Share to: share facebook share twitter share wa share telegram print page

Differential cryptanalysis

Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can affect the resultant difference at the output. In the case of a block cipher, it refers to a set of techniques for tracing differences through the network of transformation, discovering where the cipher exhibits non-random behavior, and exploiting such properties to recover the secret key (cryptography key).

History

The discovery of differential cryptanalysis is generally attributed to Eli Biham and Adi Shamir in the late 1980s, who published a number of attacks against various block ciphers and hash functions, including a theoretical weakness in the Data Encryption Standard (DES). It was noted by Biham and Shamir that DES was surprisingly resistant to differential cryptanalysis, but small modifications to the algorithm would make it much more susceptible.[1]: 8–9 

In 1994, a member of the original IBM DES team, Don Coppersmith, published a paper stating that differential cryptanalysis was known to IBM as early as 1974, and that defending against differential cryptanalysis had been a design goal.[2] According to author Steven Levy, IBM had discovered differential cryptanalysis on its own, and the NSA was apparently well aware of the technique.[3] IBM kept some secrets, as Coppersmith explains: "After discussions with NSA, it was decided that disclosure of the design considerations would reveal the technique of differential cryptanalysis, a powerful technique that could be used against many ciphers. This in turn would weaken the competitive advantage the United States enjoyed over other countries in the field of cryptography."[2] Within IBM, differential cryptanalysis was known as the "T-attack"[2] or "Tickle attack".[4]

While DES was designed with resistance to differential cryptanalysis in mind, other contemporary ciphers proved to be vulnerable. An early target for the attack was the FEAL block cipher. The original proposed version with four rounds (FEAL-4) can be broken using only eight chosen plaintexts, and even a 31-round version of FEAL is susceptible to the attack. In contrast, the scheme can successfully cryptanalyze DES with an effort on the order of 247 chosen plaintexts.

Attack mechanics

Differential cryptanalysis is usually a chosen plaintext attack, meaning that the attacker must be able to obtain ciphertexts for some set of plaintexts of their choosing. There are, however, extensions that would allow a known plaintext or even a ciphertext-only attack. The basic method uses pairs of plaintexts related by a constant difference. Difference can be defined in several ways, but the eXclusive OR (XOR) operation is usual. The attacker then computes the differences of the corresponding ciphertexts, hoping to detect statistical patterns in their distribution. The resulting pair of differences is called a differential. Their statistical properties depend upon the nature of the S-boxes used for encryption, so the attacker analyses differentials where (and ⊕ denotes exclusive or) for each such S-box S. In the basic attack, one particular ciphertext difference is expected to be especially frequent. In this way, the cipher can be distinguished from random. More sophisticated variations allow the key to be recovered faster than an exhaustive search.

In the most basic form of key recovery through differential cryptanalysis, an attacker requests the ciphertexts for a large number of plaintext pairs, then assumes that the differential holds for at least r − 1 rounds, where r is the total number of rounds.[5] The attacker then deduces which round keys (for the final round) are possible, assuming the difference between the blocks before the final round is fixed. When round keys are short, this can be achieved by simply exhaustively decrypting the ciphertext pairs one round with each possible round key. When one round key has been deemed a potential round key considerably more often than any other key, it is assumed to be the correct round key.

For any particular cipher, the input difference must be carefully selected for the attack to be successful. An analysis of the algorithm's internals is undertaken; the standard method is to trace a path of highly probable differences through the various stages of encryption, termed a differential characteristic.

Since differential cryptanalysis became public knowledge, it has become a basic concern of cipher designers. New designs are expected to be accompanied by evidence that the algorithm is resistant to this attack and many including the Advanced Encryption Standard, have been proven secure against the attack.[6]

Attack in detail

The attack relies primarily on the fact that a given input/output difference pattern only occurs for certain values of inputs. Usually the attack is applied in essence to the non-linear components as if they were a solid component (usually they are in fact look-up tables or S-boxes). Observing the desired output difference (between two chosen or known plaintext inputs) suggests possible key values.

For example, if a differential of 1 => 1 (implying a difference in the least significant bit (LSB) of the input leads to an output difference in the LSB) occurs with probability of 4/256 (possible with the non-linear function in the AES cipher for instance) then for only 4 values (or 2 pairs) of inputs is that differential possible. Suppose we have a non-linear function where the key is XOR'ed before evaluation and the values that allow the differential are {2,3} and {4,5}. If the attacker sends in the values of {6, 7} and observes the correct output difference it means the key is either 6 ⊕ K = 2, or 6 ⊕ K = 4, meaning the key K is either 2 or 4.

In essence, to protect a cipher from the attack, for an n-bit non-linear function one would ideally seek as close to 2−(n − 1) as possible to achieve differential uniformity. When this happens, the differential attack requires as much work to determine the key as simply brute forcing the key.[7]

The AES non-linear function has a maximum differential probability of 4/256 (most entries however are either 0 or 2). Meaning that in theory one could determine the key with half as much work as brute force, however, the high branch of AES prevents any high probability trails from existing over multiple rounds. In fact, the AES cipher would be just as immune to differential and linear attacks with a much weaker non-linear function. The incredibly high branch (active S-box count) of 25 over 4R means that over 8 rounds, no attack involves fewer than 50 non-linear transforms, meaning that the probability of success does not exceed Pr[attack] ≤ Pr[best attack on S-box]50. For example, with the current S-box AES emits no fixed differential with a probability higher than (4/256)50 or 2−300 which is far lower than the required threshold of 2−128 for a 128-bit block cipher. This would have allowed room for a more efficient S-box, even if it is 16-uniform the probability of attack would have still been 2−200.

There exist no bijections for even sized inputs/outputs with 2-uniformity. They exist in odd fields (such as GF(27)) using either cubing or inversion (there are other exponents that can be used as well). For instance, S(x) = x3 in any odd binary field is immune to differential and linear cryptanalysis. This is in part why the MISTY designs use 7- and 9-bit functions in the 16-bit non-linear function. What these functions gain in immunity to differential and linear attacks, they lose to algebraic attacks. [why?] That is, they are possible to describe and solve via a SAT solver. This is in part why AES (for instance) has an affine mapping after the inversion.

Specialized types

See also

References

  1. ^ Biham E, Shamir A (1993). Differential cryptanalysis of the data encryption standard. New York: Springer Verlag. ISBN 978-0-387-97930-4.
  2. ^ a b c Coppersmith D (May 1994). "The Data Encryption Standard (DES) and its strength against attacks" (PDF). IBM Journal of Research and Development. 38 (3): 243–250. doi:10.1147/rd.383.0243. (subscription required)
  3. ^ Levy S (2001). Crypto: How the Code Rebels Beat the Government — Saving Privacy in the Digital Age. Penguin Books. pp. 55–56. ISBN 0-14-024432-8.
  4. ^ Blaze M (15 August 1996). "Re: Reverse engineering and the Clipper chip". sci.crypt.
  5. ^ "Differential Cryptanalysis - an overview | ScienceDirect Topics". www.sciencedirect.com. Retrieved 2023-04-13.
  6. ^ Nechvatal J, Barker E, Bassham L, Burr W, Dworkin M, Foti J, Roback E (May–June 2001). "Report on the Development of the Advanced Encryption Standard (AES)". Journal of Research of the National Institute of Standards and Technology. 106 (3): 511–577. doi:10.6028/jres.106.023. PMC 4863838. PMID 27500035. 3.2.1.3.
  7. ^ Indesteege, Sebastiaan; Preneel, Bart (2009). "Practical Collisions for EnRUPT". In Dunkelman, Orr (ed.). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5665. Berlin, Heidelberg: Springer. pp. 246–259. doi:10.1007/978-3-642-03317-9_15. ISBN 978-3-642-03317-9.

Further reading

External links

Read other articles:

Brocourtcomune Brocourt – Veduta LocalizzazioneStato Francia RegioneAlta Francia Dipartimento Somme ArrondissementAmiens CantonePoix-de-Picardie TerritorioCoordinate49°51′N 1°50′E / 49.85°N 1.833333°E49.85; 1.833333 (Brocourt)Coordinate: 49°51′N 1°50′E / 49.85°N 1.833333°E49.85; 1.833333 (Brocourt) Superficie2,39 km² Abitanti101[1] (2009) Densità42,26 ab./km² Altre informazioniCod. postale80430 Fuso orarioUTC+1 Codic…

Sony XperiaPembuatSony MobileJenisPonsel cerdas, tablet, phabletTanggal rilis27 Oktober 2008; 15 tahun lalu (2008-10-27)Sistem operasiAndroid (sejak tahun 2010)Windows Mobile (2008–2010)MasukanLayar sentuh Xperia (/ɛkˈspɪəriə/) adalah sebuah merek ponsel cerdas dan tablet milik Sony Mobile. Nama Xperia berasal dari kata experience, dan pertama kali digunakan pada tagline Xperia X1, yakni I Xperia the best. Sony Mobile sebelumnya dikenal secara global dengan nama Sony Ericsson, dan ke…

Access by KAICuplikan layar dari Access by KAI, dengan nama pengguna disembunyikan.PengembangKereta Api IndonesiaRilis perdana4 September 2014; 9 tahun lalu (2014-09-04)Sistem operasiiOSAndroidUkuran35 MB (Android) 62.6 MB (iOS)Tersedia dalamBahasa Indonesia dan InggrisJenisPemesanan tiket kereta apiLisensiPerangkat lunak gratisSitus webkai.id Access by KAI adalah aplikasi pemesanan tiket kereta api yang dikembangkan dan diterbitkan oleh PT Kereta Api Indonesia sebagai KAI Access sejak 2014…

アメリカ合衆国の一級国道 U.S. Route 1 地図 路線延長 3,846 km (2,390 mi) 制定年 1926年 南端 フロリダ州キー・ウェスト 北端 メイン州フォート・ケート ■テンプレート(■ノート ■使い方) ■PJ道路 地図 国道1号線(こくどう1ごうせん、U.S. Route 1)とは、アメリカ合衆国の国道の1つである。東海岸部の大都市を南北に結ぶ主要な路線であり、全長2,390マイル(キロメートルに

Public secondary school in Beloit, Wisconsin, United StatesBeloit Memorial High SchoolBMHSFront of Beloit Memorial High SchoolAddress1225 Fourth StreetBeloit, WisconsinUnited StatesCoordinates42°30′52.39″N 89°2′15.7″W / 42.5145528°N 89.037694°W / 42.5145528; -89.037694InformationTypePublic secondaryOversightSchool District of BeloitPrincipalEmily Pelz [1]Faculty120 (2016-2017)[2]Freshman, sophomore, junior, senior9-12Enrollment1,988(2018-2019)&…

Grand Hotel PreangerBerkas:Grandpreangerbandung.jpgInformasi umumLokasi Bandung, IndonesiaAlamatJalan Asia Afrika 81, BandungPembukaan1920ManajemenJaswita JabarInformasi lainJumlah kamar187Situs webgrandhotelpreanger.com Grand Hotel Preanger adalah hotel 5-bintang terletak di pusat kota Bandung adalah salah satu hotel besar dan tertua di Bandung. Sejarah Grand Hotel Preanger pada tahun 1920-an Prama Grand Preanger Pada tahun 1884, ketika para Priangan planters (pemilik perkebunan di Priangan ) m…

American politician The neutrality of this article is disputed. Relevant discussion may be found on the talk page. Please do not remove this message until conditions to do so are met. (April 2021) (Learn how and when to remove this template message) Jay CostaCosta giving remarks in October 2022.Minority Leader of the Pennsylvania SenateIncumbentAssumed office January 4, 2011Preceded byBob MellowMember of the Pennsylvania Senatefrom the 43rd districtIncumbentAssumed office May 13, 1996Pre…

PelotasDatos generalesNombre Esporte Clube PelotasFundación 1 de mayo de 1911 (112 años)Presidente Gilmar SchneiderDirector deportivo Roger Bauer[1]​Entrenador Diego Gavilán[1]​InstalacionesEstadio Estadio Boca do LoboCapacidad 15 478 espectadores[2]​Ubicación Pelotas, BrasilUniforme Titular Alternativo Tercero Última temporadaLiga Campeonato Gaúcho Serie A2(2023) 5.ºTítulos 2 (por última vez en 2018)Copa Copa FGF(2023) Cuartos de finalTítulos 2 (por ú…

Esta página cita fontes, mas que não cobrem todo o conteúdo. Ajude a inserir referências. Conteúdo não verificável pode ser removido.—Encontre fontes: ABW  • CAPES  • Google (N • L • A) (Maio de 2015) Diplommatinidae Desenho da concha de um Opisthostoma goniostoma Classificação científica Reino: Animalia Filo: Mollusca Classe: Gastropoda Família: Diplommatinidae Diplommatinidae é uma família de pequenos caracóis terres…

Este artigo cobre a linha do tempo da epidemia do vírus Ébola de 2014 na África Ocidental e seus surtos em outros lugares.[1] São apresentados os primeiros anúncios de casos confirmados pelos respectivos estados-nação, suas primeiras mortes e suas primeiras transmissões secundárias, além de sessões e anúncios relevantes de agências como a Organização Mundial de Saúde (OMS), os Centros de Controle e Prevenção de Doenças dos EUA (CDC) e ONGs como Médicos Sem Fronteiras. Evacua

Third ship of the B-class oil tankers History United Kingdom NameSS Gari OwnerGaz De Franz Port of registryLondon, UK Ordered1972 BuilderCNIM-La Syne, France Launched20 November 1972 In service1973 Out of service1986 HomeportLondon FateSold to Brunei in December 1986 Brunei NameSS Bekulan Owner Brunei Shell Tankers (1986) Brunei Liquified Natural Gas (2015) OperatorSTASCo Port of registryMuara, Brunei Acquired1986 In service1986 Out of service2011 HomeportBrunei Identification IMO number: 7…

French record label This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) The topic of this article may not meet Wikipedia's notability guideline for music. Please help to demonstrate the notability of the topic by citing reliable secondary sources that are independent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is l…

هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (مايو 2021) يفتقر محتوى هذه المقالة إلى الاستشهاد بمصادر. فضلاً، ساهم في تطوير هذه المقالة من خلال إضافة مصادر موثوق بها. أي معلومات غير موثقة يمكن التشكيك بها وإزالتها. (دي…

Reserved area in South Africa Spioenkop Nature ReserveLandscape with Spioenkop hill in the backgroundLocation of the reserve in KwaZulu-NatalLocationKwaZulu-Natal, South AfricaNearest cityLadysmithCoordinates28°40′S 29°31′E / 28.667°S 29.517°E / -28.667; 29.517Governing bodyEzemvelo KZN Wildlife Spioenkop Dam Nature Reserve or Spion Kop Nature Reserve is a protected area in KwaZulu-Natal, South Africa. It lies close to Ladysmith with Winterton being the …

2017 American filmG-FunkDirected byKaram GillProduced byGary Ousdahl, Warren G, Rafael Chavez, Bob RuggeriDistributed byYouTube PremiumRelease dates March 11, 2017 (2017-03-11) (South by Southwest) July 11, 2018 (2018-07-11) Running time87 minutesCountryUnited StatesLanguageEnglish G-Funk is a 2017 documentary film distributed by YouTube Premium.[1] The film uses previously unreleased archival footage to describe the rise of G-Funk in the early 1990s. …

Marie-Anne, later the princesse des Ursins The Camarera mayor de Palacio (First Lady of the Bedchamber) was the Official of the Royal Household and Heritage of the Crown of Spain, who was in charge of the person and the rooms of the Queen of Spain. Historical precedents and regime during the 17th and 18th centuries This Office was created in 1526 when, during the Habsburg dynasty, the Royal Court was shaped after that one that existed in the Court of Burgundy. Charles V, Holy Roman Emperor, but …

Maya class steam gunboat For other ships with the same name, see Japanese ship Atago. Atago at Kure, 1897 History Empire of Japan Name Atago Ordered1883 BuilderYokosuka Naval Arsenal Laid down17 July 1886 Launched18 June 1887 Commissioned2 March 1889 Stricken15 June 1905 FateGrounded and sank 6 November 1904 General characteristics Class and typeMaya-class gunboat Displacement614 long tons (624 t) Length47.0 m (154.2 ft) Beam8.2 m (26 ft 11 in) Draught2.95 m (9…

Barracks ship of the United States Navy APL-45 History United States NameAPL-45 Ordered19 July 1944 BuilderWillamette Iron and Steel Works Laid down7 February 1945 Launched12 May 1945 Acquired28 July 1945 Commissioned28 July 1945 DecommissionedJanuary 1947 Stricken1 November 1972 Reinstated1974 HomeportNorfolk IdentificationHull number: APL-45 Honours andawardsSee Awards StatusBerthed in Norfolk General characteristics Class and typeAPL-41-class barracks ship Displacement 1,300 t (1,279 lon…

Soviet politician In this name that follows Eastern Slavic naming conventions, the patronymic is Yakovlevich and the family name is Sokolnikov. Grigori SokolnikovГригорий СокольниковGrigori Sokolnikov (1888–1939)People's Commissar for Finance of the USSRIn office6 July 1923 – 16 January 1926PremierVladimir Lenin (until 1924)Alexei RykovPreceded byNone—post createdSucceeded byNikolai BryukhanovPeople's Commissar for Finance of the RSFSRIn office22 November 19…

斗六行啟記念館斗六記念公館、斗六國有財產局雲林辦公廳舍、斗六公民會館位置雲林縣斗六市府前街101號坐标23°42′20″N 120°32′31″E / 23.705684°N 120.541875°E / 23.705684; 120.541875坐标:23°42′20″N 120°32′31″E / 23.705684°N 120.541875°E / 23.705684; 120.541875建成时间約1927年 中華民國文化資產官方名称斗六行啟記念館類型登錄等級:歷史建築登錄種類…

Kembali kehalaman sebelumnya

Lokasi Pengunjung: 18.217.80.111