Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation

Size: px
Start display at page:

Download "Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation"

Transcription

1 Noname manuscript No. (will be inserted by the editor) Bitwise Linear Mappings with Good Cryptographic Properties and Efficient Implementation S. M. Dehnavi A. Mahmoodi Rishakani M. R. Mirzaee Shamsabad Received: date / Accepted: date Abstract Linear mappings are crucial components of symmetric ciphers. A special type of linear mappings are (0,)-matrices which have been used in symmetric ciphers such as ARIA, E2 and Camellia as diffusion layers with efficient implementation. Bitwise linear maps are also used in symmetric ciphers such as SHA family of hash functions and HC family of stream ciphers. In this article, we investigate a special kind of linear mappings: based upon this study, we propose several linear mappings with only XOR and rotation operations. The corresponding matrices of these mappings can be used in either the former case as (0,)-matrices of maximal branch number or in the latter case as linear mappings with good cryptographic properties. The proposed mappings and their corresponding matrices can be efficiently implemented both in software and hardware. Keywords (0,)-matrix Bitwise linear map Branch number Diffusion layer Symmetric cipher Introduction Linear mappings are crucial components of symmetric ciphers. MDS matrices are used as diffusion layers in symmetric ciphers [9 3]. Another type of diffusion layers are (0,)-matrices. This type of matrices are used in symmetric ciphers such as ARIA [2], E2 [5] and Camellia [] as diffusion layers with low S. M. Dehnavi Department of Mathematical and Computer Sciences, Kharazmi University, Tehran, Iran std dehnavism@khu.ac.ir A. Mahmoodi Rishakani Department of Sciences, Shahid Rajaee Teacher Training University, Tehran, Iran M. R. Mirzaee Shamsabad Department of Mathematics and Computer Science, Shahid Bahonar University, Kerman, Iran

2 2 S. M. Dehnavi et al. implementation cost. Bitwise linear maps are also used in symmetric ciphers such as SHA family [6] of hash functions and HC family [7,8] of stream ciphers. In this article, we examine a special type of (bitwise) linear mappings: based upon this investigation, we propose several linear mappings. The corresponding matrices of these mappings can be used as (0,)-matrices of maximal branch number with low implementation cost. Also, these mappings can be applied as linear mappings with good cryptographic properties. The presented mappings or their corresponding matrices can be efficiently implemented both in software and hardware: in comparison to [3, 4, 4] our proposed mappings have lower implementation costs. In Section 2 we present preliminary notations and definitions. Section 3 is devoted to main theorem of the paper. Section 4 examines the implementation of the proposed mappings. In Section 5 we present a block cipher with large blocks, based on the proposed mappings. 2 Notations and Definitions Hamming weight of a natural number or binary vector x is denoted by w(x). The i-th bit of a natural number or a binary vector x is denoted by x i. The notation is used for AND operation, for left rotation operation and for XOR operation. The all-one vector is denoted by and the zero vector by 0. The finite field of order 2 t is denoted by F 2 t. There is a one-to-one correspondence between Z 2 n, the ring of integers modulo 2 n and F n Cartesian product of n copies of F 2 : φ : F n 2 Z 2 n, n x = (x n,..., x 0 ) φ(x) = x i 2 i. We use this correspondence throughout the paper. Every function f : F2 m F 2 is called a Boolean function and every function f : F2 m F2 n with n > is called a vectorial Boolean function or a Boolean map. Such a function can be represented as (f n,..., f 0 ): the Boolean function f i : F2 m F 0 i < n, is called the i-th component of f. We denote the set of all n n matrices over F 2 by M n (F 2 ). A function f : F2 n F2 n with the property i=0 f(x y) = f(x) f(y), x, y F n is called a (bitwise) linear map. Obviously, there is a matrix in M n (F 2 ) which we denote by M f such that Here, M T f is the transpose of M f. f(x) = xm T f, x F n 2.

3 Linear Mappings with Good Cryptographic Properties 3 Let f : F n 2 F n 2 be a linear map. The differential branch number of f is defined as b d f = min{w(x) + w(f(x))} = min {w(x) + w(xm f T )}. x 0 x 0 The linear branch number of f is defined as b l f = min x 0 {w(x) + w(xm f )}. If we have b d f = bl f, then we say that the branch number of f is bd f and denote it by b f. Let n be a natural number. We define L n = {f : F2 2n F2 2n : f(x) = (x i j ), 0 i <... < i t < 2 n, t = mod 2, t > }. Let f be in L n. It is not hard to see that the rows of M f are cyclic shifts of each other and any row of M f has t ones: in this case we write w f = t. Example Consider the linear mapping f L 2 with f : F 4 2 F 4 We have f(x) = x (x ) (x 3). f(x 3, x x, x 0 ) = (x 2 x 0 x 3, x x 3 x x 0 x 2 x, x 3 x x 0 ), or equivalently, f(x) = xmf T = (x 3, x x, x 0 ) Here, w f = 3. We denote the r times composition of a mapping f by itself by f (r). For example we have f (3) (x) = f f f(x). We denote by o f the order of a linear invertible mapping: o f is the least natural number such that f (o f ) is the identity function. The number of fixed points of a mapping f, i.e. the points with property f(x) = x, is denoted by p f. The complement of a binary vector x is denoted by x. Let R be a finite commutative ring with identity. We denote by R the set of all invertible elements of R, by R[x] the ring of polynomials over R R[x] <p(x)> and by the ring of polynomials modulo a polynomial p(x) R[x]. Let p(x) R[x]; we denote by w(p) the number of terms in standard representation of p(x).

4 4 S. M. Dehnavi et al. 3 Main Theorem In this section, we investigate some properties of L n from mathematical viewpoint and lay a theoretical foundation for applications presented in following sections. Theorem Let f L n with Then, f(x) = (x i j ), 0 i <... < i t < 2 n, t = mod 2, t >. a) The order of f is a power of two and f = f (2n ). b)f(x) = f(x) and for any r < 2 n we have f(x r) = f(x) r. c) w(x) = w(f(x)) mod 2. d) b d f = bl f. e) b f = 0 mod 2, and 4 b f t +. f) max x {w(x) + w(f(x))} = 2 n+ b f. g) The number of fixed points of f is a power of two and 2 p f 2 n. Proof a) We have and by induction, f (2) (x) = f (2n) (x) = (x (2i j mod 2 n )), (x (2 n i j mod 2 n )). Since x (2 n i j mod 2 n ) = x for every x F 2n 2 and t is odd, then which means that o f f (2n) (x) = x, x F 2n is a power of two, f is invertible and f (x) = f (2n ) (x), x F 2n 2. b) We note that for every natural number r and every odd natural number q we have (x r) = x r, r < 2 n,

5 Linear Mappings with Good Cryptographic Properties 5 q x i = i= q x i. This means that f(x) = f(x). c) Let e k be the binary representation of 2 k for every nonnegative integer k. We prove the fact by induction on the weight of the input. We have f(0) = 0 and f(e k ) = e k+ij, 0 k < 2 n. mod 2 n This means that w(f(e k )) = t, 0 k < 2 n, which is an odd number. Now suppose that the induction hypothesis is true for k = r, r < 2 n. We prove that for every x F2 2n with w(x) = r + we have i= w(x) = w(f(x)) mod 2. We know that there exist 0 j < 2 n and x F 2n 2 such that x = x e j. By the identity w(x y) = w(x) + w(y) 2w(x y), we get Now by induction hypothesis and () we have w(x y) = w(x) + w(y) mod 2. () w(f(x)) = w(f(x e j )) = w(f(x )) + w(f(e j )) mod 2 = w(x ) + w(e j ) mod 2 = w(x e j ) mod 2 d) We know that = w(x) mod 2. f(x 2 n,..., x 0 ) = (y 2 n,..., y 0 ), with y s = x s+2 n ij, 0 s < 2 n. mod 2 n For f L n, corresponding to Mf T, we have f (x 2n,..., x 0 ) = (z 2n,..., z 0 ), with z s = x s+ij, 0 s < 2 n. mod 2 n

6 6 S. M. Dehnavi et al. Define ϕ : F 2n 2 F 2n ϕ(x 2 n, x 2 n 2,..., x x, x 0 ) = (x, x..., x 2 n 2, x 2 n, x 0 ). We note that for every x F 2n 2 we have w(x) = w(ϕ(x)). Also because and Now w(f (x)) = w(f(ϕ(x))), (f (x)) 0 = (f(ϕ(x)) 0, x F 2n (f (x)) s = (f(ϕ(x)) 2n s, 0 < s < 2 n. b d f = min{w(x) + w(f(x))} x 0 = min{w(ϕ(x)) + w(f(ϕ(x)))} x 0 = min x 0 {w(x) + w(f (x))} = b d f = b l f. e) By Case c, b f is even. Besides, f is a permutation and for every x F 2n 2 with w(x) = we have w(f(x)) = t. So 4 b f t +. f) We have So, from Case b, b f = min{w(x) + w(f(x))}. x 0 2 n+ b f = max x 0 {2n w(x) + 2 n w(f(x))} = max{w(x) + w(f(x))} x 0 = max{w(x) + w(f(x))}. x g) We know that fixed points of every linear mapping construct a linear subspace of F2 2n and so p f would be a power of two. Now since f(0) = 0 and f() = and f cannot be the identity function, we get 2 p f 2 n. We know that in designing bitwise linear maps, the most desirable targets are F2 6, F2 32 and F2 64, because almost all of the modern processors are 6, 32 or 64-bits. Also, in the case of (0,)-matrices, these numbers are suitable. We have verified the following lemma by programming:

7 Linear Mappings with Good Cryptographic Properties 7 Lemma Let and f t (x) = g t (x) = Then we have i=0 i=0 f t : F 6 2 F 6 ( ( i(i + ) x 2 ( ( i(i + ) x 2 g t : F 32 2 F 32 )) mod 6, t = 2, 4, 6, )) mod 3 t = 2, 4, 6, 8, 0. b ft = t + 2, t = 2, 4, 6, and b gt = t + 2, t = 2, 4, 6, 8, 0. We know that f 6 and g 0 are mappings of maximal (known) branch number [5,6]. As a practical application, suppose that m is a natural number: the matrix M g0 is a (0,)-matrix that can be viewed as a matrix over F 2 m. So, the branch number of M g0 with respect to m-bit words [3] would be 2. In some applications in symmetric cryptography, like the case of block ciphers with SPN structure, we should know the inverse of mappings. In the following examples, we present linear mappings of maximal branch number with the property that the implementation cost for the mapping itself and its inverse are the same. Example 2 We have found the following mapping in L 4 by programming: with f : F 6 2 F 6 f(x) = x (x ) (x 2) (x 3) (x 4) (x ) (x 4), f (x) = x (x 2) (x 5) (x 2) (x 3) (x 4) (x 5). The mappings f anf f have the following properties p f = p f = 2, b f = b f = 8, w f = w f = 7. We know that b f is the maximal value [5,6] and p f is the minimum value.

8 8 S. M. Dehnavi et al. Example 3 We have found the following mapping in L 5 by programming: with f : F 32 2 F 32 f(x) = x (x 8) (x 9) (x 2) (x 22) (x 24) (x 25) (x 26) (x 28) (x 29) (x 30), f (x) = (x 2) (x 4) (x 5) (x 7) (x 8) (x 0) (x 5) (x 6) (x 7) (x 9) (x 26). The mappings f anf f have the following properties p f = p f = 2, b f = b f = 2, w f = w f =. We know that b f is the maximal (known) value [5,6] and p f is the minimum value. 4 Implementation In this section, we examine some algebraic properties of L n and based on this investigation, we present linear mappings with efficient implementation in software and hardware. There is a natural one-to-one correspondence between F 2 n and which maps a = (a 2n,..., a, a 0 ) F 2 n, to 2 n i=0 a i x i F 2 [x] < x 2n >. F 2 [x] <x 2n > Moreover, there is a similar correspondence between mappings in L n and invertible elements of 2 [x] F <x 2n > \ {xi : 0 i < 2 n } which maps f(x) = (x i j ), 0 i <... < i t < 2 n, t = mod 2, t >, to x i j. Now it is easy to verify that for every a F2 2n, f(a) corresponds to ( 2 ) n a i x i x i j mod (x 2n ). i=0

9 Linear Mappings with Good Cryptographic Properties 9 Example 4 Consider f L 3 as f : F 8 2 F 8 f(x) = x (x 2) (x 5). Let a = (, 0, 0, 0,,, 0, 0). We have f(a) = (0, 0,, 0,,,, ). If we correspond the mappings in L 3 with invertible polynomials in F 2[x] <x 8 > \{xi : 0 i < 8} and the vectors in F2 8 with polynomials in F2[x] <x 8 >, then f(a) corresponds to fa mod (x 8 ). In fact we have fa mod (x 8 ) = ( x 2 x 5 )(x 2 x 3 x 7 ) mod (x 8 ) = x x 2 x 3 x 5, which corresponds to (0, 0,, 0,,,, ). Note Let n be a natural number and R be the ring R = {p R : w(p) = mod 2}. F 2[x]. We have <x 2n > Example 5 Let f : F 6 2 F 6 f (x) = (x 3) (x 4) (x 9), and f 2 : F 6 2 F 6 It is straightforward to verify that f 2 (x) = x (x 7) (x 3). f f 2 (x) = x (x 3) (x 4) (x 6) (x 9) (x 0) (x ). Now, considering the corresponding polynomials in we have p = x 3 x 4 x 9, p 2 = x 7 x 3, F 2 [x] <x 6 >, p p 2 mod (x 6 ) = x x 3 x 4 x 6 x 9 x 0 x, which corresponds to f f 2.

10 0 S. M. Dehnavi et al. From the algebraic viewpoint, R = (L n,, ) is a finite commutative ring with identity. Here is the operator of composition of functions and L n = {f : F 2n 2 F 2n 2 : f(x) = (x i j ), 0 i <... < i t < 2 n, 0 t < 2 n }. We note that t in the above definition is a nonnegative integer and the case t = 0 means that the zero function is contained in L n. Let R 2 = F2[x] ( <x 2n >, G = (F2 n, ) and G 2 = F2 [x] ). <x 2n >, Obviously, G is an R -module with scalar product fa := f(a), a F2 n, f L n, and G 2 is an R 2 -module with natural scalar product. With regard to previous discussions, the proof of next theorem is easy. Theorem 2 As stated above, G is an R -module and G 2 is an R 2 -module. There is an isomorphism of modules between these two modules. Further, a) We have the one-to-one corrspondence with the property ψ( ψ : R 2 \ {x} L n, x i j ) = (x i j ), ψ(p p 2 ) = ψ(p ) ψ(p 2 ), p, p 2 R 2. b) Let a = (a 2n,..., a, a 0 ) be in F2 2n. There is also a one-to-one correspondence between {f(a) : a F2 2n } and {ψ(f)a mod (x 2n ) : a = 2 n i=0 a i x i }. Based upon the previous mathematical investigation, we were motivated to search multiplication of polynomials or composition of functions. We found some mappings of this type and of maximal branch number by programming. These mappings have lower implementation costs compared to what is presented in cryptographic literature [3, 4, 4], up to our knowledge. Example 6 Consider the linear mappings We have p f = 2 and b f = 2. f, f f 3, f : F 32 2 F 32 f (x) = x (x ) (x 2), f 2 (x) = x (x 2) (x 7), f 3 (x) = x (x 4) (x 0), f(x) = f f 2 f 3 (x).

11 Linear Mappings with Good Cryptographic Properties Note 2 Let m and s be natural numbers and M M m (F 2 ). A rough estimation for the number of XOR operations needed in implementing the action of M on s-bit words is the total number of one entries in M. Now, it is clear that for any (0,)-matrix M in M 32 (F 2 ) with maximal (known) branch number 2, the total number of one entries is lower bounded by 32 = 352 and the lower buond for XOR s needed for implementation of M is 32 0 = 320: the mapping in Example 3 has this property. Note that we have not done any other optimizations. The matrix that corresponds to the mapping of Example 6 can be implemented just with = 92 XOR s without optimization, which is the best, up to our knowledge. 5 Block Ciphers with Large Block Size In this section, we verify further algebraic properties of L n and propose a block ciher with large block size. The proof of the following lemma is easy. Lemma 2 Let n be a natural number and p are χ 0, χ F 2[x] <x 2n > such that p = χ 0 x 2n χ. F 2 [x]. We know that there <x 2n+ > We have In particular, w(p mod (x 2n )) = w(χ χ 0 ). w(p) w(p mod (x 2n )). Theorem 3 Suppose that n, t with t = mod 2, t > and 0 i <... < i t < 2 n are natural numbers and the mapping f L n with f : F 2n 2 F 2n f(x) = (x i j ), is given. Consider the mapping g L n+ with g : F 2n+ 2 F 2n+ g(x) = (x i j ). Then we have b g b f, and in the case that b f = t +, we have b g = b f.

12 2 S. M. Dehnavi et al. F Proof Suppose that a is a nonzero element in 2 [x]. Let the corresponding polynomial of f in 2[x] <x 2n+ > F <x 2n > be p. We know that there are χ 0, χ F2[x] <x 2n > such that a = χ 0 x 2n χ. We distinguish two cases: a) χ χ 0 : In this case g(a) is equivalent to We know that pa mod (x 2n+ ). w(pa mod (x 2n+ )) = w(p(χ 0 x 2n χ ) mod (x 2n+ )) w(p(χ 0 χ ) mod (x 2n )), by Lemma 2. Now by the above discussion, equation () and the fact that χ 0 χ 0, we have w(a) + w(g(a)) w(χ ) + w(χ 0 ) + w(p(χ 0 χ ) mod (x 2n )) b) χ = χ 0 = χ: Let w(χ χ 0 ) + w(p(χ 0 χ ) mod (x 2n )) b f. pχ mod (x 2n+ ) = γ 0 x 2n γ, and γ = γ 0 γ. It is not hard to see that On the other hand, Thus, pa mod (x 2n+ ) = γ x 2n γ. pχ mod (x 2n ) = γ. w(a) + w(g(a)) = 2w(χ) + w(pa mod (x 2n+ )) = 2w(χ) + 2w(pχ mod (x 2n )) 2b f b f. F Since the above discussion is true for every nonzero a in 2[x], so we <x 2n+ > have b g b f. Since for any a F2 2n+ with w(a) =, we have w(a) + w(g(a)) = t +, then for the case that b f = t +, we have b g = b f.

13 Linear Mappings with Good Cryptographic Properties 3 Example 7 (A Block Cipher with Large Block Size) Consider with f = f f 2 f 3 and f, f, f f 3 : F2 64 F2 64 f (x) = x (x ) (x 2), f 2 (x) = x (x 2) (x 7), f 3 (x) = x (x 4) (x 0). By Theorem 3 and Example 6, b f = 2. Consider M f as a (0,)-matrix over F 2 6; the branch number of M f with respect to 6-bit words would be 2. Now we can design a block cipher with Feistel scheme and with internal SPN structure. The internal structure consists of subkey XORing, a layer of 64 parallel Sboxes and diffusion layer M f. If we use the inverse map over F2 6 as the Sbox, then the probability of differential and linear characteristics of one round of the proposed cipher is bounded by = Since the block size is 2048 bits, so, 2 rounds of this type has practical security against differential and linear cryptanalysis. Because our purpose in this article is not designing a cipher, so we did not present a key schedule for the presented cipher, although it can be designed with the aid of its round. The proposed cipher suits modern 64-bit processors. References. K. Aoki, T. Ichikawa, M. Kanda, M. Matsui, S. Moriai, J. Nakajima and T. Tokita, Camellia: a 28-bit block cipher suitable for multiple platforms - design and analysis, in Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography (SAC 00), vol. 202 of Lecture Notes in Computer Science, pp , Daesung Kwon, Jaesung Kim, S. Park, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, and Jin Hong, New block cipher: ARIA, in Information Security and Cryptology-ICISC 2003, vol. 297 of Lecture Notes in Computer Science, pp , Springer, Berlin, Germany, B. Aslan and M. T. Sakall, Algebraic construction of cryptographically good binary linear transformations, Security and Communication Networks, vol. 7, no., pp , M. T. Sakall and B. Aslan, On the algebraic construction of cryptographically good binary linear transformations, Journal of Computational and Applied Mathematics, vol. 259, pp , 204.

14 4 S. M. Dehnavi et al. 5. M. Kanda, S. Moriai, K. Aoki, H. Ueda, Y. Takashima, K. Ohta, and T. Matsumoto, E2 - A New 28-bit Block Cipher, IEICE Transactions Fundamentals - Special Section on Cryptography and Information Security, vol. E83-A no., pp , Secure Hash Standard, FIPS PUB 80-4, available via 7. Wu, Hongjun, A New Stream Cipher HC-256. Fast Software Encryption - FSE 2004, LNCS 307: Wu, Hongjun (2004). The Stream Cipher HC-28 available via p3.pdf 9. J. Daemen, V. Rijmen, AES proposal: Rijndael. Selected as the Advanced Encryption Standard. Available from 0. B. Schneier, J. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, Twofish: A 28-bit Block Cipher; 5 June, 998. P. Ekdahl, T. Johansson, SNOW a new stream cipher, Proceedings of first NESSIE Workshop, Heverlee, Belgium, Chinese State Bureau of Cryptography Administration, Cryptographic algorithms SMS4 used in wireless LAN products, available at: 06.htm 3. A Mahmoodi Rishakani, S. M. Dehnavi, M. R. Mirzaee Shamsabad, Hamidreza Maimani, Einollah Pasha, New concepts in design of lightweight MDS diffusion layers, th International ISC Conference on Information Security and Cryptology (ISCISC), Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song, On Constructing of a Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher, Information Security and Cryptology - ICISC Markus Grassl, Bounds on the Minimum Distance of Linear Codes and Quantum Codes, 2009, Available at 6. Wolfgang Ch. Schmid and Rudolf Schurer, MinT, the online database for optimal parameters of (t, m, s)-nets, 2009, Available via

Statistical Properties of Multiplication mod 2 n

Statistical Properties of Multiplication mod 2 n Noname manuscript No. (will be inserted by the editor) Statistical Properties of Multiplication mod 2 n A. Mahmoodi Rishakani S. M. Dehnavi M. R. Mirzaee Shamsabad Hamidreza Maimani Einollah Pasha Received:

More information

CHARACTERIZATION OF MDS MAPPINGS. 1. Introduction

CHARACTERIZATION OF MDS MAPPINGS. 1. Introduction CHARACTERIZATION OF MDS MAPPINGS S. M. DEHNAVI, A. MAHMOODI RISHAKANI, M. R. MIRZAEE SHAMSABAD Abstract. MDS codes and matrices are closely related to combinatorial objects like orthogonal arrays and multipermutations.

More information

CRYPTOGRAPHIC PROPERTIES OF ADDITION MODULO 2 n

CRYPTOGRAPHIC PROPERTIES OF ADDITION MODULO 2 n CRYPTOGRAPHIC PROPERTIES OF ADDITION MODULO 2 n S. M. DEHNAVI, A. MAHMOODI RISHAKANI, M. R. MIRZAEE SHAMSABAD, HAMIDREZA MAIMANI, EINOLLAH PASHA Abstract. The operation of modular addition modulo a power

More information

Statistical Properties of the Square Map Modulo a Power of Two

Statistical Properties of the Square Map Modulo a Power of Two Statistical Properties of the Square Map Modulo a Power of Two S. M. Dehnavi, A. Mahmoodi Rishakani, M. R. Mirzaee Shamsabad 3, Einollah Pasha Kharazmi University, Faculty of Mathematical and Computer

More information

New Block Cipher: ARIA

New Block Cipher: ARIA This is the accepted version of LNCS 97 pp.43-445 (004, presented at ICISC 003. https://doi.org/0.007/978-3-540-469-6_3 New Block Cipher: ARIA Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung 3, Yaekwon

More information

On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds

On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds Taizo Shirai 1, and Bart Preneel 2 1 Sony Corporation, Tokyo, Japan taizo.shirai@jp.sony.com 2 ESAT/SCD-COSIC, Katholieke Universiteit

More information

Extended Criterion for Absence of Fixed Points

Extended Criterion for Absence of Fixed Points Extended Criterion for Absence of Fixed Points Oleksandr Kazymyrov, Valentyna Kazymyrova Abstract One of the criteria for substitutions used in block ciphers is the absence of fixed points. In this paper

More information

FFT-Based Key Recovery for the Integral Attack

FFT-Based Key Recovery for the Integral Attack FFT-Based Key Recovery for the Integral Attack Yosuke Todo NTT Secure Platform Laboratories Abstract. The integral attack is one of the most powerful attack against block ciphers. In this paper, we propose

More information

Complementing Feistel Ciphers

Complementing Feistel Ciphers Complementing Feistel Ciphers Alex Biryukov 1 and Ivica Nikolić 2 1 University of Luxembourg 2 Nanyang Technological University, Singapore alex.biryukov@uni.lu inikolic@ntu.edu.sg Abstract. In this paper,

More information

Perfect Diffusion Primitives for Block Ciphers

Perfect Diffusion Primitives for Block Ciphers Perfect Diffusion Primitives for Block Ciphers Building Efficient MDS Matrices Pascal Junod and Serge Vaudenay École Polytechnique Fédérale de Lausanne (Switzerland) {pascaljunod, sergevaudenay}@epflch

More information

arxiv: v1 [math.nt] 9 Nov 2017

arxiv: v1 [math.nt] 9 Nov 2017 Complete solving the quadratic equation mod 2 n S. M. Dehnavi 1, M. R. Mirzaee Shamsabad 2, and A. Mahmoodi Rishakani 3 arxiv:1711.03621v1 [math.nt] 9 Nov 2017 1 Department of Mathematical and Computer

More information

On Feistel Structures Using a Diffusion Switching Mechanism

On Feistel Structures Using a Diffusion Switching Mechanism On Feistel Structures Using a Diffusion Switching Mechanism Taizo Shirai and Kyoji Shibutani Sony Corporation, Tokyo, Japan {Taizo.Shirai, Kyoji.Shibutani}@jp.sony.com Abstract. We study a recently proposed

More information

Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism

Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism Using MILP in Analysis of Feistel Structures and Improving Type II GFS by Switching Mechanism Mahdi Sajadieh and Mohammad Vaziri 1 Department of Electrical Engineering, Khorasgan Branch, Islamic Azad University,

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

Hardware Design and Analysis of Block Cipher Components

Hardware Design and Analysis of Block Cipher Components Hardware Design and Analysis of Block Cipher Components Lu Xiao and Howard M. Heys Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland St.

More information

Improved S-Box Construction from Binomial Power Functions

Improved S-Box Construction from Binomial Power Functions Malaysian Journal of Mathematical Sciences 9(S) June: 21-35 (2015) Special Issue: The 4 th International Cryptology and Information Security Conference 2014 (Cryptology 2014) MALAYSIAN JOURNAL OF MATHEMATICAL

More information

Improved Impossible Differential Cryptanalysis of Rijndael and Crypton

Improved Impossible Differential Cryptanalysis of Rijndael and Crypton Improved Impossible Differential Cryptanalysis of Rijndael and Crypton Jung Hee Cheon 1, MunJu Kim 2, Kwangjo Kim 1, Jung-Yeun Lee 1, and SungWoo Kang 3 1 IRIS, Information and Communications University,

More information

Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256

Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256 Improved Meet-in-the-Middle Attacks on Reduced-Round Camellia-192/256 Leibo Li 1 and Keting Jia 2 1 Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, School of Mathematics,

More information

New Construction of Single Cycle T-function Families

New Construction of Single Cycle T-function Families New Construction of Single Cycle T-function Families Shiyi ZHANG 1, Yongjuan WANG, Guangpu GAO Luoyang Foreign Language University, Luoyang, Henan Province, China Abstract The single cycle T-function is

More information

Type 1.x Generalized Feistel Structures

Type 1.x Generalized Feistel Structures Noname manuscript No. (will be inserted by the editor) Type 1.x Generalized eistel Structures Shingo Yanagihara Tetsu Iwata Received: date / Accepted: date Abstract We formalize the Type 1.x Generalized

More information

Block Ciphers and Systems of Quadratic Equations

Block Ciphers and Systems of Quadratic Equations Block Ciphers and Systems of Quadratic Equations Alex Biryukov and Christophe De Cannière Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark Arenberg 10, B 3001 Leuven-Heverlee, Belgium

More information

AES side channel attacks protection using random isomorphisms

AES side channel attacks protection using random isomorphisms Rostovtsev A.G., Shemyakina O.V., St. Petersburg State Polytechnic University AES side channel attacks protection using random isomorphisms General method of side-channel attacks protection, based on random

More information

Practically Secure against Differential Cryptanalysis for Block Cipher SMS4

Practically Secure against Differential Cryptanalysis for Block Cipher SMS4 Practically Secure against Differential Cryptanalysis for Block Cipher SMS4 Zhang MeiLing 1, Liu YuanHua 1, Liu JingMei 2,3, Min XiangShen 1 1. School of communication and information engineering, Xi an

More information

A Five-Round Algebraic Property of the Advanced Encryption Standard

A Five-Round Algebraic Property of the Advanced Encryption Standard A Five-Round Algebraic Property of the Advanced Encryption Standard Jianyong Huang, Jennifer Seberry and Willy Susilo Centre for Computer and Information Security Research (CCI) School of Computer Science

More information

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure Cryptanalysis of a Generalized Unbalanced Feistel Network Structure Ruilin Li 1, Bing Sun 1, Chao Li 1,2, and Longjiang Qu 1,3 1 Department of Mathematics and System Science, Science College, National

More information

The Hash Function JH 1

The Hash Function JH 1 The Hash Function JH 1 16 January, 2011 Hongjun Wu 2,3 wuhongjun@gmail.com 1 The design of JH is tweaked in this report. The round number of JH is changed from 35.5 to 42. This new version may be referred

More information

Weaknesses in the HAS-V Compression Function

Weaknesses in the HAS-V Compression Function Weaknesses in the HAS-V Compression Function Florian Mendel and Vincent Rijmen Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, A-8010

More information

A Polynomial Description of the Rijndael Advanced Encryption Standard

A Polynomial Description of the Rijndael Advanced Encryption Standard A Polynomial Description of the Rijndael Advanced Encryption Standard arxiv:cs/0205002v1 [cs.cr] 2 May 2002 Joachim Rosenthal Department of Mathematics University of Notre Dame Notre Dame, Indiana 46556,

More information

Introduction to Modern Cryptography. (1) Finite Groups, Rings and Fields. (2) AES - Advanced Encryption Standard

Introduction to Modern Cryptography. (1) Finite Groups, Rings and Fields. (2) AES - Advanced Encryption Standard Introduction to Modern Cryptography Lecture 3 (1) Finite Groups, Rings and Fields (2) AES - Advanced Encryption Standard +,0, and -a are only notations! Review - Groups Def (group): A set G with a binary

More information

Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network

Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network Ruilin Li, Bing Sun, and Chao Li Department of Mathematics and System Science, Science College, National University of Defense

More information

Quadratic Equations from APN Power Functions

Quadratic Equations from APN Power Functions IEICE TRANS. FUNDAMENTALS, VOL.E89 A, NO.1 JANUARY 2006 1 PAPER Special Section on Cryptography and Information Security Quadratic Equations from APN Power Functions Jung Hee CHEON, Member and Dong Hoon

More information

Revisit and Cryptanalysis of a CAST Cipher

Revisit and Cryptanalysis of a CAST Cipher 2017 3rd International Conference on Electronic Information Technology and Intellectualization (ICEITI 2017) ISBN: 978-1-60595-512-4 Revisit and Cryptanalysis of a CAST Cipher Xiao Zhou, Jingwei Li, Xuejia

More information

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur

Cryptographically Robust Large Boolean Functions. Debdeep Mukhopadhyay CSE, IIT Kharagpur Cryptographically Robust Large Boolean Functions Debdeep Mukhopadhyay CSE, IIT Kharagpur Outline of the Talk Importance of Boolean functions in Cryptography Important Cryptographic properties Proposed

More information

Towards Provable Security of Substitution-Permutation Encryption Networks

Towards Provable Security of Substitution-Permutation Encryption Networks Towards Provable Security of Substitution-Permutation Encryption Networks Zhi-Guo Chen and Stafford E. Tavares Department of Electrical and Computer Engineering Queen s University at Kingston, Ontario,

More information

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi 1,2, Lei Hu 1,2, Siwei Sun 1,2, Ling Song 1,2, Kexin Qiao 1,2, Xiaoshuang Ma 1,2 1 State Key Laboratory of Information

More information

Structural Evaluation by Generalized Integral Property

Structural Evaluation by Generalized Integral Property Structural Evaluation by Generalized Integral Property Yosue Todo NTT Secure Platform Laboratories, Toyo, Japan todo.yosue@lab.ntt.co.jp Abstract. In this paper, we show structural cryptanalyses against

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

Linear Cryptanalysis of Reduced-Round PRESENT

Linear Cryptanalysis of Reduced-Round PRESENT Linear Cryptanalysis of Reduced-Round PRESENT Joo Yeon Cho 1 Helsinki University of Technology, Finland 2 Nokia A/S, Denmark joo.cho@tkk.fi Abstract. PRESENT is a hardware-oriented block cipher suitable

More information

Provable Security Against Differential and Linear Cryptanalysis

Provable Security Against Differential and Linear Cryptanalysis Provable Security Against Differential and Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University Introduction CRADIC Linear Hull SPN and Two Strategies Highly

More information

Analysis of cryptographic hash functions

Analysis of cryptographic hash functions Analysis of cryptographic hash functions Christina Boura SECRET Project-Team, INRIA Paris-Rocquencourt Gemalto, France Ph.D. Defense December 7, 2012 1 / 43 Symmetric key cryptography Alice and Bob share

More information

Impossible Differential Attacks on 13-Round CLEFIA-128

Impossible Differential Attacks on 13-Round CLEFIA-128 Mala H, Dakhilalian M, Shakiba M. Impossible differential attacks on 13-round CLEFIA-128. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 26(4): 744 750 July 2011. DOI 10.1007/s11390-011-1173-0 Impossible Differential

More information

Royal Holloway University of London

Royal Holloway University of London Projective Aspects of the AES Inversion Wen-Ai Jackson and Sean Murphy Technical Report RHUL MA 2006 4 25 November 2005 Royal Holloway University of London Department of Mathematics Royal Holloway, University

More information

Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC 98

Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC 98 Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC 98 Donghoon Chang 1, Jaechul Sung 2, Soohak Sung 3,SangjinLee 1,and Jongin Lim 1 1 Center for Information Security

More information

Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128

Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128 Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-8 Zheng Yuan,,, ian Li, Beijing Electronic Science & Technology Institute, Beijing 7, P.R. China zyuan@tsinghua.edu.cn, sharonlee95@6.com

More information

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256

Improved Impossible Differential Attack on Reduced Version of Camellia-192/256 Improved Impossible Differential ttack on educed Version of Camellia-92/256 Ya iu, Dawu Gu, Zhiqiang iu, Wei i 2,3 Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai

More information

An Algebraic Framework for Cipher Embeddings

An Algebraic Framework for Cipher Embeddings An Algebraic Framework for Cipher Embeddings C. Cid 1, S. Murphy 1, and M.J.B. Robshaw 2 1 Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K. 2 France Télécom

More information

Non-Separable Cryptographic Functions

Non-Separable Cryptographic Functions International Symposium on Information Theory and Its Applications Honolulu, Hawaii, USA, November 5 8, 2000 Non-Separable Cryptographic Functions Yuliang Zheng and Xian-Mo Zhang School of Network Computing

More information

MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers

MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers MILP-Aided Bit-Based Division Property for Primitives with Non-Bit-Permutation Linear Layers Ling Sun 1, Wei Wang 1, Meiqin Wang 1,2 1 Key Laboratory of Cryptologic Technology and Information Security,

More information

Differential Attack on Five Rounds of the SC2000 Block Cipher

Differential Attack on Five Rounds of the SC2000 Block Cipher Differential Attack on Five Rounds of the SC2 Block Cipher Jiqiang Lu Department of Mathematics and Computer Science, Eindhoven University of Technology, 56 MB Eindhoven, The Netherlands lvjiqiang@hotmail.com

More information

Linear Cryptanalysis

Linear Cryptanalysis Linear Cryptanalysis Linear cryptanalysis is a powerful method of cryptanalysis introduced by Matsui in 1993 [11]. It is a known plaintext attack in which the attacker studies the linear approximations

More information

Essential Algebraic Structure Within the AES

Essential Algebraic Structure Within the AES Essential Algebraic Structure Within the AES Sean Murphy and Matthew J.B. Robshaw Information Security Group, Royal Holloway, University of London, Egham, Surrey, TW20 0EX, U.K. s.murphy@rhul.ac.uk m.robshaw@rhul.ac.uk

More information

Related-Key Rectangle Attack on 42-Round SHACAL-2

Related-Key Rectangle Attack on 42-Round SHACAL-2 Related-Key Rectangle Attack on 42-Round SHACAL-2 Jiqiang Lu 1, Jongsung Kim 2,3, Nathan Keller 4, and Orr Dunkelman 5 1 Information Security Group, Royal Holloway, University of London Egham, Surrey TW20

More information

Security of the SMS4 Block Cipher Against Differential Cryptanalysis

Security of the SMS4 Block Cipher Against Differential Cryptanalysis Su BZ, Wu WL, Zhang WT. Security of the SMS4 block cipher against differential cryptanalysis. JOURNAL OF COM- PUTER SCIENCE AND TECHNOLOGY 26(1): 130 138 Jan. 2011. DOI 10.1007/s11390-011-1116-9 Security

More information

Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers

Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers Direct Construction of Lightweight Rotational-XOR MDS Diffusion Layers Zhiyuan Guo 1,2, Renzhang Liu 3, Wenling Wu 1,2, and Dongdai Lin 3 1 Institute of Software, Chinese Academy of Sciences, Beijing,

More information

Algebraic properties of SHA-3 and notable cryptanalysis results

Algebraic properties of SHA-3 and notable cryptanalysis results Algebraic properties of SHA-3 and notable cryptanalysis results Christina Boura University of Versailles, France ICMC 2015, January 9, 2014 1 / 51 Cryptographic Hash Functions H : {0,1} {0,1} n m H h =

More information

A New Class of Single Cycle T-Functions

A New Class of Single Cycle T-Functions A New Class of Single Cycle T-Functions Jin Hong, Dong Hoon Lee, Yongjin Yeom, and Daewan Han National Security Research Institute, 161 Gajeong-dong, Yuseong-gu Daejeon, 305-350, Korea {jinhong, dlee,

More information

Cryptanalysis of the Stream Cipher ABC v2

Cryptanalysis of the Stream Cipher ABC v2 Cryptanalysis of the Stream Cipher ABC v2 Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.preneel}@esat.kuleuven.be

More information

Improved Linear Distinguishers for SNOW 2.0

Improved Linear Distinguishers for SNOW 2.0 Improved Linear Distinguishers for SNOW 2.0 Kaisa Nyberg 1,2 and Johan Wallén 1 1 Helsinki University of Technology and 2 Nokia Research Center, Finland Email: kaisa.nyberg@nokia.com; johan.wallen@tkk.fi

More information

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack?

Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? Alexander Rostovtsev alexander. rostovtsev@ibks.ftk.spbstu.ru St. Petersburg State Polytechnic University Virtual isomorphisms of ciphers: is AES secure against differential / linear attack? In [eprint.iacr.org/2009/117]

More information

Open problems related to algebraic attacks on stream ciphers

Open problems related to algebraic attacks on stream ciphers Open problems related to algebraic attacks on stream ciphers Anne Canteaut INRIA - projet CODES B.P. 105 78153 Le Chesnay cedex - France e-mail: Anne.Canteaut@inria.fr Abstract The recently developed algebraic

More information

Differential and Rectangle Attacks on Reduced-Round SHACAL-1

Differential and Rectangle Attacks on Reduced-Round SHACAL-1 Differential and Rectangle Attacks on Reduced-Round SHACAL-1 Jiqiang Lu 1, Jongsung Kim 2,3, Nathan Keller 4, and Orr Dunkelman 5 1 Information Security Group, Royal Holloway, University of London Egham,

More information

Statistical and Linear Independence of Binary Random Variables

Statistical and Linear Independence of Binary Random Variables Statistical and Linear Independence of Binary Random Variables Kaisa Nyberg Department of Computer Science, Aalto University School of Science, Finland kaisa.nyberg@aalto.fi October 10, 2017 Abstract.

More information

Analysis of SHA-1 in Encryption Mode

Analysis of SHA-1 in Encryption Mode Analysis of SHA- in Encryption Mode [Published in D. Naccache, Ed., Topics in Cryptology CT-RSA 00, vol. 00 of Lecture Notes in Computer Science, pp. 70 83, Springer-Verlag, 00.] Helena Handschuh, Lars

More information

Outline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael

Outline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael Outline CPSC 418/MATH 318 Introduction to Cryptography Advanced Encryption Standard Renate Scheidler Department of Mathematics & Statistics Department of Computer Science University of Calgary Based in

More information

Public-key Cryptography: Theory and Practice

Public-key Cryptography: Theory and Practice Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Appendix A: Symmetric Techniques Block Ciphers A block cipher f of block-size

More information

Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent

Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent B. Collard, F.-X. Standaert, J.-J. Quisquater UCL Crypto Group Microelectronics Laboratory Catholic University of Louvain - UCL

More information

A New Algorithm to Construct. Secure Keys for AES

A New Algorithm to Construct. Secure Keys for AES Int. J. Contemp. Math. Sciences, Vol. 5, 2010, no. 26, 1263-1270 A New Algorithm to Construct Secure Keys for AES Iqtadar Hussain Department of Mathematics Quaid-i-Azam University, Islamabad, Pakistan

More information

A Byte-Based Guess and Determine Attack on SOSEMANUK

A Byte-Based Guess and Determine Attack on SOSEMANUK A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy

More information

The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function

The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function The ANF of the Composition of Addition and Multiplication mod 2 n with a Boolean Function An Braeken 1 and Igor Semaev 2 1 Department Electrical Engineering, ESAT/COSIC, Katholieke Universiteit Leuven,

More information

Higher-order differential properties of Keccak and Luffa

Higher-order differential properties of Keccak and Luffa Higher-order differential properties of Keccak and Luffa Christina Boura 1,2, Anne Canteaut 1 and Christophe De Cannière 3 1 SECRET Project-Team - INRIA Paris-Rocquencourt - B.P. 105-78153 Le Chesnay Cedex

More information

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation

Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Improved Zero-sum Distinguisher for Full Round Keccak-f Permutation Ming Duan 12 and Xuejia Lai 1 1 Department of Computer Science and Engineering, Shanghai Jiao Tong University, China. 2 Basic Courses

More information

Higher-order differential properties of Keccak and Luffa

Higher-order differential properties of Keccak and Luffa Higher-order differential properties of Keccak and Luffa Christina Boura 1,2, Anne Canteaut 1, and Christophe De Cannière 3 1 SECRET Project-Team - INRIA Paris-Rocquencourt - B.P. 105 78153 Le Chesnay

More information

A New Class of Invertible Mappings

A New Class of Invertible Mappings A New Class of Invertible Mappings Alexander Klimov and Adi Shamir Computer Science department, The Weizmann Institute of Science Rehovot 76100, Israel {ask,shamir}@wisdom.weizmann.ac.il Abstract. Invertible

More information

Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia

Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia Taizo Shirai, Shoji Kanamaru, and George Abe Sony Corporation 7-35 Kitashinagawa 6-chome, Shinagawa-ku, Tokyo, 141-0001

More information

The Improved 96th-Order Differential Attack on 11 Rounds of the Block Cipher CLEFIA

The Improved 96th-Order Differential Attack on 11 Rounds of the Block Cipher CLEFIA he Improved 96th-Order Differential Attack on 11 Rounds of the Block Cipher CLEFIA Yasutaka Igarashi, Seiji Fukushima, and omohiro Hachino Kagoshima University, Kagoshima, Japan Email: {igarashi, fukushima,

More information

Ways of Doubling Block Size of Feistel Ciphers Used in Some Candidates for the AES

Ways of Doubling Block Size of Feistel Ciphers Used in Some Candidates for the AES Ways of Doubling Block Size of Feistel Ciphers Used in Some Candidates for the AS Bohuslav Rudolf b.rudolf@nbu.cz National Security Authority P. O. Box 49, 15 6, Prague 56 Abstract We describe and discuss

More information

On the invertibility of the XOR of rotations of a binary word

On the invertibility of the XOR of rotations of a binary word On the invertibility of the XOR of rotations of a binary word Ronald L. Rivest November 10, 2009 Abstract We prove the following result regarding operations on a binary word whose length is a power of

More information

Trivium A Stream Cipher Construction Inspired by Block Cipher Design Principles

Trivium A Stream Cipher Construction Inspired by Block Cipher Design Principles Trivium A Stream Cipher Construction Inspired by Block Cipher Design Principles Christophe De Cannière 1 and Bart Preneel 2 1 IAIK Krypto Group, Graz University of Technology Inffeldgasse 16A, A 8010 Graz,

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

Finding good differential patterns for attacks on SHA-1

Finding good differential patterns for attacks on SHA-1 Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University,

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher

Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher Xiaoshuang Ma 1,2 Kexin Qiao 1,2 1 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy

More information

Division Property: a New Attack Against Block Ciphers

Division Property: a New Attack Against Block Ciphers Division Property: a New Attack Against Block Ciphers Christina Boura (joint on-going work with Anne Canteaut) Séminaire du groupe Algèbre et Géometrie, LMV November 24, 2015 1 / 50 Symmetric-key encryption

More information

jorge 2 LSI-TEC, PKI Certification department

jorge 2 LSI-TEC, PKI Certification department Linear Analysis of reduced-round CAST-28 and CAST-256 Jorge Nakahara Jr, Mads Rasmussen 2 UNISANTOS, Brazil jorge nakahara@yahoo.com.br 2 LSI-TEC, PKI Certification department mads@lsitec.org.br Abstract.

More information

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types

More information

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis

3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis 3-6 On Multi Rounds Elimination Method for Higher Order Differential Cryptanalysis TANAKA Hidema, TONOMURA Yuji, and KANEKO Toshinobu A multi rounds elimination method for higher order differential cryptanalysis

More information

Chapter 2 - Differential cryptanalysis.

Chapter 2 - Differential cryptanalysis. Chapter 2 - Differential cryptanalysis. James McLaughlin 1 Introduction. Differential cryptanalysis, published in 1990 by Biham and Shamir [5, 6], was the first notable cryptanalysis technique to be discovered

More information

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function

Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function Practical Complexity Cube Attacks on Round-Reduced Keccak Sponge Function Itai Dinur 1, Pawe l Morawiecki 2,3, Josef Pieprzyk 4 Marian Srebrny 2,3, and Micha l Straus 3 1 Computer Science Department, École

More information

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by

More information

Linear Cryptanalysis. Kaisa Nyberg. Department of Computer Science Aalto University School of Science. S3, Sackville, August 11, 2015

Linear Cryptanalysis. Kaisa Nyberg. Department of Computer Science Aalto University School of Science. S3, Sackville, August 11, 2015 Kaisa Nyberg Department of Computer Science Aalto University School of Science s 2 r t S3, Sackville, August 11, 2015 Outline Linear characteristics and correlations Matsui s algorithms Traditional statistical

More information

MASKED INVERSION IN GF(2 N ) USING MIXED FIELD REPRESENTATIONS AND ITS EFFICIENT IMPLEMENTATION FOR AES

MASKED INVERSION IN GF(2 N ) USING MIXED FIELD REPRESENTATIONS AND ITS EFFICIENT IMPLEMENTATION FOR AES Chapter X MASKED INVERSION IN GF( N ) USING MIXED FIELD REPRESENTATIONS AND ITS EFFICIENT IMPLEMENTATION FOR AES SHAY GUERON 1,, ORI PARZANCHEVSKY 1 and OR ZUK 1,3 1 Discretix Technologies, Netanya, ISRAEL

More information

A Unified Method for Finding Impossible Differentials of Block Cipher Structures

A Unified Method for Finding Impossible Differentials of Block Cipher Structures A Unified Method for inding Impossible Differentials of Block Cipher Structures Yiyuan Luo 1,2, Zhongming Wu 1, Xuejia Lai 1 and Guang Gong 2 1 Department of Computer Science and Engineering, Shanghai

More information

A Byte-Based Guess and Determine Attack on SOSEMANUK

A Byte-Based Guess and Determine Attack on SOSEMANUK A Byte-Based Guess and Determine Attack on SOSEMANUK Xiutao Feng, Jun Liu, Zhaocun Zhou, Chuankun Wu, and Dengguo Feng State Key Laboratory of Information Security, Institute of Software, Chinese Academy

More information

DES S-box Generator. 2 EPFL, Switzerland

DES S-box Generator.  2 EPFL, Switzerland DES S-box Generator Lauren De Meyer 1 and Serge Vaudenay 2 lauren.demeyer@student.kuleuven.be serge.vaudenay@epfl.ch 1 KU Leuven, Belgium 2 EPFL, Switzerland Abstract. The Data Encryption Standard (DES)

More information

A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms

A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms Alex Biryukov, Christophe De Cannière, An Braeken, and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC, Kasteelpark

More information

MATH3302 Cryptography Problem Set 2

MATH3302 Cryptography Problem Set 2 MATH3302 Cryptography Problem Set 2 These questions are based on the material in Section 4: Shannon s Theory, Section 5: Modern Cryptography, Section 6: The Data Encryption Standard, Section 7: International

More information

Specification on a Block Cipher : Hierocrypt L1

Specification on a Block Cipher : Hierocrypt L1 Specification on a Block Cipher : Hierocrypt L1 Toshiba Corporation September 2001 Contents 1 Design principle 3 1.1 Data randomizing part........................ 3 1.1.1 Nested SPN structure....................

More information

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium wu.hongjun,bart.preneel@esat.kuleuven.be

More information

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions

Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Characterizations on Algebraic Immunity for Multi-Output Boolean Functions Xiao Zhong 1, and Mingsheng Wang 3 1. Institute of Software, Chinese Academy of Sciences, Beijing 100190, China. Graduate School

More information

Security of the AES with a Secret S-box

Security of the AES with a Secret S-box Security of the AES with a Secret S-box Tyge Tiessen, Lars R Knudsen, Stefan Kölbl, and Martin M Lauridsen {tyti,lrkn,stek,mmeh}@dtudk DTU Compute, Technical University of Denmark, Denmark Abstract How

More information