7 research outputs found
Improved Higher-Order Differential Attacks on MISTY1
MISTY1 is a block cipher designed by Matsui in 1997. It is widely
deployed in Japan, and is recognized internationally as an European
NESSIE-recommended cipher and an ISO standard. Since its introduction,
MISTY1 was subjected to extensive cryptanalytic
efforts, yet no attack significantly faster than exhaustive key search is
known on its full version. The best currently
known attack is a higher-order differential attack presented by Tsunoo
et al. in 2012 which breaks a reduced variant of MISTY1 that contains
7 of the 8 rounds and 4 of the 5 layers in data and
time.
In this paper, we present improved higher-order differential attacks on
reduced-round MISTY1. Our attack on the variant considered by Tsunoo et al.
requires roughly the same amount of data and only time
(i.e., is times faster). Furthermore, we present the first attack
on a MISTY1 variant with 7 rounds and all 5 layers, requiring
data and time. To achieve our results, we use a new
higher-order differential characteristic for 4-round MISTY1, as well as
enhanced key recovery algorithms based on the {\it partial sums} technique
A 2^{70} Attack on the Full MISTY1
MISTY1 is a block cipher designed by Matsui in 1997. It is widely deployed in Japan, and is recognized internationally as a European
NESSIE-recommended cipher and an ISO standard. After almost 20 years of unsuccessful cryptanalytic attempts, a first attack on the full MISTY1 was presented at CRYPTO 2015 by Todo. The attack, using a new technique called {\it division property}, requires almost the full codebook and has time complexity of 2^{107.3} encryptions.
In this paper we present a new attack on the full MISTY1. It is based on a modified variant of Todo\u27s division property, along with a variety of refined key-recovery techniques. Our attack requires the full codebook, but allows to retrieve 49 bits of the secret key in time complexity of only 2^{64} encryptions, and the full key in time complexity of 2^{69.5} encryptions.
While our attack is clearly impractical due to its large data complexity, it shows that MISTY1 provides security of only 2^{70} --- significantly less than what was considered before
Efficient Slide Attacks
The slide attack, presented in 1999 by Biryukov and Wagner, has already become a classical tool in
cryptanalysis of block ciphers. While it was used to mount practical attacks on a few cryptosystems, its
practical applicability is limited, as typically, its time complexity is lower bounded by (where
is the block size).
There are only a few known scenarios in which the slide attack performs
better than the bound.
In this paper we concentrate on {\it efficient} slide attacks, whose time complexity is less than .
We present a number of new attacks that apply in scenarios in which previously known slide attacks are
either inapplicable, or require at least operations. In particular, we present the first known
slide attack on a Feistel construction with a {\it 3-round} self-similarity, and an attack with practical
time complexity of on a 128-bit key variant of the GOST block cipher with {\it unknown} S-boxes. The
best previously known attack on the same variant, with {\it known} S-boxes (by Courtois, 2014), has time
complexity of
Tight Bounds on Online Checkpointing Algorithms
The problem of online checkpointing is a classical problem with numerous applications which had been studied in various forms for almost 50 years. In the simplest version of this problem, a user has to maintain k memorized checkpoints during a long computation, where the only allowed operation is to move one of the checkpoints from its old time to the current time, and his goal is to keep the checkpoints as evenly spread out as possible at all times.
At ICALP\u2713 Bringmann et al. studied this problem as a special case of an online/offline optimization problem in which the deviation from uniformity is measured by the natural discrepancy metric of the worst case ratio between real and ideal segment lengths. They showed this discrepancy is smaller than 1.59-o(1) for all k, and smaller than ln4-o(1)~~1.39 for the sparse subset of k\u27s which are powers of 2. In addition, they obtained upper bounds on the achievable discrepancy for some small values of k.
In this paper we solve the main problems left open in the ICALP\u2713 paper by proving that ln4 is a tight upper and lower bound on the asymptotic discrepancy for all large k, and by providing tight upper and lower bounds (in the form of provably optimal checkpointing algorithms, some of which are in fact better than those of Bringmann et al.) for all the small values of k <= 10
Practical Attacks on Reduced-Round AES
In this paper we investigate the security of 5-round AES against two different attacks in an adaptive setting. We present a practical key-recovery attack on 5-round AES with a secret s-box that requires adaptively chosen ciphertexts, which is as far as we know a new record. In addition, we present a new and practical key-independent distinguisher for 5-round AES which requires adaptively chosen ciphertexts. While the data complexity of this distinguisher is in the same range as the current best 5-round distinguisher, it exploits new structural properties of 5-round AES
Improved Analysis of Zorro-Like Ciphers
Abstract. Zorro is a 128-bit lightweight block cipher supporting 128-bit keys, presented at CHES 2013 by Gérard et al. One of the main design goals of the cipher was to allow efficient masking, which is a common way to protect against side-channel attacks. This led to a very uncon-ventional design, which resembles AES, but uses only partial non-linear layers. Despite the security claims of the designers, the cipher was re-cently broken by differential and linear attacks due to Wang et al., re-covering its 128-bit key with complexity of about 2108. These attacks are based on high-probability iterative characteristics that are made possible due to a special property of the linear layer of Zorro, which is shown to be devastating in combination with its partial non-linear layer. In this paper, we analyze the security of Zorro-like ciphers with partial non-linear layers by devising differential and linear characteristic search algorithms and key recovery algorithms. These algorithms exploit in a generic way the small number of Sboxes in a Zorro-like round, and ar