Interpolation attack

In cryptography, an interpolation attack is a type of cryptanalytic attack against block ciphers.

After the two attacks, differential cryptanalysis and linear cryptanalysis, were presented on block ciphers, some new block ciphers were introduced, which were proven secure against differential and linear attacks. Among these there were some iterated block ciphers such as the KN-Cipher and the SHARK cipher. However, Thomas Jakobsen and Lars Knudsen showed in the late 1990s that these ciphers were easy to break by introducing a new attack called the interpolation attack.

In the attack, an algebraic function is used to represent an S-box. This may be a simple quadratic, or a polynomial or rational function over a Galois field. Its coefficients can be determined by standard Lagrange interpolation techniques, using known plaintexts as data points. Alternatively, chosen plaintexts can be used to simplify the equations and optimize the attack.

In its simplest version an interpolation attack expresses the ciphertext as a polynomial of the plaintext. If the polynomial has a relative low number of unknown coefficients, then with a collection of plaintext/ciphertext (p/c) pairs, the polynomial can be reconstructed. With the polynomial reconstructed the attacker then has a representation of the encryption, without exact knowledge of the secret key.

The interpolation attack can also be used to recover the secret key.

It is easiest to describe the method with an example.

Example

Let an iterated cipher be given by

where is the plaintext, the output of the round, the secret round key (derived from the secret key by some key schedule), and for a -round iterated cipher, is the ciphertext.

Consider the 2-round cipher. Let denote the message, and denote the ciphertext.

Then the output of round 1 becomes

and the output of round 2 becomes

Expressing the ciphertext as a polynomial of the plaintext yields

where the 's are key dependent constants.

Using as many plaintext/ciphertext pairs as the number of unknown coefficients in the polynomial , then we can construct the polynomial. This can for example be done by Lagrange Interpolation (see Lagrange polynomial). When the unknown coefficients have been determined, then we have a representation of the encryption, without knowledge of the secret key .

Existence

Considering an -bit block cipher, then there are possible plaintexts, and therefore distinct pairs. Let there be unknown coefficients in . Since we require as many pairs as the number of unknown coefficients in the polynomial, then an interpolation attack exist only if .

Time complexity

Assume that the time to construct the polynomial using pairs are small, in comparison to the time to encrypt the required plaintexts. Let there be unknown coefficients in . Then the time complexity for this attack is , requiring known distinct pairs.

Interpolation attack by Meet-In-The-Middle

Often this method is more efficient. Here is how it is done.

Given an round iterated cipher with block length , let be the output of the cipher after rounds with . We will express the value of as a polynomial of the plaintext , and as a polynomial of the ciphertext . Let be the expression of via , and let be the expression of via . The polynomial is obtain by computing forward using the iterated formula of the cipher until round , and the polynomial is obtain by computing backwards from the iterated formula of the cipher starting from round until round .

So it should hold that

and if both and are polynomials with a low number of coefficients, then we can solve the equation for the unknown coefficients.

Time complexity

Assume that can be expressed by coefficients, and can be expressed by coefficients. Then we would need known distinct pairs to solve the equation by setting it up as a matrix equation. However, this matrix equation is solvable up to a multiplication and an addition. So to make sure that we get a unique and non-zero solution, we set the coefficient corresponding to the highest degree to one, and the constant term to zero. Therefore, known distinct pairs are required. So the time complexity for this attack is , requiring known distinct pairs.

By the Meet-In-The-Middle approach the total number of coefficients is usually smaller than using the normal method. This makes the method more efficient, since less pairs are required.

Key-recovery

We can also use the interpolation attack to recover the secret key .

If we remove the last round of an -round iterated cipher with block length , the output of the cipher becomes . Call the cipher the reduced cipher. The idea is to make a guess on the last round key , such that we can decrypt one round to obtain the output of the reduced cipher. Then to verify the guess we use the interpolation attack on the reduced cipher either by the normal method or by the Meet-In-The-Middle method. Here is how it is done.

By the normal method we express the output of the reduced cipher as a polynomial of the plaintext . Call the polynomial . Then if we can express with coefficients, then using known distinct pairs, we can construct the polynomial. To verify the guess of the last round key, then check with one extra pair if it holds that

If yes, then with high probability the guess of the last round key was correct. If no, then make another guess of the key.

By the Meet-In-The-Middle method we express the output from round as a polynomial of the plaintext and as a polynomial of the output of the reduced cipher . Call the polynomials and , and let them be expressed by and coefficients, respectively. Then with known distinct pairs we can find the coefficients. To verify the guess of the last round key, then check with one extra pair if it holds that

If yes, then with high probability the guess of the last round key was correct. If no, then make another guess of the key.

Once we have found the correct last round key, then we can continue in a similar fashion on the remaining round keys.

Time complexity

With a secret round key of length , then there are different keys. Each with probability to be correct if chosen at random. Therefore, we will on average have to make guesses before finding the correct key.

Hence, the normal method have average time complexity , requiring known distinct pairs, and the Meet-In-The-Middle method have average time complexity , requiring known distinct pairs.

Real world application

The Meet-in-the-middle attack can be used in a variant to attack S-boxes, which uses the inverse function, because with an -bit S-box then in .

The block cipher SHARK uses SP-network with S-box . The cipher is resistant against differential and linear cryptanalysis after a small number of rounds. However it was broken in 1996 by Thomas Jakobsen and Lars Knudsen, using interpolation attack. Denote by SHARK a version of SHARK with block size bits using parallel -bit S-boxes in rounds. Jakobsen and Knudsen found that there exist an interpolation attack on SHARK (64-bit block cipher) using about chosen plaintexts, and an interpolation attack on SHARK (128-bit block cipher) using about chosen plaintexts.

Also Thomas Jakobsen introduced a probabilistic version of the interpolation attack using Madhu Sudan's algorithm for improved decoding of Reed-Solomon codes. This attack can work even when an algebraic relationship between plaintexts and ciphertexts holds for only a fraction of values.

References

  • Thomas Jakobsen, Lars Knudsen (January 1997). The Interpolation Attack on Block Ciphers (PDF/PostScript). 4th International Workshop on Fast Software Encryption (FSE '97), LNCS 1267. Haifa: Springer-Verlag. pp. 28–40. Retrieved 2007-07-03.
  • Thomas Jakobsen (August 25, 1998). Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree (PDF/PostScript). Advances in Cryptology — CRYPTO '98. Santa Barbara, California: Springer-Verlag. pp. 212–222. Retrieved 2007-07-06. (Video of presentation at Google Video—uses Flash)
  • Shiho Moriai; Takeshi Shimoyama; Toshinobu Kaneko (March 1999). Interpolation Attacks of the Block Cipher: SNAKE (PDF). FSE '99. Rome: Springer-Verlag. pp. 275–289. doi:10.1007/3-540-48519-8_20. Retrieved 2022-11-06.
  • Amr M. Youssef; Guang Gong (April 2000). On the Interpolation Attacks on Block Ciphers (PDF). FSE 2000. New York City: Springer-Verlag. pp. 109–120. Retrieved 2007-07-06.
  • Kaoru Kurosawa; Tetsu Iwata; Viet Duong Quang (August 2000). Root Finding Interpolation Attack (PDF/PostScript). Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography (SAC 2000). Waterloo, Ontario: Springer-Verlag. pp. 303–314. Retrieved 2007-07-06.

Read other articles:

AbujaKotaAbujaLokasi Abuja di NigeriaTampilkan peta NigeriaAbujaAbuja (Afrika)Tampilkan peta AfrikaKoordinat: 9°4′N 7°29′E / 9.067°N 7.483°E / 9.067; 7.483Koordinat: 9°4′N 7°29′E / 9.067°N 7.483°E / 9.067; 7.483Negara NigeriaTeritoriTeritori Ibu Kota FederalPemerintahan • MenteriBala MohammedLuas • Total713 km2 (275 sq mi) • Luas daratan713 km2 (275 sq mi)Popu...

 

 

يفتقر محتوى هذه المقالة إلى الاستشهاد بمصادر. فضلاً، ساهم في تطوير هذه المقالة من خلال إضافة مصادر موثوق بها. أي معلومات غير موثقة يمكن التشكيك بها وإزالتها. (ديسمبر 2018) الضحي الجرايح السفلى  - مديرية -  تقسيم إداري البلد  اليمن المحافظة محافظة الحديدة المديرية �...

 

 

Часть серии статей о Холокосте Идеология и политика Расовая гигиена · Расовый антисемитизм · Нацистская расовая политика · Нюрнбергские расовые законы Шоа Лагеря смерти Белжец · Дахау · Майданек · Малый Тростенец · Маутхаузен ·&...

Gunung KursiKompleks pegunungan di Kaldera Tengger saat matahari terbit. Gunung Kursi terletak di belakang dan belakang kanan Gunung Batok, sebelah Gunung Widodaren.Titik tertinggiKetinggian2.581 m (8.468 ft)[1]Masuk dalam daftarRibuGeografiGunung KursiJawa Timur, Indonesia Gunung Kursi adalah sebuah gunung yang terletak di Jawa Timur, dekat dengan Gunung Bromo dan Semeru. Gunung Kursi memiliki ketinggian 2.581 meter di atas permukaan laut. Gunung ini merupakan salah satu ba...

 

 

Kolak Express 3Genre Drama Roman Komedi PembuatMAXstreamBerdasarkanPermainan piranti genggam Kolak Express 3oleh Dunia GamesSutradaraEmil HeradiPemeran Kevin Julio Indah Kusuma Negara asalIndonesiaBahasa asliBahasa IndonesiaJmlh. episode31 (daftar episode)ProduksiProduser eksekutif Derrick Heng Nirwan Lesmana Yonathan Nugroho Darius Sinathrya Produser Abdul Manaf Gading Giarono Dimitri Putra Laksyandi SinematografiGandang WarahPenyunting Servo Caesar Prayoga Narendra Pengaturan kameraMulti-k...

 

 

Campeonato Sudamericano de Football 1937 Competizione Coppa America Sport Calcio Edizione 14ª Date dal 1936al 1937 Luogo  Argentina(1 città) Partecipanti 6 Impianto/i 3 stadi Risultati Vincitore Argentina(5° titolo) Secondo Brasile Terzo Uruguay Quarto Paraguay Statistiche Miglior giocatore Vicente De la Mata[1] Miglior marcatore Toro (7) Incontri disputati 16 Gol segnati 69 (4,31 per incontro) Pubblico 518 000 (32 375 per incontro) Gli argent...

Lukas 1Permulaan Injil Lukas (pasal 1:1-7a), folio 102 pada Minuscule 481, yang dibuat sekitar abad ke-10.KitabInjil LukasKategoriInjilBagian Alkitab KristenPerjanjian BaruUrutan dalamKitab Kristen3← Markus 16 pasal 2 → Lukas 1 (disingkat Luk 1) adalah pasal pertama dari Injil Lukas pada Perjanjian Baru dalam Alkitab Kristen. Disusun oleh Lukas, seorang Kristen yang merupakan teman seperjalanan Rasul Paulus.[1][2] Pasal yang terdiri dari 80 ayat ini merupakan salah...

 

 

Синелобый амазон Научная классификация Домен:ЭукариотыЦарство:ЖивотныеПодцарство:ЭуметазоиБез ранга:Двусторонне-симметричныеБез ранга:ВторичноротыеТип:ХордовыеПодтип:ПозвоночныеИнфратип:ЧелюстноротыеНадкласс:ЧетвероногиеКлада:АмниотыКлада:ЗавропсидыКласс:Пт�...

 

 

Seo Ji-sooLahirSeo Ji-soo11 Februari 1994 (umur 30)Incheon, Korea SelatanPekerjaanPenyanyiAktrisKarier musikGenreK-popInstrumenVokalTahun aktif2014–sekarangLabelWoollimArtis terkaitLovelyz Seo Ji-soo (서지수)[1] (lahir 11 Februari 1994) adalah seorang penyanyi dan rapper asal Korea Selatan. Ia adalah anggota grup vokal perempuan Lovelyz, yang debut pada 2014 di bawah naungan Woollim Entertainment. Karena rumor yang berkembang sepekan sebelum debut resmi grup tersebut, Ji-so...

Dutch university Delft University of TechnologyTechnische Universiteit DelftFormer namesKoninklijke Akademie van DelftPolytechnische School van DelftTechnische Hoogeschool van DelftMotto in EnglishChallenge the FutureTypePublic, TechnicalEstablished1842; 182 years ago (1842)[1]Budget€ 914 million (2022)[2]PresidentProf.Dr.ir. T.H.J.J. (Tim) van der Hagen [nl][3]RectorProf.dr.ir. T.H.J.J. (Tim) van der Hagen[3]Academic staff...

 

 

Public transport operator in the New York Capital District This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article may contain an excessive amount of intricate detail that may interest only a particular audience. Please help by spinning off or relocating any relevant information, and removing excessive detail that may be against Wikipedia's inclusion policy. (December 2017) (Learn ho...

 

 

Concours Eurovision de la chanson 1990 Dates Finale 5 mai 1990 Retransmission Lieu Koncertna dvorana Vatroslav LisinskiZagreb, Yougoslavie Présentateur(s) Oliver Mlakar Helga Vlahović Directeur musical Igor Kuljerić Superviseur exécutif Frank Naef Télédiffuseur hôte Jugoslovenska Radio-Televizija (JRT) Ouverture Zagreb : ville de musique, film de Nenad Puhovski Entracte La Yougoslavie change, film de Ivo Laurenčić Participants Nombre de participants 22 Débuts Aucun Retour Aucu...

Synagogue de la Ghriba Salle de prière de la synagogue de la Ghriba. Présentation Nom local كنيس الغريبة Culte Judaïsme(Maghrebim) Type Synagogue Géographie Pays Tunisie Gouvernorat Médenine Localité Erriadh Coordonnées 33° 48′ 50″ nord, 10° 51′ 33″ est modifier  La synagogue de la Ghriba (arabe : كنيس الغريبة) est une synagogue tunisienne qui constitue l'un des principaux marqueurs identitaires des Juifs de Djerb...

 

 

MK Hapoel Be'er ShevaCalcio Cammelli, Rossi del sud Segni distintiviUniformi di gara Casa Trasferta Colori sociali Rosso Dati societariCittàBe'er Sheva Nazione Israele ConfederazioneUEFA Federazione IFA CampionatoLigat ha'Al Fondazione1949 Proprietario Alona Barkat Presidente Guy Primor Allenatore Elyaniv Barda StadioYaakov Turner(13 000 posti) PalmarèsTitoli nazionali5 Campionati israeliani Trofei nazionali3 Coppe d'Israele3 Coppe Toto Leumit1 Coppa Toto Al4 Supercoppe d'Israele ...

 

 

海尔·塞拉西一世埃塞俄比亚皇帝統治1930年11月2日-1974年9月12日(43年314天)加冕1930年11月2日前任佐迪图繼任阿姆哈·塞拉西一世(流亡)埃塞俄比亞攝政王統治1916年9月27日-1930年11月2日(14年36天)出生(1892-07-23)1892年7月23日 埃塞俄比亚帝国哈勒爾州逝世1975年8月27日(1975歲—08—27)(83歲) 衣索比亞亚的斯亚贝巴安葬2000年11月5日圣三一大教堂配偶梅南·阿斯福(1889年-1962�...

Voce principale: FIFA Confederations Cup 2017. Finale della FIFA Confederations Cup 2017I giocatori tedeschi posano per la foto di gruppo dopo la vittoria nel torneoInformazioni generaliSport Calcio Competizione2017 FIFA Confederations Cup knockout stage Data2 luglio 2017 CittàSan Pietroburgo Impiantostadio Krestovskij Spettatori57 268 Dettagli dell'incontro Cile Germania 0 1 ArbitroMilorad Mažić (Serbia) MVPMarc-André ter Stegen (Germania) Successione ← Finale di Confede...

 

 

Arnon MilchanLahir6 Desember 1944 (umur 79)Rehovot, British Mandate of Palestine (sekarang Israel)KebangsaanIsraelPekerjaanPebisnisDikenal atasPendiri Regency EnterprisesKekayaan bersih US$3.7 miliar (oktober 4 2021)[1]Suami/istriBrigitte Genmaire (cerai)Amanda CoetzerAnak4[1] Arnon Milchan (Ibrani: ארנון מילצ'ן; lahir 6 Desember 1944) adalah pebisnis Israel yang telah memproduseri lebih dari 130 film.[2] Milchan, seorang miliarder dan pemilik ...

 

 

2008 novel by Erin Hunter Long Shadows AuthorErin HunterCover artistWayne McLoughlinCountryUnited StatesLanguageEnglishSeriesWarriors: Power of ThreeGenreChildren's literatureFantasy novelPublisherHarperCollinsPublication date25 November 2008Media typePrint (Hardback)Pages364Preceded byEclipse Followed bySunrise  Long Shadows is a children's fantasy novel, the fifth book in Erin Hunter's Warriors: Power of Three, and was widely released on 25 November 2008. The b...

Village in New York, United StatesPleasantville, New YorkVillageGazebo near train station SealLogoLocation within Westchester County and state of New YorkCoordinates: 41°8′11″N 73°47′15″W / 41.13639°N 73.78750°W / 41.13639; -73.78750CountryUnited StatesStateNew YorkCountyWestchesterTownMount PleasantSettled1695Incorporated1897Government • MayorPeter SchererArea[1] • Total1.85 sq mi (4.80 km2) • Lan...

 

 

منتخب روسيا لدوري الرغبي بلد الرياضة روسيا  الموقع الرسمي الموقع الرسمي  أكبر فوز أكبر خسارة تعديل مصدري - تعديل   منتخب روسيا الوطني لدوري الرغبي (بالروسية: Сборная России по регбилиг)‏ هو ممثل روسيا الرسمي في المنافسات الدولية في دوري الرغبي .[1][2] تشكيلة ا...