Development of the approach to proving the security of block ciphers to impossible differential attack
DOI:
https://doi.org/10.15587/1729-4061.2017.108413Keywords:
block cipher, impossible differentials attack, impossible differential, Rijndael-like transformationsAbstract
Trends in the development of symmetric cryptography are constantly associated with the increasing of the sizes of keys and blocks. Block ciphers, which are used today in hashing algorithms, usually have a block size of 512 or 1024 bits. One of the main requirements for symmetric crypto algorithms is to provide resistance to known cryptanalytical attacks. Known methods of security estimation against impossible differential attack have too high complexity for such block sizes.
The proposed approach for proving the absence of impossible differentials is applicable to some types of block ciphers and allows proving theoretically the resistance to impossible differentials attack.
Rijndael-like SPN ciphers and Feistel ciphers are analyzed. For the group of Rijndael-like ciphers, the absence of byte impossible differentials for 4 or more rounds is proved. For the group of Feistel ciphers, the absence of byte impossible differentials for 6 or more rounds is proved. The first statement made it possible to prove the absence of byte impossible differentials for 4 or more rounds of the cipher Kalyna (DSTU 7624: 2014) with all block sizes, for 512-bit block ciphers that are used in the hash functions Whirlpool, Groestl and Kupyna (DSTU 7564: 2014). The second statement was used to prove the absence of byte impossible differentials for 6 or more rounds of Tornado and Labyrinth ciphers with a block size of 128 bits.
Computational experiments on the impossible differentials search for these reduced models confirmed the validity of the obtained theoretical conclusionsReferences
- Biham, E., Keller, N. (2000). Cryptanalysis of Reduced Variant of Rijndael. The Third Advanced Encryption Standard Candidate Conference. New York.
- Cheon, J. H., Kim, M., Kim, K., Jung-Yeun, L., Kang, S. (2002). Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. Lecture Notes in Computer Science, 39–49. doi: 10.1007/3-540-45861-1_4
- Lu, J., Dunkelman, O., Keller, N., Kim, J. (2008). New Impossible Differential Attacks on AES. Lecture Notes in Computer Science, 279–293. doi: 10.1007/978-3-540-89754-5_22
- Biham, E., Biryukov, A., Shamir, A. (1998). Cryptanalysis of Skipjack Reduced to 31 Rounds using Impossible Differentials. Technion, CS Dept, Tech Report CS0947.
- Biham, E., Biryukov, A., Shamir, A. (1999). Miss in the Middle Attacks on IDEA and Khufu. Lecture Notes in Computer Science, 124–138. doi: 10.1007/3-540-48519-8_10
- J Lu, J., Kim, J., Keller, N., Dunkelman, O. (2008). Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Lecture Notes in Computer Science, 370–386. doi: 10.1007/978-3-540-79263-5_24
- Wu, W.-L., Zhang, W.-T., Feng, D.-G. (2007). Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. Journal of Computer Science and Technology, 22 (3), 449–456. doi: 10.1007/s11390-007-9056-0
- Kim, J., Hong, S., Sung, J., Lee, S., Lim, J., Sung, S. (2003). Impossible Differential Cryptanalysis for Block Cipher Structures. Lecture Notes in Computer Science, 82–96. doi: 10.1007/978-3-540-24582-7_6
- Luo, Y., Wu, Z., Lai, X., Gong, G. (2009). A Unified Method for Finding Impossible Differentials of Block Cipher Structures. IACR Cryptology ePrint Archive.
- Li, R., Sun, B., Li, C. (2010). Impossible Differential Cryptanalysis of SPN Ciphers. IACR Cryptology ePrint Archive.
- Yap, H. (2009). Impossible Differential Characteristics of Extended Feistel Networks with Provable Security against Differential Cryptanalysis. Advances in Security Technology, 103–121. doi: 10.1007/978-3-642-10240-0_9
- Daemen, J., Rijmen, V. (1998). AES proposal: Rijndael. First Advanced Encryption Standard (AES) Conference. Ventura, CA.
- Gorbenko, I. D., Dolgov, V. I., Oliynykov, R. V., Ruzhentsev, V. I. et. al. (2007). The perspective block symmetrical cipher "Kalyna" – a main positions and specification. Applied radioelektroniks, 6 (2), 195–208.
- V Ruzhentsev, V. I. (2003). About method of the security estimation to truncated differential attack. Radioelectroniks and informatics, 4, 130–133.
- Gorbenko, I. D., Golovashich, S. A. (2003). The Algorithm of the block symmetrical enciphering "Tornado". The specification of the transformation. Radiotechnics, 134, 60–80.
- Golovashich, S. A. (2007). Specification of the algorithm of the block symmetrical enciphering "Labyrinth". Applied Radioelectroniks, 6 (2), 230–240.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Victor Ruzhentsev, Yurii Onishchenko
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.