首页> 外文会议>International Conference on the Theory and Application of Cryptology and Information Security >Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions
【24h】

Mind the Propagation of States New Automatic Search Tool for Impossible Differentials and Impossible Polytopic Transitions

机译:介意状态的传播新的自动搜索工具对于不可能的差异和不可能的多体化转变

获取原文

摘要

Impossible differentials cryptanalysis and impossible polytopic cryptanalysis are the most effective approaches to estimate the security of block ciphers. However, the previous automatic search methods of their distinguishers, impossible differentials and impossible polytopic transitions, neither consider the impact of key schedule in the single-key setting and the differential property of large S-boxes, nor apply to the block ciphers with variable rotations. Thus, unlike previous methods which focus on the propagation of the difference or s-difference, we redefine the impossible differentials and impossible (s + 1)-polytopic transitions according to the propagation of state, which allow us to break through those limitations of the previous methods. Theoretically, we prove that traditional impossible differentials and impossible (s + 1)-polytopic transitions are equivalent to part of our redefinitions, which have advantages from broader view. Technically, we renew the automatic search model and design an SAT-based tool to evaluate our redefined impossible differentials and impossible (s + 1)-polytopic transitions efficiently. As a result, for GIFT64, we get the 6-round impossible differentials which cannot be detected by all previous tools. For PRINTcipher, we propose the first modeling method for the key-dependent permutation and key-dependent S-box. For MISTY1, we derive 902 4-round impossible differentials by exploiting the differential property of S-boxes. For RC5, we present the first modeling method for the variable rotation and get 2.5-round impossible differentials for each version of it. More remarkable, our tool can be used to evaluate the security of given cipher against the impossible differentials, and we prove that there exists no 5-round 1 input active word and 1 output active word impossible differentials for AES-128 even consider the relations of 3-round keys. Besides, we also get the impossible (s + 1)-polytopic transitions for PRINTcipher, GIFT64, PRESENT, and RC5, all of which can cover more rounds than their corresponding impossible differentials as far as we know.
机译:不可能的差异密码分析和不可能的多种多体密码分析是估计块密码安全性的最有效的方法。但是,先前的自动搜索方法的区分器,不可能的差异和不可能的多体化转换,既不考虑关键时间表在单键设置中的影响和大型S箱的差分性,也不适用于具有可变旋转的块密码。因此,与专注于差异或S差异的传播的先前方法不同,我们根据状态的传播重新定义不可能的差异和不可能的(S + 1)-Polytopic过渡,这使我们能够突破这些限制以前的方法。从理论上讲,我们证明了传统的不可能的差异和不可能(S + 1)-Polytopic过渡相当于我们的重新定义的一部分,这具有更广泛的观点的优势。从技术上讲,我们更新自动搜索模型并设计基于SAT的工具,以评估我们重新定义的不可能的差异,并且有效地进行了不可能的(S + 1)转换。结果,对于Gift64,我们得到了所有以前的工具无法检测到的6轮不可能的差异。对于PrintCiphipher,我们提出了第一个用于关键依赖性置换和关键相关的S框的建模方法。对于Misty1,我们通过利用S箱的差异属性来派生902个4轮不可能的差异。对于RC5,我们介绍了用于变量旋转的第一个建模方法,并为每个版本获取2.5轮不可能的差异。更显着的是,我们的工具可用于评估给定密码对不可能的差异的安全性,并且我们证明存在第5轮输入有源字和1个输出的AES-128输出有源词,甚至考虑的关系3轮钥匙。此外,我们还获得了PrintCiphipher,Gift64,礼物和RC5的不可能(S + 1)-Polytopic过渡,所有这些都可以介绍比我们所知道的相应不可能的差异更多的圆形。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号