64 research outputs found

    Optimizations in Algebraic and Differential Cryptanalysis

    Get PDF
    In this thesis, we study how to enhance current cryptanalytic techniques, especially in Differential Cryptanalysis (DC) and to some degree in Algebraic Cryptanalysis (AC), by considering and solving some underlying optimization problems based on the general structure of the algorithm. In the first part, we study techniques for optimizing arbitrary algebraic computations in the general non-commutative setting with respect to several metrics [42, 44]. We apply our techniques to combinatorial circuit optimization and Matrix Multiplication (MM) problems [30, 44]. Obtaining exact bounds for such problems is very challenging. We have developed a 2- step technique, where firstly we algebraically encode the problem and then we solve the corresponding CNF-SAT problem using a SAT solver. We apply this methodology to optimize small circuits such as S-boxes with respect to a given metric and to discover new bilinear algorithms for multiplying sufficiently small matrices. We have obtained the best bit-slice implementation of PRESENT S-box currently known [6]. Furthermore, this technique allows us to compute the Multiplicative Complexity (MC) of whole ciphers [23], a very important measure of the non-linearity of a cipher [20, 44]. Another major theme in this thesis is the study of advanced differential attacks on block ciphers. We suggest a general framework, which enhances current differential cryptanalytic techniques and we apply it to evaluate the security of GOST block cipher [63, 102, 107]. We introduce a new type of differential sets based on the connections be- tween the S-boxes, named “general open sets” [50, 51], which can be seen as a refinement of Knudsen’s truncated differentials [84]. Using this notion, we construct 20-round statistical distinguishers and then based on this construction we develop attacks against full 32-rounds. Our attacks are in the form of Depth-First key search with many technical steps subject to optimization. We validate and analyze in detail each of these steps in an attempt to provide a solid formulation for our advanced differential attacks

    Hypothesis testing and advanced distinguishers in differential cryptanalysis of block ciphers

    Get PDF
    Distinguishing distributions is a major part during cryptanalysis of symmetric block ciphers. The goal of the cryptanalyst is to distinguish two distributions; one that characterizes the number of certain events which occur totally at random and another one that characterizes same type of events but due to propagation inside the cipher. This can be realized as a hypothesis testing problem, where a source is used to generate independent random samples in some given finite set with some distribution P, which is either R or W, corresponding to propagation inside the cipher or a random permutation respectively. Distinguisher’s goal is to determine which one is most likely the one which was used to generate the sample. In this paper, we study a general hypothesis-testing based approach to construct statistical distinguishers using truncated differential properties. The observable variable in our case is the expected number of pairs that follow a certain truncated differential property of the form ΔX → ΔY after a certain number of rounds. As a proof of concept, we apply this methodology to GOST and SIMON 64/128 block ciphers and present distinguishers on 20 and 22 rounds respectivel

    Solving Circuit Optimisation Problems in Cryptography and Cryptanalysis

    Get PDF
    One of the hardest problems in computer science is the problem of gate-eficient implementation. Such optimizations are particularly important in industrial hardware implementations of standard cryptographic algorithms. In this paper we focus on optimizing some small circuits such as S-boxes in cryptographic algorithms. We consider the notion of Multiplicative Complexity studied in 2008 by Boyar and Peralta and applied to find interesting optimizations for the S-box of the AES cipher. We applied this methodology to produce a compact implementation of several ciphers. In this short paper we report our results on PRESENT and GOST, two block ciphers known for their exceptionally low hardware cost. This kind of representation seems to be very promising in implementations aiming at preventing side channel attacks on cryptographic chips such as DPA. More importantly, we postulate that this kind of minimality is also an important and interesting tool in cryptanalysis

    Advanced Differential Cryptanalysis of Reduced-Round SIMON64/128 Using Large-Round Statistical Distinguishers

    Get PDF
    Lightweight cryptography is a rapidly evolving area of research and it has great impact especially on the new computing environment called the Internet of Things (IoT) or the Smart Object networks (Holler et al., 2014), where lots of constrained devices are connected on the Internet and exchange information on a daily basis. Every year there are many new submissions of cryptographic primitives which are optimized towards both software and hardware implementation so that they can operate in devices which have limited resources of hardware and are subject to both power and energy consumption constraints. In 2013, two families of ultra-lightweight block ciphers were proposed, SIMON and SPECK, which come in a variety of block and key sizes and were designed to be optimized in hardware and software implementation respectively (Beaulieu et al., 2013). In this paper, we study the security of the 64-bit SIMON with 128-bit key against advanced forms of differential cryptanalysis using truncated differentials (Knudsen, 1995; Courtois et al., 2014a). We follow similar method as the one proposed in SECRYPT 2013 (Courtois and Mourouzis, 2013) in order to heuristically discover sets of differences that propagate with sufficiently good probability and allow us to combine them efficiently in order to construct large-round statistical distinguishers. We present a 22-round distinguisher which we use it in a depth-first key search approach to develop an attack against 24 and 26 rounds with complexity 2^{124.5} and 2^{126} SIMON encryptions respectively. Our methodology provides a framework for extending distinguishers to attacks to a larger number of rounds assuming truncated differential properties of relatively high probability were discovered

    Benefits of maxillectomy with internal dissection of the masticator space by transmandibular approach in the surgical management of malignant tumours of the upper gingiva and hard palate: a clinical review of 10 cases

    Get PDF
    The aim of this study was to review patients with tumours extending to the posterior portion of the upper gingiva and hard palate, and to evaluate the postoperative outcomes. Ten consecutive patients with tumours in the upper gingiva and hard palate, who underwent maxillectomy with internal dissection of the masticator space by the transmandibular approach, were reviewed retrospectively. Among the 10 patients, the pathological diagnosis was squamous cell carcinoma in seven, adenoid cystic carcinoma in one, malignant melanoma in one, and osteosarcoma in one. Loco-regional control was achieved in eight of nine patients (88.9%). Three patients had residual moderate trismus. Cosmetic issues were not noted in any patient. En bloc resection of the maxilla with the internal portion of the masticator space and neck through the parapharyngeal space by the transmandibular approach is a useful and satisfactory technique for the excision of a tumour with involvement of the posterior portion of the upper gingiva and hard palate

    Mindfulness in Action: Discovering How U.S. Navy Seals Build Capacity for Mindfulness in High-Reliability Organizations (HROs)

    Get PDF
    This study of US Navy Sea Air and Land (SEAL) commandos contributes to research investigating mindfulness in High-Reliability Organizations (HROs) by identifying the individual and collective influences that allow SEALs to build capacity for mindful behaviors despite the complexity of their missions, the unpredictability of their operating environments, and the danger inherent in their work. Although the HRO literature identifies a number of hallmarks of reliability, less attention is paid to how mindfulness is operationally achieved in situ by individuals on the frontline working in HROs. This study addresses this gap using a multi-phase, multi-method investigation of US Navy SEALs, identifying new links between individual mindfulness attributes (comfort with uncertainty and chaos) and collective mindfulness influences (a positive orientation towards failure) that combine to co-create a phenomenon we call 'mindfulness in action'. Mindfulness in action occurs when HROs achieve an attentive yet flexible focus capable of incorporating multiple—sometimes competing—realities in order to assess alternative solutions and take action in dynamic situations. By providing a more nuanced conceptualization of the links between individual mindfulness attributes and collective mindfulness influences, this paper opens up new avenues of discovery for a wide range of reliability-seeking organizations.This study of US Navy Sea Air and Land (SEAL) commandos contributes to research investigating mindfulness in High-Reliability Organizations (HROs) by identifying the individual and collective influences that allow SEALs to build capacity for mindful behaviors despite the complexity of their missions, the unpredictability of their operating environments, and the danger inherent in their work. Although the HRO literature identifies a number of hallmarks of reliability, less attention is paid to how mindfulness is operationally achieved in situ by individuals on the frontline working in HROs. This study addresses this gap using a multi-phase, multi-method investigation of US Navy SEALs, identifying new links between individual mindfulness attributes (comfort with uncertainty and chaos) and collective mindfulness influences (a positive orientation towards failure) that combine to co-create a phenomenon we call 'mindfulness in action'. Mindfulness in action occurs when HROs achieve an attentive yet flexible focus capable of incorporating multiple—sometimes competing—realities in order to assess alternative solutions and take action in dynamic situations. By providing a more nuanced conceptualization of the links between individual mindfulness attributes and collective mindfulness influences, this paper opens up new avenues of discovery for a wide range of reliability-seeking organizations
    • …
    corecore