2017
White-Box AES Implementation Revisited
White-box cryptography is an obfuscation technique for protecting secret keys in software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms.
This concept was presented by Chow et al. with white-box implementations of DES and AES in 2002.
The strategy used in the implementations has become a design principle for subsequent white-box implementations.
However, despite its practical importance, progress has not been substantial.
In fact, it is repeated that as a proposal for a white-box implementation is reported, an attack of lower complexity is soon announced.
This is mainly because most cryptanalytic methods target specific implementations, and there is no general attack tool for white-box cryptography.
In this paper, we present an analytic toolbox on white-box implementations in this design framework and show how to reveal the secret information obfuscated in the implementation using this.
For a substitution-linear transformation cipher on bits with S-boxes on bits, if -bit nonlinear encodings are used to obfuscate output values in the implementation, our attack tool can remove the nonlinear encodings with complexity .
We should increase to obtain higher security, but it yields exponential storage blowing up and so there are limits to increase the security using the nonlinear encoding.
If the inverse of the encoded round function on bits is given, the affine encoding can be recovered in time using our specialized affine equivalence algorithm, where is the smallest integer such that (or its similar matrix obtained by permuting rows and columns) is a block-diagonal matrix with matrix blocks.
According to our toolbox, a white-box implementation in the Chow et al.\u27s framework has complexity at most within reasonable storage, which is much less than .
To overcome this, we introduce an idea that obfuscates two AES-128 ciphers at once with input/output encoding on 256 bits.
To reduce storage, we use a sparse unsplit input encoding.
As a result, our white-box AES implementation has up to 110-bit security against our toolbox, close to that of the original cipher.
More generally, we may consider a white-box implementation on the concatenation of ciphertexts to increase security
화이트 박스 및 격자 암호 분석 도구
학위논문 (박사)-- 서울대학교 대학원 : 수리과학부, 2016. 2. 김명환.In crypto world, the existence of analytic toolbox which can be used as the measure of security is very important in order to design cryptographic systems.
In this thesis, we focus on white-box cryptography and lattice based cryptography, and present analytic tools for them.
White-box cryptography presented by Chow et al. is an obfuscation technique for protecting secret keys in software implementations even if an adversary has full access to the implementation of the encryption algorithm and full control over its execution platforms. Despite its practical importance, progress has not been substantial. In fact, it is repeated that as a proposal for a whitebox implementation is reported, an attack of lower complexity is soon announced. This is mainly because most cryptanalytic methods target specific implementations, and there is no general attack tool for white-box cryptography.
In this thesis, we present an analytic toolbox on white-box implementations of the Chow et al.s style using lookup tables. Our toolbox could be used to measure the security of white-box implementations.
Lattice based cryptography is very interesting field of cryptography nowadays.
Many hard problems on lattice can be reduced to some specific form of the shortest vector problem or closest vector problem, and hence related to problem of finding a short basis for given lattice.
Therefore, good lattice reduction algorithm can play a role of analytic tools for lattice based cryptography.
We proposed an algorithm for lattice basis reduction which uses block reduction. This provides some trade-off of reduction time and quality. This can gives a guideline for the parameter setting of lattice based cryptography.CHAPTER 1 Introduction 1
1.1 Contributions 5
1.2 Organization 8
CHAPTER 2 Preliminaries 9
2.1 SLT Cipher 10
2.2 White-box Implementations 11
2.2.1 Chow et al.'s implementation 12
2.2.2 BGE Attack 13
2.2.3 Michiels et al.'s Cryptanalysis for SLT cipher 14
2.3 Lattice Basis Reduction 15
2.3.1 Lattice 15
2.3.2 LLL Algorithm 16
CHAPTER 3 Analytic Tools for White-box Cryptography 20
3.1 General Model for CEJO framework 21
3.2 Attack Toolbox for White-Box Implementation 24
3.2.1 Recovering Nonlinear Encodings 24
3.2.2 Ane Equivalence Algorithm with Multiple S-boxes 30
3.3 Approaches for Resisting Our Attack Tools 38
3.3.1 Limitation of White-Box Implementation 38
3.3.2 Perspective of White-Box Implementation 40
3.4 A Proposal for a White-Box Implementation of the AES Cipher 42
CHAPTER 4 New Lattice Basis Reduction Algorithm 48
4.1 Nearest Plane Algorithm 51
4.2 Blockwise LLL Algorithm 56
CHAPTER 5 Conclusions 61
Abstract (in Korean) 69Docto
Tight security bounds for multiple encryption
Multiple encryption---the practice of composing a blockcipher several
times with itself under independent keys---has received considerable
attention of late from the standpoint of provable security. Despite
these efforts proving definitive security bounds (i.e., with matching
attacks) has remained elusive even for the special case of triple
encryption. In this paper we close the gap by improving both the best
known attacks and best known provable security, so that both bounds
match. Our results apply for arbitrary number of rounds and show that
the security of -round multiple encryption is precisely
where
and where is the even
integer closest to and greater than or equal to , for all
. Our technique is based on Patarin\u27s H-coefficient
method and reuses a combinatorial result of Chen and Steinberger
originally required in the context of key-alternating ciphers
Algorithmes quantiques pour la cryptanalyse et cryptographie symétrique post-quantique
Modern cryptography relies on the notion of computational security. The level of security given by a cryptosystem is expressed as an amount of computational resources required to break it. The goal of cryptanalysis is to find attacks, that is, algorithms with lower complexities than the conjectural bounds.With the advent of quantum computing devices, these levels of security have to be updated to take a whole new notion of algorithms into account. At the same time, cryptography is becoming widely used in small devices (smart cards, sensors), with new cost constraints.In this thesis, we study the security of secret-key cryptosystems against quantum adversaries.We first build new quantum algorithms for k-list (k-XOR or k-SUM) problems, by composing exhaustive search procedures. Next, we present dedicated cryptanalysis results, starting with a new quantum cryptanalysis tool, the offline Simon's algorithm. We describe new attacks against the lightweight algorithms Spook and Gimli and we perform the first quantum security analysis of the standard cipher AES.Finally, we specify Saturnin, a family of lightweight cryptosystems oriented towards post-quantum security. Thanks to a very similar structure, its security relies largely on the analysis of AES.La cryptographie moderne est fondée sur la notion de sécurité computationnelle. Les niveaux de sécurité attendus des cryptosystèmes sont exprimés en nombre d'opérations ; une attaque est un algorithme d'une complexité inférieure à la borne attendue. Mais ces niveaux de sécurité doivent aujourd'hui prendre en compte une nouvelle notion d'algorithme : le paradigme du calcul quantique. Dans le même temps,la délégation grandissante du chiffrement à des puces RFID, objets connectés ou matériels embarqués pose de nouvelles contraintes de coût.Dans cette thèse, nous étudions la sécurité des cryptosystèmes à clé secrète face à un adversaire quantique.Nous introduisons tout d'abord de nouveaux algorithmes quantiques pour les problèmes génériques de k-listes (k-XOR ou k-SUM), construits en composant des procédures de recherche exhaustive.Nous présentons ensuite des résultats de cryptanalyse dédiée, en commençant par un nouvel outil de cryptanalyse quantique, l'algorithme de Simon hors-ligne. Nous décrivons de nouvelles attaques contre les algorithmes Spook et Gimli et nous effectuons la première étude de sécurité quantique du chiffrement AES. Dans un troisième temps, nous spécifions Saturnin, une famille de cryptosystèmes à bas coût orientés vers la sécurité post-quantique. La structure de Saturnin est proche de celle de l'AES et sa sécurité en tire largement parti