On the Key Schedule Strength of PRESENT
|
|
|
- Evelyn Owens
- 10 years ago
- Views:
Transcription
1 On the Key Schedule Strength of PRESENT Julio Cesar Hernandez-Castro 1, Pedro Peris-Lopez 2 Jean-Philippe Aumasson 3 1 School of Computing, Portsmouth University, UK 2 Information Security & Privacy Lab, TU-Delft, The Netherlands 3 NagravisionSA, Cheseaux, Switzerland Abstract. We present here the results of a playful research on how to measure the strength of a key schedule algorithm, with applications to PRESENT, including its two variants with 80 and 128 bit keys. We do not claim to have discovered any devastating weakness, but believe that some of the results presented, albeit controversial, could be of interest for other researchers investigating this cipher, notably for those working in impossible differentials and related key or slide attacks. Furthermore, in the case of PRESENT, key schedule features shown here may be exploited to attack some of the PRESENT-based hash functions. We carried out a probabilistic metaheuristic search for semi-equivalent keys, annihilators and entropy minima, and proposed a simple way of combining these results into a single value with a straightforward mathematical expression that could help in abstracting resistance to the set of presented analysis. Surprisingly, PRESENT 128 seems weaker than PRESENT 80 in the light of this new measure. Keywords: Key Schedule, Semi-Equivalent Keys, Annihilators, Entropy Minimization, Simulated Annealing, PRESENT 1 Introduction The PRESENT block cipher [7] is an ultra-lightweight substitution-permutation network aimed at extremely constrained environments such as RFID tags and sensor networks. Hardware efficiency was one of its most important design goals, and at 1570 GE it really is one of the very few realistic options in such constrained environments for providing an adequate security level. PRESENT works with two key lengths, 80 and 128 bits, and operates over 64-bit blocks with a very simple round scheme which is iterated 31 times. Each round is the composition of three operations: addroundkey, sboxlayer and player. The addround- Key operation is simply an XOR between the 64-bit roundkey and the State; sboxlayer is a 64-bit nonlinear transformation which uses 16 parallel instances of a 4-to-4-bit S-box; player is a bitwise permutation of the 64-bit internal state. Previous works. Due to its very good performance and neat design, partly inspired by SERPENT [8], PRESENT has attracted a lot of attention from
2 2 Hernandez-Castro, Peris-Lopez and Aumasson cryptanalysts: Wang presented a disputed [5] differential attack [9] against a reduced 16-round variant which requires 2 64 texts and 2 65 memory, Albrecht and Cid [11] presented another differential attack using algebraic techniques, with a very similar complexity against 16-rounds of the 80-bit variant, and operations against the 128-bit version with 19 rounds. A saturation attack was presented by Collard and Standaert [12], that is able to recover the key of a 24 round variant with 2 57 texts and 2 57 time. Another relevant attack was proposed by Ohkuma [13], where linear approximations and a class of weak keys were used against a 24-round variant requiring known texts. Contribution. The contribution of this paper is twofold: we present a number of new results on the key schedule of PRESENT, and then combine these into a single value that abstracts to some point key schedule strength and aims to be useful for other block ciphers, and specifically for comparing between them. As a side result, we conclude that PRESENT-80 seems to have a stronger key schedule than PRESENT-128. Organization. This paper is organized as follows. In Section 2, the key schedule of PRESENT is briefly introduced. The methodology and parameters used in our experimentation are explained in Section 3. In Section 4, we describe our results regarding semi-equivalent keys, annihilators and entropy minima. Later, we propose in Section 5 a measure to evaluate the strength of a given key schedule algorithm, and provide the corresponding values for PRESENT-80 and PRESENT-128. In Section 6, we extract some conclusions and describe what we consider will be interesting future research lines. 2 The Key Schedule of PRESENT We focus in the following on the PRESENT key schedule, first on that of its 80-bit variant, later on that of PRESENT-128. PRESENT-80 The key is stored in a register K and represented as k 79 k k 0. At round i the 64-bit round key K i = k 63 k k 0 consists of the 64 leftmost bits of the current contents of register K: K i = k 63 k k 0 = k 79 k k 16 After extracting K i, the key register K = k 79 k k 0 is updated as described below: Step 1 [k 79 k k 1 k 0 ] = [k 18 k k 20 k 19 ] Step 2 [k 79 k 78 k 77 k 76 ] = S[k 79 k 78 k 77 k 76 ] Step 3 [k 19 k 18 k 17 k 16 k 15 ] = [k 19 k 18 k 17 k 16 k 15 ] round counter
3 On the Key Schedule Strength of PRESENT 3 PRESENT-128 The key is stored in a register K and represented as k 127 k k 0. At round i the 64-bit round key K i = k 63 k k 0 consists of the 64 leftmost bits of the current contents of register K: K i = k 63 k k 0 = k 127 k k 64 After extracting K i, the key register K = k 127 k k 0 is updated (we have two calls to S in this case) as described below: Step 1 [k 127 k k 1 k 0 ] = [k 66 k k 68 k 67 ] Step 2 [k 127 k 126 k 125 k 124 ] = S[k 127 k 126 k 125 k 124 ] Step 3 [k 123 k 122 k 121 k 120 ] = S[k 123 k 122 k 121 k 120 ] Step 4 [k 66 k 65 k 64 k 63 k 62 ] = [k 66 k 65 k 64 k 63 k 62 ] round counter 3 Methodology We have used Simulated Annealing in our search for keys with useful properties, after having a limited success in getting similarly powerful results by analytical means. For example, we found that in the case of PRESENT-80, key bits k 76, k 77, k 78 do not enter the key schedule Sbox until round 20, and during the 20 first rounds they only appear in 15 of the round keys. Thus the Hamming weight of the differences between round keys is 15 during the first 20 rounds. However, the results we got using Simulated Annealing were way more relevant. The main advantage of Simulated Annealing is that it allows for a blackbox look-up that performs generally much better than a random search, while having very little added computational costs. In every case, we proposed fitness functions that abstracted what kind of property we were looking for, and tune parameters for trying to get the best possible results. We used our own implementation of a Simulated Annealing algorithm in Python, and followed a bisection method to tune parameters. We ran multiple experiments, each of them taking approximately three hours in our baseline computer. The best keys found were then double tested by a different member of our team, over a different PRESENT implementation. 3.1 Simulated Annealing Simulated Annealing [1] is a combinatorial optimization technique based on the physical annealing of molten metals. It has been quite successfully used in different cryptanalytic attacks, such as those against the Permuted Perceptron Problem (PPP) [4, 3], or, more recently, Trivium [2]. We briefly describe the technique, closely following the presentation at [4] in the following:
4 4 Hernandez-Castro, Peris-Lopez and Aumasson A General Simulated Annealing Algorithm INPUT: a temperature T, a cooling rate α (0, 1), N the number of moves at each temperature, M axf ailedcycles the number of consecutive unsuccessful cycles before aborting, and IC Max the maximum number of temperature cycles before aborting. ALGORITHM Step 1.: Let T 0 be the initial temperature. Increase it until the percentage of moves accepted within an inner loop of N trials exceeds some threshold. Step 2.: Set the iteration count IC to zero, finished = 0, ILaccepted = 0 (inner loops since last accepted move), and randomly generate a current solution V curr. Step 3.: While not(f inished) do Step 3.1.: Inner Loop: repeat N times Step : V new =generatemovefrom(v curr ) Step : Compute cost change cost = cost(v new ) cost(v curr ). Step : If cost < 0 accept the move, so V curr = V new. Step : Otherwise, generate a random uniform value in (0, 1) u. If e cost/t > u accept the move, otherwise, reject it. Step 3.2.: If no move has been accepted after 3.1, then ILaccepted = ILaccepted + 1, else ILaccepted = 0. Step 3.3.: T = α T, IC = IC + 1. Step 3.4.: finished = (ILaccepted > MaxF ailedcycles) or (IC > IC max ) OUTPUT: The state V best with the lowest cost obtained in the search. We can informally say that Simulated Annealing is a type of Hill Climbing [2], that generally outperforms and has very little added cost over a random search, specially when compared with other much heavier heuristics such as Genetic Algorithms, Particle Swarm Optimization, etc. We have obtained the results presented in next Section with a standard Simulated Annealing algorithm, generally using an initial temperature of or close to T 0 = 50, a cooling rate α = , and a maximum iteration IC max = Results In this section, the strength of the PRESENT key schedule is examined in a combined search for semi-equivalent keys, annihilators, and entropy minimization.
5 On the Key Schedule Strength of PRESENT 5 K 1 K 2 KeySchedule Distance 0x8ba018d26545f5d34dd1 0x8ba018d26545f5d32dd1 35 0x60cf1262a6af5d01a7fb 0x60cf1262a6af4501a7fb 35 0x83b4d3e2f49cbd4d5e2e 0xa3b4d3e2f49cbd4d5e2e 35 0x8eeb6a d098da 0x8ee26a d098da 35 0xd0ce94581e6eda685d77 0xd0c794581e6eda685d x9f2d24499c081289fe11 0x9f c081289fe x c70b x c70b4e xf718fc4e78a a 0xf718fc4f58a a 34 0x6c96cfd01ad1a5ca7900 0x6c96cfd07ad1a5ca xaaf6b7f4d95265eb3188 0xaaf6b7f4d95025eb x5a46487f282a052f1b0f 0x5a46487f882a052f1b0f 32 Table 1. Semi-equivalent keys for PRESENT The Search for Semi-Equivalent Keys There are not equivalent keys for PRESENT-80 or PRESENT-128, because in both cases the PRESENT Key Schedule is an invertible mapping involving all input bits. So we started considering the search for semi-equivalent keys, that is, different keys that produce a very similar (w.r.t. the Hamming weight metric) key expansion. The existence of semi-equivalent keys could potentially have more grievous consequences if, as it is the case of PRESENT [6], the block cipher is to be used as a hash function, because this could make finding collisions much easier. The gap between the best pair of semi-equivalent keys we found, and the optimum value of zero (corresponding to a pair of equivalent keys) was uncomfortably close. In particular, we found key pairs (k 1, k 2 ) with a Hamming distance of 2 that produced very similar key expansions where all 32 round keys were at a Hamming distance of 2 bits or less, including 17 cases of distance 1 and 6 of distance zero. The total accumulated round key distance after 32 rounds of these two keys (shown in Table 1) was only 35. We were able to obtain a lot more key pairs with these or even better characteristics, including multiple values of 34. The closest we got to a pair of equivalent keys was with key pairs and (0xaaf6b7f4d95265eb3188, 0xaaf6b7f4d95025eb3188) (0x5a46487f282a052f1b0f, 0x5a46487f882a052f1b0f) that produced very close round keys that differ only in 32 bits, that is, an average difference of a single bit for every round key. Is this a statistically significant result? Yes, if we randomly flip one bit in the user key, this generates on average (statistics computed over 10, 000 random keys with random flips) bits of accumulated changes in their corresponding round keys. This is relatively poor value, as in the case of a perfectly designed key expansion algorithm (i.e. a good hash function) the value should be on overage around = 1024 bits. That result clearly shows that the PRESENT key
6 6 Hernandez-Castro, Peris-Lopez and Aumasson schedule does not present a good degree of diffusion, and is far from having the avalanche effect. We have found and shown in Table 1 even better results, with distances of 32, 34 and 35. The significance of our results is even clearer if we study the effect of flipping two random bits on a random key, which on average produces (statistics computed again over 10, 000 random keys with random flips but without repetition) bit changes. For three bit differences in the key, the average change in the sub-round keys is , for four bits, and for five bits. Values so small as 32, 34 and 35 should be considered insufficient for many applications, and too close to the optimum value of zero. The results herein presented could be useful for other researchers of PRESENT- 80 and, although by themselves do not constitute a major weakness, leave a discomforting low gap between our best findings and the global minimum that would lead to a pair of equivalent keys. Even if these pairs do not exist, our findings might easily lead to pseudo-collisions in one of the PRESENT-based hash functions. Furthermore, sparse differences in the key schedule have been successfully used before to cancel differences in the internal state [10]. Even worse results can be found for PRESENT 128, when for example the two keys 0x2a1145cfce0db6e38eaff175d39c90dc and 0x2a1145cfcf0db6e38eaff175d39c90dc with a difference of 0x , generate round keys that only differ, as a whole, in 16 bits over 32 rounds. There are many other pairs with similar properties. The averages also reveal similar undesirable properties, with a random flip in a user key averaging only around bit changes in the round keys, in contrast with the almost 55 bits modified by PRESENT 80. Worse results are also achieved by two random bit flips to PRESENT 128, with average values of bits on the round keys, which is poor compared with the of PRESENT 80. These results show that the 80-bit version has a stronger key schedule than the 128 bit variant at least from the point of view of its diffusion characteristics. 4.2 Global Annihilators We looked for keys that produced a set of round keys with a very low hamming weight. Such keys may be useful for impossible differential attacks, or for reducing the overall security of the cipher, because of course the key addition phase is way less strong under those low-hamming keys. The most interesting key we found in this regard is 0x862010e680100a028a10, that generated an extremely low hamming weight of only 401 (for an average, for a random key, of around = 1024 bits). In Table 2.A we show the round keys corresponding to this annihilator key. Similarly, for PRESENT 128 we can obtain a value of with key 0x484a0 4d32c22f3ae f3 (See Table 2.B).
7 On the Key Schedule Strength of PRESENT 7 Round RoundKey Hamming weight 0 0x862010e680100a x14210c4021cd x x x a x d x x x a x x x x x x f x x x x50080a x60102a xb0020c x a x c0083b xa xd020f x31015a041e840a0c xe b4083dd x80283d0120c x820f700507a x ee00a0fa x904e02b2083dcfL x1283e01209c0564e 22 Round RoundKey Hamming weight 0 0x484a04d32c22f3ae x e x cb08bce x c8081a xc00084a04d32c22e x xc cb x c xc a04d32e x xc e x ca x a04e x xc x xd e x4c xc x xe x8600c xf8a x x88e x c x4f238a e x xee3c8e x c x18b8f238a x1c Table 2.A Table 2.B Table 2. Global Annihilators - PRESENT-80 (2.A) & PRESENT-128 (2.B) 4.3 Output Entropy Minimization When minimizing the output entropy of the key schedule, we obtained the following interesting results for PRESENT 80 (see Table 4.A), which produced an entropy of bits per byte for key 0x62e00e7e e80. As shown in Table 4.B, the best result we found for PRESENT 128 had a much lower entropy of bits per byte, for key 0x55048c b8a669e49628e086. It is curious that all of the experiments ran with PRESENT 80 did point towards essentially the same key, with a very high correlation between the obtained optima, but this was clearly not the case for PRESENT 128. This may have different explanations, but the simplest one is that we are much closer to the global optima in the case of PRESENT 80 than in the case of PRESENT 128, or/and that there exists a reduced number of global optima for the 80-bit version and multiple ones for the 128-bit version. In any case, all scenarios clearly favor the design of the smaller version in terms of security, at least from this test point of view. The fact that the lowest output entropy found for the key schedule of the 128-bit variant is significantly smaller than the one found for the 80-bit version, after exactly the same computational effort in the search, further strengthens this point.
8 8 Hernandez-Castro, Peris-Lopez and Aumasson Round RoundKeys 0 0x62e00e7e x1d000c5c01cfc02 2 0xc0003a0018b x3f x2e0007e xd00005c000fc xc0001a0000b xf xe0001e x1c0003c x x2 12 0x6 13 0x x x10000e x c xc x5000b x6000ca xb0000c ea 21 0x xbb2000ec0003b 23 0xa00c d3 24 0xd000f ec4 25 0x30075a001e80320c 26 0xe0bb0600eb4003dd 27 0xf0c83c1760c01d x800f7e190782ec x ecf320fe 30 0x7bb0480eb2003df7 31 0x1c83ef760901d64f Round RoundKeys 0 0x55048c x5d14cd3c92c51c10 2 0x e20a x f24b x c x5555d14cd3c92c50 6 0x e20a0 7 0x f24b0 8 0x c x d14cd3c x e0 11 0x f0 12 0x c0 13 0x d14cd0 14 0x x x x d x x x xce x x x xae60e xa xdfb xd x987ee60e x9b5a xf61fb Table 4.A Table 4.B Table 3. Entropy minimization - PRESENT 80 (A) & PRESENT 128 (B) 5 Measuring the Strength of a Key Schedule In the following, we propose to combine the presented results in a single measure that could give a general idea of the strength of a given key schedule algorithm, and ease analysis and comparison between different block cipher proposals. We emphasize here that this measure is completely independent of the structured used in the cipher (e.g. Feistel or SP-network) and only dependent on the key schedule function. Although we acknowledge that security is a quite complex concept that can not be fully abstracted in a single value, we however believe that this abstraction could be useful in a number of testing and designing scenarios. The simplest and most natural way of combining these results in a single value is simply by multiplying them, like in the following formula: S KeySchedule = 1 ln(s Annihilators S EquivalentKeys S OutputEntropy ) (1) The above expression particularized with the results obtained over the PRESENT variants, produces the following values:
9 On the Key Schedule Strength of PRESENT 9 1 S P RESENT80 = ln( = 0, ) 1 S P RESENT128 = ln( = 0, ) And we take S KeySchedule = 0 if any of the S j = 0. Although this way of combining different strength results into a single value could be improved, it at least provides a simple, quick and easy way of comparing between different algorithms or variants. This is exactly our case, where contrary to our first thoughts it seems clear that the keyschedule of PRESENT 80 is, at least from the point of view of test S, more secure than that of its cousin PRESENT 128. The overall result is consistent with the general impression extracted from the different tests, which is that the keyschedule of PRESENT 128 is less robust than that of PRESENT 80 despite the two calls to the S-box done in PRESENT 128. It seems these two lookups are not enough, and more should be allowed to offer a similarly strong key schedule. 6 Conclusions We present a first attempt to measure the strength of a key schedule algorithm in a single and straightforward fashion, allowing meaningful comparisons between different algorithms and different variants of the same algorithm. This could potentially be useful for designing purposes, when a quick way of comparing different decisions could be handy, and for claiming and testing security properties of new block cipher proposals. Improvements to our proposed measure are possible, and we will work on then in future works, but in its current state we have proved it is good enough to analyze in some depth the key schedules of both PRESENT 80 and PRESENT 128. Our results point out to a quite good overall design that only seems slightly worrisome regarding semi-equivalent keys, specially taking into account the proposal of PRESENT as a basis for various lightweight hash functions. We also found the slightly surprising and maybe controversial result that, in the light of these tests, the PRESENT 80 key schedule seems to be more robust than that of PRESENT 128. We think that this first attempt to measure cryptographic strength combining the results of multiple heuristic lookups opens an avenue for new kinds of more complex analysis that could help in better understanding some of the recent lightweight cryptographic primitives. On the other hand, it will be overambitious and highly arguable to claim that this single value can be an undisputed measure of key schedule strength. Firstly, overall strength is quite tricky to define. We only aim here to have contributed a first step in this direction. Furthermore, we also acknowledge that looking at the key schedule algorithm in complete isolation as we do here could, in some cases,
10 10 Hernandez-Castro, Peris-Lopez and Aumasson make little sense because a weaker key schedule does not always lead to a weaker cipher if this is properly accounted for in the design of the round function. Apart from investigating possible improvements to the key schedule strength measure just proposed, we plan to compare that of the two key schedule algorithms explored here against that of the AES, and other lightweight algorithms like KATAN and KTANTAN [14]. We will also research for more complex ways of measuring the difficulty of the problems associated with finding keys with security-relevant properties, particularly with measures based in problem landscape complexity as in [2]. References 1. S. Kirkpatrick, Gelatt, Vecchi. Optimization by Simulated Annealing. Science, 220 (4598): pp , Julia Borghoff, Lars R. Knudsen, Krystian Matusiewicz. Analysis of Trivium by a Simulated Annealing Variant. Proceedings of Ecrypt II Workshop on Tools for Cryptanalysis Lars R. Knudsen and Willi Meier. Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. In Advances in Cryptology, Eurocrypt 99, pp , LNCS 1592, John A. Clark and Jeremy L. Jacob. Fault Injection and a Timing Channel on an Analysis Technique. In L.R. Knudsen (Ed.) Eurocrypt 2002, LNCS 2332, pp , Manok Kuman, Pratibha Yadav and Meena Kumari. Flaws in Differential Cryptanalysis of Reduced Round PRESENT Bogdanov A, Leander G, Paar C, et al. Hash Functions and RFID Tags : Mind the Gap. 2008: pp Bogdanov A, Knudsen LR, Leander G, et al. PRESENT: An Ultra-Lightweight Block Cipher. Lecture Notes in Computer Science. 2007, v. 4727, pp Available at: 8. R. Anderson, E. Biham, and L. Knudsen, Serpent: A proposal for the Advanced Encryption Standard, First Advanced Encryption Standard (AES) Conference, M. Wang, Differential cryptanalysis of reduced-round PRESENT, AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, Lecture Notes in Computer Science, vol. 5023, 2008, pp Onur Ozen, Kerem Varici, Cihangir Tezcan and Celebi Kocair. Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. In Boyd, Gonzalez-Benito (Eds.) Proceedings of the 2009 Australasian (ACISP) Conference, pp , July 1-3, Lecture Notes in Computer Science LNCS v M. Albrecht and C. Cid, Algebraic techniques in differential cryptanalysis, Fast Software Encryption International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Lecture Notes in Computer Science, vol. 5665, 2009, pp B. Collard and F. Standaert, A statistical saturation attack against the block cipher PRESENT, CT-RSA, Lecture Notes in Computer Science, vol. 5473, 2009, pp
11 On the Key Schedule Strength of PRESENT Kenji Ohkuma, Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis, Selected Areas in Cryptography, Lecture Notes in Computer Science, Volume 5867, pp , Christophe De Canniere, Orr Dunkelman and Miroslav Knezevic. KATAN & KTANTAN A Family of Small and Efficient Hardware-Oriented Block Ciphers. Proceedings of CHES 2009, LNCS 5747, Springer, 2009
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Fault attack on the DVB Common Scrambling Algorithm
Fault attack on the DVB Common Scrambling Algorithm Kai Wirt Technical University Darmstadt Department of Computer Science Darmstadt, Germany [email protected] Abstract. The Common Scrambling
The Advanced Encryption Standard: Four Years On
The Advanced Encryption Standard: Four Years On Matt Robshaw Reader in Information Security Information Security Group Royal Holloway University of London September 21, 2004 The State of the AES 1 The
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT Onur Özen1, Kerem Varıcı 2, Cihangir Tezcan 3, and Çelebi Kocair 4 1 EPFL IC LACAL Station 14. CH-1015 Lausanne, Switzerland
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Cryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 3: Block ciphers and DES Ion Petre Department of IT, Åbo Akademi University January 17, 2012 1 Data Encryption Standard
Cryptography and Network Security Chapter 3
Cryptography and Network Security Chapter 3 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 3 Block Ciphers and the Data Encryption Standard All the afternoon
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Secret Key Cryptography (I) 1 Introductory Remarks Roadmap Feistel Cipher DES AES Introduction
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT Jorge Nakahara Jr 1, Pouyan Sepehrdad 1, Bingsheng Zhang 2, Meiqin Wang 3 1 EPFL, Lausanne, Switzerland 2 Cybernetica AS, Estonia and
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
A New 128-bit Key Stream Cipher LEX
A New 128-it Key Stream Cipher LEX Alex Biryukov Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenerg 10, B 3001 Heverlee, Belgium http://www.esat.kuleuven.ac.e/~airyuko/ Astract.
Hash Function JH and the NIST SHA3 Hash Competition
Hash Function JH and the NIST SHA3 Hash Competition Hongjun Wu Nanyang Technological University Presented at ACNS 2012 1 Introduction to Hash Function Hash Function Design Basics Hash function JH Design
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I. Sourav Mukhopadhyay
Lecture Note 8 ATTACKS ON CRYPTOSYSTEMS I Sourav Mukhopadhyay Cryptography and Network Security - MA61027 Attacks on Cryptosystems Up to this point, we have mainly seen how ciphers are implemented. We
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
On the Security of Digital Video Broadcast Encryption
On the Security of Digital Video Broadcast Encryption Markus Diett October 26, 2007 Diploma Thesis Ruhr-Universität Bochum Chair for Communication Security (COSY) Prof. Dr.-Ing. Christof Paar Dipl.-Inf.
Application of cube attack to block and stream ciphers
Application of cube attack to block and stream ciphers Janusz Szmidt joint work with Piotr Mroczkowski Military University of Technology Military Telecommunication Institute Poland 23 czerwca 2009 1. Papers
The Stream Cipher HC-128
The Stream Cipher HC-128 Hongjun Wu Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium [email protected] Statement 1. HC-128 supports 128-bit
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) Conception - Why A New Cipher? Conception - Why A New Cipher? DES had outlived its usefulness Vulnerabilities were becoming known 56-bit key was too small Too slow
The 128-bit Blockcipher CLEFIA Design Rationale
The 128-bit Blockcipher CLEFIA Design Rationale Revision 1.0 June 1, 2007 Sony Corporation NOTICE THIS DOCUMENT IS PROVIDED AS IS, WITH NO WARRANTIES WHATSOVER, INCLUDING ANY WARRANTY OF MERCHANTABIL-
Salsa20/8 and Salsa20/12
Salsa20/8 and Salsa20/12 Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago Chicago, IL 60607 7045 [email protected] Introduction.
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
Cryptography and Network Security Block Cipher
Cryptography and Network Security Block Cipher Xiang-Yang Li Modern Private Key Ciphers Stream ciphers The most famous: Vernam cipher Invented by Vernam, ( AT&T, in 1917) Process the message bit by bit
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
Permutation-based encryption, authentication and authenticated encryption
Permutation-based encryption, authentication and authenticated encryption Guido Bertoni 1, Joan Daemen 1, Michaël Peeters 2, and Gilles Van Assche 1 1 STMicroelectronics 2 NXP Semiconductors Abstract.
Lightweight Cryptography From an Engineers Perspective
Lightweight Cryptography From an Engineers Perspective ECC 2007 Acknowledgement Christof Paar A. Bogdanov, L. Knudsen, G. Leander, M. Robshaw, Y. Seurin, C. Vikkelsoe S. Kumar 2 Outline Motivation Hardware
TCG Algorithm Registry. Family 2.0" Level 00 Revision 01.15. April 17, 2014. Published. Contact: [email protected].
Family 2.0" Level 00 Revision 01.15 April 17, 2014 Published Contact: [email protected] TCG TCG Published Copyright TCG 2014 Disclaimers, Notices, and License Terms THIS SPECIFICATION IS
PRESENT: An Ultra-Lightweight Block Cipher
PRESENT: An Ultra-Lightweight Block Cipher A. Bogdanov 1, L.R. Knudsen 2, G. Leander 1, C. Paar 1, A. Poschmann 1, M.J.B. Robshaw 3, Y. Seurin 3, and C. Vikkelsoe 2 1 Horst-Görtz-Institute for IT-Security,
Bounds for Balanced and Generalized Feistel Constructions
Bounds for Balanced and Generalized Feistel Constructions Andrey Bogdanov Katholieke Universiteit Leuven, Belgium ECRYPT II SymLab Bounds 2010 Outline Feistel Constructions Efficiency Metrics Bounds for
HASH CODE BASED SECURITY IN CLOUD COMPUTING
ABSTRACT HASH CODE BASED SECURITY IN CLOUD COMPUTING Kaleem Ur Rehman M.Tech student (CSE), College of Engineering, TMU Moradabad (India) The Hash functions describe as a phenomenon of information security
CIS433/533 - Computer and Network Security Cryptography
CIS433/533 - Computer and Network Security Cryptography Professor Kevin Butler Winter 2011 Computer and Information Science A historical moment Mary Queen of Scots is being held by Queen Elizabeth and
The Advanced Encryption Standard (AES)
The Advanced Encryption Standard (AES) All of the cryptographic algorithms we have looked at so far have some problem. The earlier ciphers can be broken with ease on modern computation systems. The DES
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR
A PPENDIX H RITERIA FOR AES E VALUATION C RITERIA FOR William Stallings Copyright 20010 H.1 THE ORIGINS OF AES...2 H.2 AES EVALUATION...3 Supplement to Cryptography and Network Security, Fifth Edition
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs
Cryptanalysis of Grain using Time / Memory / Data Tradeoffs v1.0 / 2008-02-25 T.E. Bjørstad The Selmer Center, Department of Informatics, University of Bergen, Pb. 7800, N-5020 Bergen, Norway. Email :
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices
Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices Thomas Eisenbarth 1, Zheng Gong 2, Tim Güneysu 3, Stefan Heyse 3, Sebastiaan Indesteege 4,5, Stéphanie Kerckhof 6, François
Table of Contents. Bibliografische Informationen http://d-nb.info/996514864. digitalisiert durch
1 Introduction to Cryptography and Data Security 1 1.1 Overview of Cryptology (and This Book) 2 1.2 Symmetric Cryptography 4 1.2.1 Basics 4 1.2.2 Simple Symmetric Encryption: The Substitution Cipher...
Secret File Sharing Techniques using AES algorithm. C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002
Secret File Sharing Techniques using AES algorithm C. Navya Latha 200201066 Garima Agarwal 200305032 Anila Kumar GVN 200305002 1. Feature Overview The Advanced Encryption Standard (AES) feature adds support
Lecture 4 Data Encryption Standard (DES)
Lecture 4 Data Encryption Standard (DES) 1 Block Ciphers Map n-bit plaintext blocks to n-bit ciphertext blocks (n = block length). For n-bit plaintext and ciphertext blocks and a fixed key, the encryption
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
ChaCha, a variant of Salsa20
ChaCha, a variant of Salsa20 Daniel J. Bernstein Department of Mathematics, Statistics, and Computer Science (M/C 249) The University of Illinois at Chicago Chicago, IL 60607 7045 [email protected]
INTRODUCTION TO THE APPLICATIONS OF EVOLUTIONARY COMPUTATION IN COMPUTER SECURITY AND CRYPTOGRAPHY
INTRODUCTION TO THE APPLICATIONS OF EVOLUTIONARY COMPUTATION IN COMPUTER SECURITY AND CRYPTOGRAPHY PEDRO ISASI AND JULIO C. HERNANDEZ Computer Science Department, Carlos III University, 28911 Legans, Madrid,
International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational
{(i,j) 1 < i,j < n} pairs, X and X i, such that X and X i differ. exclusive-or sums. ( ) ( i ) V = f x f x
ON THE DESIGN OF S-BOXES A. F. Webster and S. E. Tavares Department of Electrical Engineering Queen's University Kingston, Ont. Canada The ideas of completeness and the avalanche effect were first introduced
A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION
A NEW DNA BASED APPROACH OF GENERATING KEY-DEPENDENT SHIFTROWS TRANSFORMATION Auday H. Al-Wattar 1, Ramlan Mahmod 2, Zuriati Ahmad Zukarnain3, and Nur Izura Udzir4, 1 Faculty of Computer Science and Information
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard
KALE: A High-Degree Algebraic-Resistant Variant of The Advanced Encryption Standard Dr. Gavekort c/o Vakiopaine Bar Kauppakatu 6, 41 Jyväskylä FINLAND [email protected] Abstract. We have discovered that the
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Authentication requirement Authentication function MAC Hash function Security of
UNIT 3 AUTHENTICATION Authentication requirement Authentication function MAC Hash function Security of hash function and MAC SHA HMAC CMAC Digital signature and authentication protocols DSS Slides Courtesy
CTNET Field Protocol Specification November 19, 1997 DRAFT
CTNET Field Protocol Specification November 19, 1997 DRAFT Introduction Version 1.0 of CTNET will support the AB3418 protocol for communication to field controllers. AB3418 is a point-topoint protocol
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 20 Public-Key Cryptography and Message Authentication First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Public-Key Cryptography
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement
Statistical weakness in Spritz against VMPC-R: in search for the RC4 replacement Bartosz Zoltak www.vmpcfunction.com [email protected] Abstract. We found a statistical weakness in the Spritz algorithm
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Unknown Plaintext Template Attacks
Unknown Plaintext Template Attacks Neil Hanley, Michael Tunstall 2, and William P. Marnane Department of Electrical and Electronic Engineering, University College Cork, Ireland. [email protected], [email protected]
Length extension attack on narrow-pipe SHA-3 candidates
Length extension attack on narrow-pipe SHA-3 candidates Danilo Gligoroski Department of Telematics, Norwegian University of Science and Technology, O.S.Bragstads plass 2B, N-7491 Trondheim, NORWAY [email protected]
WINTER SCHOOL ON COMPUTER SECURITY. Prof. Eli Biham
WINTR SCHOOL ON COMPUTR SCURITY Prof. li Biham Computer Science Department Technion, Haifa 3200003, Israel January 27, 2014 c li Biham c li Biham - January 27, 2014 1 Cryptanalysis of Modes of Operation
Message Authentication
Message Authentication message authentication is concerned with: protecting the integrity of a message validating identity of originator non-repudiation of origin (dispute resolution) will consider the
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers
Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 02 Overview on Modern Cryptography
Triathlon of Lightweight Block Ciphers for the Internet of Things
NIST Lightweight Cryptography Workshop 2015 Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov
6.857 Computer and Network Security Fall Term, 1997 Lecture 4 : 16 September 1997 Lecturer: Ron Rivest Scribe: Michelle Goldberg 1 Conditionally Secure Cryptography Conditionally (or computationally) secure
Survey on Enhancing Cloud Data Security using EAP with Rijndael Encryption Algorithm
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 5 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay
Modern Block Cipher Standards (AES) Debdeep Mukhopadhyay Assistant Professor Department of Computer Science and Engineering Indian Institute of Technology Kharagpur INDIA -721302 Objectives Introduction
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
Security Evaluation of the SPECTR-128. Block Cipher
pplied Mathematical Sciences, ol. 7,, no. 4, 6945-696 HIKI td, www.m-hikari.com http://dx.doi.org/.988/ams..584 Security Evaluation of the SPECT-8 Block Cipher Manh Tuan Pham, am T. u Posts and Telecommunications
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
On the Influence of the Algebraic Degree of the Algebraic Degree of
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 691 On the Influence of the Algebraic Degree of the Algebraic Degree of Christina Boura and Anne Canteaut on Abstract We present a
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL
Design and Verification of Area-Optimized AES Based on FPGA Using Verilog HDL 1 N. Radhika, 2 Obili Ramesh, 3 Priyadarshini, 3 Asst.Profosser, 1,2 M.Tech ( Digital Systems & Computer Electronics), 1,2,3,
Chapter 2 Cryptanalysis of Multilanguage Encryption Techniques
Chapter 2 Cryptanalysis of Multilanguage Encryption Techniques Prasanna Raghaw Mishra, Indivar Gupta and Navneet Gaba Abstract We present an analysis of an encryption scheme MUlti-Language Encryption Technique
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,
On the Difficulty of Software Key Escrow
On the Difficulty of Software Key Escrow Lars R. Knudsen and Torben P. Pedersen Katholieke Universiteit Leuven, Belgium, email: [email protected] Cryptomathic, Denmark, email: [email protected]
Efficient Software Implementation of AES on 32-bit Platforms
Efficient Software Implementation of AES on 32-bit Platforms Guido Bertoni, Luca Breveglieri Politecnico di Milano, Milano - Italy Pasqualina Lilli Lilli Fragneto AST-LAB of ST Microelectronics, Agrate
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Cryptography and Network Security Chapter 11
Cryptography and Network Security Chapter 11 Fifth Edition by William Stallings Lecture slides by Lawrie Brown (with edits by RHB) Chapter 11 Cryptographic Hash Functions Each of the messages, like each
A NEW HASH ALGORITHM: Khichidi-1
A NEW HASH ALGORITHM: Khichidi-1 Abstract This is a technical document describing a new hash algorithm called Khichidi-1 and has been written in response to a Hash competition (SHA-3) called by National
APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION
APPLICATION OF ADVANCED SEARCH- METHODS FOR AUTOMOTIVE DATA-BUS SYSTEM SIGNAL INTEGRITY OPTIMIZATION Harald Günther 1, Stephan Frei 1, Thomas Wenzel, Wolfgang Mickisch 1 Technische Universität Dortmund,
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator Souradyuti Paul and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10, B 3001 Leuven-Heverlee,
Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards
White Paper Key Hopping A Security Enhancement Scheme for IEEE 802.11 WEP Standards By Dr. Wen-Ping Ying, Director of Software Development, February 2002 Introduction Wireless LAN networking allows the
Differential Cryptanalysis of Hash Functions: How to find Collisions?
Differential Cryptanalysis of Hash Functions: How to find Collisions? Martin Schläffer Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria [email protected]
