SlideShare une entreprise Scribd logo
1  sur  71
Télécharger pour lire hors ligne
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Algebraic Insights into the Secret Feistel Network
Léo Perrin1,2 Aleksei Udovenko1,2
1University of Luxembourg,
2SnT
March 22, 2016
1 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Outline
HDIM
LAT ANF
Distinguishing
Feistel Networks
Recovering
Whitening
Linear Layers
Impossible
Monomials
Attack
2 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
3 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Linear Approximation Table (LAT)
Definition (LAT, Fourier Transform, Walsh Spectrum)
The Linear Approximation Table of f : {0, 1}n → {0, 1}m is a
2n × 2m matrix L where
L[a, b] = #{x ∈ Fn
2, a · x = b · f (x)} − 2n−1
= −
1
2
x∈Fn
2
(−1)a·x⊕b·f (x)
.
4 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Jackson Pollock Representation of LAT
[Biryukov, Perrin CRYPTO2015]: graphical representation of LAT
to reverse-engineer S-Boxes.
S-Box F of Skipjack
5 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Jackson Pollock Representation of LAT
[Biryukov, Perrin CRYPTO2015]: graphical representation of LAT
to reverse-engineer S-Boxes.
S-Box F of Skipjack
4-round Feistel Network
with bijective functions
5 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
4-round Feistel Network
with bijective functions
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
4-round Feistel Network
with bijective functions
5-round Feistel Network
with bijective functions
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
6-round Feistel Network
with bijective functions
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
6-round Feistel Network
with bijective functions
Random permutation
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
Explanation? It is a bilinear form!
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
Explanation? It is a bilinear form!
The following is true:
L[a, b]
2
≡
x∈Fn
2
b · F(x) a · x (mod 2). (1)
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
Explanation? It is a bilinear form!
The following is true:
L[a, b]
2
≡
x∈Fn
2
b · F(x) a · x (mod 2). (1)
⇒ express L[a, b]/2 as a vector-matrix-vector product:
L[a, b]
2
≡ bT
× ˆH(F) × a (mod 2), (2)
where ˆH(F) is an n × n matrix over F2, such that
ˆH(F)[i, j] =
x∈Fn
2
ei · F(x) ej · x . (3)
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Another meaning of LAT modulo 4
Algebraic Normal Form (ANF)
Recall that any Boolean function f mapping n bits to 1 can be
represented in a unique way as:
f (x) =
u∈Fn
2
auxu
=
u∈Fn
2
au
i∈[0,n−1]
xui
i .
8 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Another meaning of LAT modulo 4
Algebraic Normal Form (ANF)
Recall that any Boolean function f mapping n bits to 1 can be
represented in a unique way as:
f (x) =
u∈Fn
2
auxu
=
u∈Fn
2
au
i∈[0,n−1]
xui
i .
Lemma (Another meaning of LAT modulo 4)
ˆH(F)[i, j] = 1 if and only if the ANF of ith bit of F contains the
monomial k=j xk (which has degree n − 1).
8 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
For one row/column we need 2n−1 data and 2n−1 time.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
For one row/column we need 2n−1 data and 2n−1 time.
For whole ˆH(F) we need full codebook and n2n−1 time.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
For one row/column we need 2n−1 data and 2n−1 time.
For whole ˆH(F) we need full codebook and n2n−1 time.
Neglible memory complexity - n bits to store the sum.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Properties of HDIM
Theorem (Linear transformations and HDIM)
Let µ, η be linear n-bit mappings, F be an n-bit permutation and
let G = η ◦ F ◦ µ. Then it holds that
ˆH(G) = η × ˆH(F) × (µt
)−1
.
10 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Properties of HDIM
Theorem (Linear transformations and HDIM)
Let µ, η be linear n-bit mappings, F be an n-bit permutation and
let G = η ◦ F ◦ µ. Then it holds that
ˆH(G) = η × ˆH(F) × (µt
)−1
.
Linear transformations applied to a permutation modify its
HDIM in a linear way.
We will use this Theorem to recover whitening linear layers.
10 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
11 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4 patterns
Recall the LAT modulo 4 patterns that we have spotted:
4-round Feistel Network
with bijective functions
5-round Feistel Network
with bijective functions
12 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4 patterns
Recall the LAT modulo 4 patterns that we have spotted:
Can be nicely rephrased in terms of HDIM.
4-round Feistel Network
with bijective functions
5-round Feistel Network
with bijective functions
12 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
HDIM Patterns in Feistel Networks
Theorem
Let Fr be r-round Feistel Network with bijective functions. Then
ˆH(F4
) =






0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 ? ? ?
0 0 0 ? ? ?
0 0 0 ? ? ?






ˆH(F5
) =






0 0 0 ? ? ?
0 0 0 ? ? ?
0 0 0 ? ? ?
? ? ? ? ? ?
? ? ? ? ? ?
? ? ? ? ? ?






Example is given for n = 3 (6-bit Feistel Network).
13 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
For non-bijective round functions, the results hold for one
round less.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
For non-bijective round functions, the results hold for one
round less.
Distinguisher for Feistel Networks: one HDIM row or column is
enough.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
For non-bijective round functions, the results hold for one
round less.
Distinguisher for Feistel Networks: one HDIM row or column is
enough. Weak compared to known distinguishers for up to 5
rounds, but can attack more rounds when the degree is low.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
Change sum variables:
=
α||γ∈F2n
2
ei · g(α, γ) ej · h(α, γ) .
f r/2 −1
α γ
f r/2
β
f r/2 +1
hg
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
Change sum variables:
=
α||γ∈F2n
2
ei · g(α, γ) ej · h(α, γ) .
Calculate the degrees of h and g
straightforwardly and sum them.
f r/2 −1
α γ
f r/2
β
f r/2 +1
hg
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
Change sum variables:
=
α||γ∈F2n
2
ei · g(α, γ) ej · h(α, γ) .
Calculate the degrees of h and g
straightforwardly and sum them.
For bijective round functions, we can
get one round more by summing over
α and β.
f r/2 −1
α γ
f r/2
β
f r/2 +1
hg
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Feistel Network with Whitening Linear Layers
The AFrA structure:
Feistel Network with
r rounds and n-bit branches.
fi : secret and independent
random functions.
whitened with secret affine
layers Ain, Aout.
n bits n bits
Ain
f0
f1
fr−2
fr−1
Aout
16 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Feistel Network with Whitening Linear Layers
The AFrA structure:
Feistel Network with
r rounds and n-bit branches.
fi : secret and independent
random functions.
whitened with secret affine
layers Ain, Aout.
Cryptanalysis goals:
distinguish from random
permutation;
recover the secret
components.
n bits n bits
Ain
f0
f1
fr−2
fr−1
Aout
16 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
Then by properties of HDIM we have:
η−1
× ˆH(G) × µt
=
0 0
0 ?
.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
Then by properties of HDIM we have:
η−1
× ˆH(G) × µt
=
0 0
0 ?
.
Parts of η and µ merge into the Feistel structure, so we have
less unknowns and we can solve the system.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
Then by properties of HDIM we have:
η−1
× ˆH(G) × µt
=
0 0
0 ?
.
Parts of η and µ merge into the Feistel structure, so we have
less unknowns and we can solve the system.
Distinguisher for AFrA and Partial recovery of linear layers.
Complexity is dominated by computing HDIM - n22n−1.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
One of such cases is when the linear layers are inverses of each
other (A−1FrA).
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
One of such cases is when the linear layers are inverses of each
other (A−1FrA).
Another possible case is one-sided whitening: FrA.
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
One of such cases is when the linear layers are inverses of each
other (A−1FrA).
Another possible case is one-sided whitening: FrA.
Partial recovery of linear layers for A−1FrA or FrA.
Complexity is dominated by computing HDIM - n22n−1.
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
19 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
This is an extreme case, we tried to cover more rounds, but we
recovered only surrounding linear layers.
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
This is an extreme case, we tried to cover more rounds, but we
recovered only surrounding linear layers.
Consider the case when ˆH(F) =
0 0
0 ?
. There are 3n2
impossible terms of degree n − 1. But there are more
impossible terms of lower degree.
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
This is an extreme case, we tried to cover more rounds, but we
recovered only surrounding linear layers.
Consider the case when ˆH(F) =
0 0
0 ?
. There are 3n2
impossible terms of degree n − 1. But there are more
impossible terms of lower degree.
The predictable absence of such terms may be used to recover
a secret round function.
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (1/2)
Consider a 5-round Feistel Network F with bijective round
functions. Let f be the last round function.
au = 0
au = 1/0 au = 1/0
F5 F2 F1 F0
f0
f1
f2
21 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (1/2)
Consider a 5-round Feistel Network F with bijective round
functions. Let f be the last round function.
We can prove that there are more than 2n monomials which
can’t occur in the ANFs on right branch of the 4-round FN.
au = 0
au = 1/0 au = 1/0
F5 F2 F1 F0
f0
f1
f2
21 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (1/2)
Consider a 5-round Feistel Network F with bijective round
functions. Let f be the last round function.
We can prove that there are more than 2n monomials which
can’t occur in the ANFs on right branch of the 4-round FN.
This gives us information about the last round function f .
au = 0
au = 1/0 au = 1/0
F5 F2 F1 F0
f0
f1
f2
21 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (2/2)
We obtain a linear system with 2n unknowns (ANF coefficients
of fi ) and more than 2n equations.
22 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (2/2)
We obtain a linear system with 2n unknowns (ANF coefficients
of fi ) and more than 2n equations.
By solving the system we recover the secret round function f
(up to a XOR constant).
22 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (2/2)
We obtain a linear system with 2n unknowns (ANF coefficients
of fi ) and more than 2n equations.
By solving the system we recover the secret round function f
(up to a XOR constant).
Complexity is dominated by generating the system and is
O(23n).
22 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
Theorem (Impossible Monomials in Feistel Networks)
Let F be a 2n-bit Feistel Network with r rounds and round
functions of degree at most d. If dr−2 < n, then there are at least
2n impossible monomials in the ANFs of right bits of F.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
Theorem (Impossible Monomials in Feistel Networks)
Let F be a 2n-bit Feistel Network with r rounds and round
functions of degree at most d. If dr−2 < n, then there are at least
2n impossible monomials in the ANFs of right bits of F.
Recovery attack when dr−3 < n. Note that the bound is not
tight, the previously described attack on 5 rounds does not
satisfy this condition.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
Theorem (Impossible Monomials in Feistel Networks)
Let F be a 2n-bit Feistel Network with r rounds and round
functions of degree at most d. If dr−2 < n, then there are at least
2n impossible monomials in the ANFs of right bits of F.
Recovery attack when dr−3 < n. Note that the bound is not
tight, the previously described attack on 5 rounds does not
satisfy this condition.
Moreover, with low degrees there are less unknowns and we
need less impossible monomials.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
24 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
Division Property allows to find cubes of dimension 2n − 1 (or
less) over which a given Feistel Network sums to zero.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
Division Property allows to find cubes of dimension 2n − 1 (or
less) over which a given Feistel Network sums to zero.
Such cubes correspond to the absent ANF coefficients of
degree 2n − 1 (or less) which correspond to zero items in
HDIM.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
Division Property allows to find cubes of dimension 2n − 1 (or
less) over which a given Feistel Network sums to zero.
Such cubes correspond to the absent ANF coefficients of
degree 2n − 1 (or less) which correspond to zero items in
HDIM.
The results for concrete Feistel Networks obtained by Todo are
very similar to ours.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
26 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Conclusions
HDIM
LAT ANF
Distinguishing
Feistel Networks
Recovering
Whitening
Linear Layers
Impossible
Monomials
Attack
27 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Conclusions
HDIM
LAT ANF
Distinguishing
Feistel Networks
Recovering
Whitening
Linear Layers
Impossible
Monomials
Attack
Thank you!
27 / 27

Contenu connexe

Tendances

Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...Ealwan Lee
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithmijsrd.com
 
C programming session 01
C programming session 01C programming session 01
C programming session 01AjayBahoriya
 
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...IRJET Journal
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zonekalaiselvanresearch
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierIJERA Editor
 
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...Alexander Decker
 
Hufman coding basic
Hufman coding basicHufman coding basic
Hufman coding basicradthees
 
Graphical Model Selection for Big Data
Graphical Model Selection for Big DataGraphical Model Selection for Big Data
Graphical Model Selection for Big DataAlexander Jung
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoderijsrd.com
 
Graph Kernels for Chemical Informatics
Graph Kernels for Chemical InformaticsGraph Kernels for Chemical Informatics
Graph Kernels for Chemical InformaticsMukund Raj
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd Iaetsd
 
Transform coding
Transform codingTransform coding
Transform codingNancy K
 

Tendances (20)

Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
 
Domain adaptation
Domain adaptationDomain adaptation
Domain adaptation
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
 
C programming session 01
C programming session 01C programming session 01
C programming session 01
 
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zone
 
Ir2415241528
Ir2415241528Ir2415241528
Ir2415241528
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic Multiplier
 
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
 
Hufman coding basic
Hufman coding basicHufman coding basic
Hufman coding basic
 
Graphical Model Selection for Big Data
Graphical Model Selection for Big DataGraphical Model Selection for Big Data
Graphical Model Selection for Big Data
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
 
Image compression models
Image compression modelsImage compression models
Image compression models
 
Assessment and linear programming under fuzzy conditions
Assessment and linear programming under fuzzy conditionsAssessment and linear programming under fuzzy conditions
Assessment and linear programming under fuzzy conditions
 
Graph Kernels for Chemical Informatics
Graph Kernels for Chemical InformaticsGraph Kernels for Chemical Informatics
Graph Kernels for Chemical Informatics
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
 
Transform coding
Transform codingTransform coding
Transform coding
 
20120140506008 2
20120140506008 220120140506008 2
20120140506008 2
 
Uic Montone Thesis
Uic Montone ThesisUic Montone Thesis
Uic Montone Thesis
 
UIC Thesis Montone
UIC Thesis MontoneUIC Thesis Montone
UIC Thesis Montone
 

En vedette

引導討論:Facilitation
引導討論:Facilitation引導討論:Facilitation
引導討論:FacilitationAudrey Tang
 
Deepak bhalla cv word format
Deepak bhalla cv word formatDeepak bhalla cv word format
Deepak bhalla cv word formatDeepak Bhalla
 
CyberLab CCEH Session - 17 Buffer Overflow
CyberLab CCEH Session - 17 Buffer OverflowCyberLab CCEH Session - 17 Buffer Overflow
CyberLab CCEH Session - 17 Buffer OverflowCyberLab
 
Formats i composicions
Formats i composicionsFormats i composicions
Formats i composicionsmartivmontoya
 
薏苡仁粉
薏苡仁粉薏苡仁粉
薏苡仁粉mikejiang
 
开化龙顶
开化龙顶开化龙顶
开化龙顶mikejiang
 
como insertar un power point
como insertar un power pointcomo insertar un power point
como insertar un power pointsdfbjkgfrfbjk
 
NBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceNBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceAlexandre Moneger
 
MIT 教我的七堂課
MIT 教我的七堂課MIT 教我的七堂課
MIT 教我的七堂課Xi-Zhe Lin
 
CyberLab CCEH Session - 8 Sniffers
CyberLab CCEH Session - 8 SniffersCyberLab CCEH Session - 8 Sniffers
CyberLab CCEH Session - 8 SniffersCyberLab
 
案例示範:UberX、Airbnb
案例示範:UberX、Airbnb案例示範:UberX、Airbnb
案例示範:UberX、AirbnbAudrey Tang
 
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話niceruru
 
Web cam sensing using sdk tool
Web cam sensing using sdk tool Web cam sensing using sdk tool
Web cam sensing using sdk tool eSAT Journals
 
20161222 網路工具教學與應用
20161222 網路工具教學與應用20161222 網路工具教學與應用
20161222 網路工具教學與應用小四 曾
 
山海國土議題盤點【原住民土地治理】林嘉男
山海國土議題盤點【原住民土地治理】林嘉男山海國土議題盤點【原住民土地治理】林嘉男
山海國土議題盤點【原住民土地治理】林嘉男cettw
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...Alexandre Moneger
 

En vedette (20)

引導討論:Facilitation
引導討論:Facilitation引導討論:Facilitation
引導討論:Facilitation
 
Deepak bhalla cv word format
Deepak bhalla cv word formatDeepak bhalla cv word format
Deepak bhalla cv word format
 
CyberLab CCEH Session - 17 Buffer Overflow
CyberLab CCEH Session - 17 Buffer OverflowCyberLab CCEH Session - 17 Buffer Overflow
CyberLab CCEH Session - 17 Buffer Overflow
 
Formats i composicions
Formats i composicionsFormats i composicions
Formats i composicions
 
薏苡仁粉
薏苡仁粉薏苡仁粉
薏苡仁粉
 
开化龙顶
开化龙顶开化龙顶
开化龙顶
 
como insertar un power point
como insertar un power pointcomo insertar un power point
como insertar un power point
 
NBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceNBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then ice
 
MIT 教我的七堂課
MIT 教我的七堂課MIT 教我的七堂課
MIT 教我的七堂課
 
CyberLab CCEH Session - 8 Sniffers
CyberLab CCEH Session - 8 SniffersCyberLab CCEH Session - 8 Sniffers
CyberLab CCEH Session - 8 Sniffers
 
Huca marketing online
Huca marketing onlineHuca marketing online
Huca marketing online
 
linkdin
linkdinlinkdin
linkdin
 
D2-4 2012里山倡議研討會-貢寮1011116
D2-4 2012里山倡議研討會-貢寮1011116D2-4 2012里山倡議研討會-貢寮1011116
D2-4 2012里山倡議研討會-貢寮1011116
 
Exploits & Mitigations - Memory Corruption Techniques
Exploits & Mitigations - Memory Corruption TechniquesExploits & Mitigations - Memory Corruption Techniques
Exploits & Mitigations - Memory Corruption Techniques
 
案例示範:UberX、Airbnb
案例示範:UberX、Airbnb案例示範:UberX、Airbnb
案例示範:UberX、Airbnb
 
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
 
Web cam sensing using sdk tool
Web cam sensing using sdk tool Web cam sensing using sdk tool
Web cam sensing using sdk tool
 
20161222 網路工具教學與應用
20161222 網路工具教學與應用20161222 網路工具教學與應用
20161222 網路工具教學與應用
 
山海國土議題盤點【原住民土地治理】林嘉男
山海國土議題盤點【原住民土地治理】林嘉男山海國土議題盤點【原住民土地治理】林嘉男
山海國土議題盤點【原住民土地治理】林嘉男
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 

Similaire à Algebraic Insights into the Secret Feistel Network

AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdfAdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdfPo-Chuan Chen
 
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...Databricks
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveIJORCS
 
hankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijchankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijcVasilis Tsoulkas
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzerbutest
 
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksRelay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksMd Mahbubur Rahman
 
Addressing Scenario
Addressing ScenarioAddressing Scenario
Addressing ScenarioTara Hardin
 
Parallel External Memory Algorithms Applied to Generalized Linear Models
Parallel External Memory Algorithms Applied to Generalized Linear ModelsParallel External Memory Algorithms Applied to Generalized Linear Models
Parallel External Memory Algorithms Applied to Generalized Linear ModelsRevolution Analytics
 
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdfptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdfjorgeulises3
 
Manifold learning with application to object recognition
Manifold learning with application to object recognitionManifold learning with application to object recognition
Manifold learning with application to object recognitionzukun
 
Moim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionMoim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionIAEME Publication
 
Knoxville aug02-full
Knoxville aug02-fullKnoxville aug02-full
Knoxville aug02-fulldouglaslyon
 
Directive-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingDirective-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingRuymán Reyes
 

Similaire à Algebraic Insights into the Secret Feistel Network (20)

Cr24608612
Cr24608612Cr24608612
Cr24608612
 
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdfAdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
 
Computer Network Assignment Help
Computer Network Assignment HelpComputer Network Assignment Help
Computer Network Assignment Help
 
Computer Science Assignment Help
Computer Science Assignment HelpComputer Science Assignment Help
Computer Science Assignment Help
 
Lecture 11 compiler ii
Lecture 11 compiler iiLecture 11 compiler ii
Lecture 11 compiler ii
 
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
 
hankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijchankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijc
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzer
 
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksRelay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
 
Oops recap
Oops recapOops recap
Oops recap
 
Addressing Scenario
Addressing ScenarioAddressing Scenario
Addressing Scenario
 
Parallel External Memory Algorithms Applied to Generalized Linear Models
Parallel External Memory Algorithms Applied to Generalized Linear ModelsParallel External Memory Algorithms Applied to Generalized Linear Models
Parallel External Memory Algorithms Applied to Generalized Linear Models
 
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdfptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
 
Manifold learning with application to object recognition
Manifold learning with application to object recognitionManifold learning with application to object recognition
Manifold learning with application to object recognition
 
Proposal for adding Named Dimensions to HDF5 Arrays
Proposal for adding Named Dimensions to HDF5 ArraysProposal for adding Named Dimensions to HDF5 Arrays
Proposal for adding Named Dimensions to HDF5 Arrays
 
Moim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionMoim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash function
 
Knoxville aug02-full
Knoxville aug02-fullKnoxville aug02-full
Knoxville aug02-full
 
Directive-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous ComputingDirective-based approach to Heterogeneous Computing
Directive-based approach to Heterogeneous Computing
 

Dernier

Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》rnrncn29
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPirithiRaju
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPirithiRaju
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringPrajakta Shinde
 
PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalMAESTRELLAMesa2
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuinethapagita
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayupadhyaymani499
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensorsonawaneprad
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxBerniceCayabyab1
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPirithiRaju
 
trihybrid cross , test cross chi squares
trihybrid cross , test cross chi squarestrihybrid cross , test cross chi squares
trihybrid cross , test cross chi squaresusmanzain586
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)Columbia Weather Systems
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxJorenAcuavera1
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxNandakishor Bhaurao Deshmukh
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...lizamodels9
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxuniversity
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentationtahreemzahra82
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxpriyankatabhane
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPirithiRaju
 

Dernier (20)

Pests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdfPests of safflower_Binomics_Identification_Dr.UPR.pdf
Pests of safflower_Binomics_Identification_Dr.UPR.pdf
 
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》《Queensland毕业文凭-昆士兰大学毕业证成绩单》
《Queensland毕业文凭-昆士兰大学毕业证成绩单》
 
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdfPests of Blackgram, greengram, cowpea_Dr.UPR.pdf
Pests of Blackgram, greengram, cowpea_Dr.UPR.pdf
 
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdfPests of soyabean_Binomics_IdentificationDr.UPR.pdf
Pests of soyabean_Binomics_IdentificationDr.UPR.pdf
 
Microteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical EngineeringMicroteaching on terms used in filtration .Pharmaceutical Engineering
Microteaching on terms used in filtration .Pharmaceutical Engineering
 
PROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and VerticalPROJECTILE MOTION-Horizontal and Vertical
PROJECTILE MOTION-Horizontal and Vertical
 
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 GenuineCall Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
Call Girls in Majnu Ka Tilla Delhi 🔝9711014705🔝 Genuine
 
Citronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyayCitronella presentation SlideShare mani upadhyay
Citronella presentation SlideShare mani upadhyay
 
Environmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial BiosensorEnvironmental Biotechnology Topic:- Microbial Biosensor
Environmental Biotechnology Topic:- Microbial Biosensor
 
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptxGenBio2 - Lesson 1 - Introduction to Genetics.pptx
GenBio2 - Lesson 1 - Introduction to Genetics.pptx
 
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdfPests of jatropha_Bionomics_identification_Dr.UPR.pdf
Pests of jatropha_Bionomics_identification_Dr.UPR.pdf
 
trihybrid cross , test cross chi squares
trihybrid cross , test cross chi squarestrihybrid cross , test cross chi squares
trihybrid cross , test cross chi squares
 
User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)User Guide: Orion™ Weather Station (Columbia Weather Systems)
User Guide: Orion™ Weather Station (Columbia Weather Systems)
 
Topic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptxTopic 9- General Principles of International Law.pptx
Topic 9- General Principles of International Law.pptx
 
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptxTHE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
THE ROLE OF PHARMACOGNOSY IN TRADITIONAL AND MODERN SYSTEM OF MEDICINE.pptx
 
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
Best Call Girls In Sector 29 Gurgaon❤️8860477959 EscorTs Service In 24/7 Delh...
 
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptxThermodynamics ,types of system,formulae ,gibbs free energy .pptx
Thermodynamics ,types of system,formulae ,gibbs free energy .pptx
 
Harmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms PresentationHarmful and Useful Microorganisms Presentation
Harmful and Useful Microorganisms Presentation
 
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptxMicrophone- characteristics,carbon microphone, dynamic microphone.pptx
Microphone- characteristics,carbon microphone, dynamic microphone.pptx
 
Pests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdfPests of castor_Binomics_Identification_Dr.UPR.pdf
Pests of castor_Binomics_Identification_Dr.UPR.pdf
 

Algebraic Insights into the Secret Feistel Network

  • 1. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Algebraic Insights into the Secret Feistel Network Léo Perrin1,2 Aleksei Udovenko1,2 1University of Luxembourg, 2SnT March 22, 2016 1 / 27
  • 2. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Outline HDIM LAT ANF Distinguishing Feistel Networks Recovering Whitening Linear Layers Impossible Monomials Attack 2 / 27
  • 3. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 3 / 27
  • 4. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Linear Approximation Table (LAT) Definition (LAT, Fourier Transform, Walsh Spectrum) The Linear Approximation Table of f : {0, 1}n → {0, 1}m is a 2n × 2m matrix L where L[a, b] = #{x ∈ Fn 2, a · x = b · f (x)} − 2n−1 = − 1 2 x∈Fn 2 (−1)a·x⊕b·f (x) . 4 / 27
  • 5. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Jackson Pollock Representation of LAT [Biryukov, Perrin CRYPTO2015]: graphical representation of LAT to reverse-engineer S-Boxes. S-Box F of Skipjack 5 / 27
  • 6. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Jackson Pollock Representation of LAT [Biryukov, Perrin CRYPTO2015]: graphical representation of LAT to reverse-engineer S-Boxes. S-Box F of Skipjack 4-round Feistel Network with bijective functions 5 / 27
  • 7. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 6 / 27
  • 8. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 4-round Feistel Network with bijective functions 6 / 27
  • 9. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 4-round Feistel Network with bijective functions 5-round Feistel Network with bijective functions 6 / 27
  • 10. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 6-round Feistel Network with bijective functions 6 / 27
  • 11. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 6-round Feistel Network with bijective functions Random permutation 6 / 27
  • 12. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. 7 / 27
  • 13. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. Explanation? It is a bilinear form! 7 / 27
  • 14. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. Explanation? It is a bilinear form! The following is true: L[a, b] 2 ≡ x∈Fn 2 b · F(x) a · x (mod 2). (1) 7 / 27
  • 15. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. Explanation? It is a bilinear form! The following is true: L[a, b] 2 ≡ x∈Fn 2 b · F(x) a · x (mod 2). (1) ⇒ express L[a, b]/2 as a vector-matrix-vector product: L[a, b] 2 ≡ bT × ˆH(F) × a (mod 2), (2) where ˆH(F) is an n × n matrix over F2, such that ˆH(F)[i, j] = x∈Fn 2 ei · F(x) ej · x . (3) 7 / 27
  • 16. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Another meaning of LAT modulo 4 Algebraic Normal Form (ANF) Recall that any Boolean function f mapping n bits to 1 can be represented in a unique way as: f (x) = u∈Fn 2 auxu = u∈Fn 2 au i∈[0,n−1] xui i . 8 / 27
  • 17. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Another meaning of LAT modulo 4 Algebraic Normal Form (ANF) Recall that any Boolean function f mapping n bits to 1 can be represented in a unique way as: f (x) = u∈Fn 2 auxu = u∈Fn 2 au i∈[0,n−1] xui i . Lemma (Another meaning of LAT modulo 4) ˆH(F)[i, j] = 1 if and only if the ANF of ith bit of F contains the monomial k=j xk (which has degree n − 1). 8 / 27
  • 18. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). 9 / 27
  • 19. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. 9 / 27
  • 20. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. For one row/column we need 2n−1 data and 2n−1 time. 9 / 27
  • 21. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. For one row/column we need 2n−1 data and 2n−1 time. For whole ˆH(F) we need full codebook and n2n−1 time. 9 / 27
  • 22. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. For one row/column we need 2n−1 data and 2n−1 time. For whole ˆH(F) we need full codebook and n2n−1 time. Neglible memory complexity - n bits to store the sum. 9 / 27
  • 23. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Properties of HDIM Theorem (Linear transformations and HDIM) Let µ, η be linear n-bit mappings, F be an n-bit permutation and let G = η ◦ F ◦ µ. Then it holds that ˆH(G) = η × ˆH(F) × (µt )−1 . 10 / 27
  • 24. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Properties of HDIM Theorem (Linear transformations and HDIM) Let µ, η be linear n-bit mappings, F be an n-bit permutation and let G = η ◦ F ◦ µ. Then it holds that ˆH(G) = η × ˆH(F) × (µt )−1 . Linear transformations applied to a permutation modify its HDIM in a linear way. We will use this Theorem to recover whitening linear layers. 10 / 27
  • 25. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 11 / 27
  • 26. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 patterns Recall the LAT modulo 4 patterns that we have spotted: 4-round Feistel Network with bijective functions 5-round Feistel Network with bijective functions 12 / 27
  • 27. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 patterns Recall the LAT modulo 4 patterns that we have spotted: Can be nicely rephrased in terms of HDIM. 4-round Feistel Network with bijective functions 5-round Feistel Network with bijective functions 12 / 27
  • 28. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions HDIM Patterns in Feistel Networks Theorem Let Fr be r-round Feistel Network with bijective functions. Then ˆH(F4 ) =       0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 ? ? ? 0 0 0 ? ? ?       ˆH(F5 ) =       0 0 0 ? ? ? 0 0 0 ? ? ? 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?       Example is given for n = 3 (6-bit Feistel Network). 13 / 27
  • 29. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. 14 / 27
  • 30. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. 14 / 27
  • 31. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. 14 / 27
  • 32. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. For non-bijective round functions, the results hold for one round less. 14 / 27
  • 33. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. For non-bijective round functions, the results hold for one round less. Distinguisher for Feistel Networks: one HDIM row or column is enough. 14 / 27
  • 34. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. For non-bijective round functions, the results hold for one round less. Distinguisher for Feistel Networks: one HDIM row or column is enough. Weak compared to known distinguishers for up to 5 rounds, but can attack more rounds when the degree is low. 14 / 27
  • 35. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x 15 / 27
  • 36. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x Change sum variables: = α||γ∈F2n 2 ei · g(α, γ) ej · h(α, γ) . f r/2 −1 α γ f r/2 β f r/2 +1 hg 15 / 27
  • 37. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x Change sum variables: = α||γ∈F2n 2 ei · g(α, γ) ej · h(α, γ) . Calculate the degrees of h and g straightforwardly and sum them. f r/2 −1 α γ f r/2 β f r/2 +1 hg 15 / 27
  • 38. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x Change sum variables: = α||γ∈F2n 2 ei · g(α, γ) ej · h(α, γ) . Calculate the degrees of h and g straightforwardly and sum them. For bijective round functions, we can get one round more by summing over α and β. f r/2 −1 α γ f r/2 β f r/2 +1 hg 15 / 27
  • 39. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Feistel Network with Whitening Linear Layers The AFrA structure: Feistel Network with r rounds and n-bit branches. fi : secret and independent random functions. whitened with secret affine layers Ain, Aout. n bits n bits Ain f0 f1 fr−2 fr−1 Aout 16 / 27
  • 40. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Feistel Network with Whitening Linear Layers The AFrA structure: Feistel Network with r rounds and n-bit branches. fi : secret and independent random functions. whitened with secret affine layers Ain, Aout. Cryptanalysis goals: distinguish from random permutation; recover the secret components. n bits n bits Ain f0 f1 fr−2 fr−1 Aout 16 / 27
  • 41. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. 17 / 27
  • 42. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. Then by properties of HDIM we have: η−1 × ˆH(G) × µt = 0 0 0 ? . 17 / 27
  • 43. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. Then by properties of HDIM we have: η−1 × ˆH(G) × µt = 0 0 0 ? . Parts of η and µ merge into the Feistel structure, so we have less unknowns and we can solve the system. 17 / 27
  • 44. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. Then by properties of HDIM we have: η−1 × ˆH(G) × µt = 0 0 0 ? . Parts of η and µ merge into the Feistel structure, so we have less unknowns and we can solve the system. Distinguisher for AFrA and Partial recovery of linear layers. Complexity is dominated by computing HDIM - n22n−1. 17 / 27
  • 45. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). 18 / 27
  • 46. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). One of such cases is when the linear layers are inverses of each other (A−1FrA). 18 / 27
  • 47. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). One of such cases is when the linear layers are inverses of each other (A−1FrA). Another possible case is one-sided whitening: FrA. 18 / 27
  • 48. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). One of such cases is when the linear layers are inverses of each other (A−1FrA). Another possible case is one-sided whitening: FrA. Partial recovery of linear layers for A−1FrA or FrA. Complexity is dominated by computing HDIM - n22n−1. 18 / 27
  • 49. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 19 / 27
  • 50. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). 20 / 27
  • 51. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). This is an extreme case, we tried to cover more rounds, but we recovered only surrounding linear layers. 20 / 27
  • 52. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). This is an extreme case, we tried to cover more rounds, but we recovered only surrounding linear layers. Consider the case when ˆH(F) = 0 0 0 ? . There are 3n2 impossible terms of degree n − 1. But there are more impossible terms of lower degree. 20 / 27
  • 53. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). This is an extreme case, we tried to cover more rounds, but we recovered only surrounding linear layers. Consider the case when ˆH(F) = 0 0 0 ? . There are 3n2 impossible terms of degree n − 1. But there are more impossible terms of lower degree. The predictable absence of such terms may be used to recover a secret round function. 20 / 27
  • 54. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (1/2) Consider a 5-round Feistel Network F with bijective round functions. Let f be the last round function. au = 0 au = 1/0 au = 1/0 F5 F2 F1 F0 f0 f1 f2 21 / 27
  • 55. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (1/2) Consider a 5-round Feistel Network F with bijective round functions. Let f be the last round function. We can prove that there are more than 2n monomials which can’t occur in the ANFs on right branch of the 4-round FN. au = 0 au = 1/0 au = 1/0 F5 F2 F1 F0 f0 f1 f2 21 / 27
  • 56. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (1/2) Consider a 5-round Feistel Network F with bijective round functions. Let f be the last round function. We can prove that there are more than 2n monomials which can’t occur in the ANFs on right branch of the 4-round FN. This gives us information about the last round function f . au = 0 au = 1/0 au = 1/0 F5 F2 F1 F0 f0 f1 f2 21 / 27
  • 57. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (2/2) We obtain a linear system with 2n unknowns (ANF coefficients of fi ) and more than 2n equations. 22 / 27
  • 58. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (2/2) We obtain a linear system with 2n unknowns (ANF coefficients of fi ) and more than 2n equations. By solving the system we recover the secret round function f (up to a XOR constant). 22 / 27
  • 59. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (2/2) We obtain a linear system with 2n unknowns (ANF coefficients of fi ) and more than 2n equations. By solving the system we recover the secret round function f (up to a XOR constant). Complexity is dominated by generating the system and is O(23n). 22 / 27
  • 60. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. 23 / 27
  • 61. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. Theorem (Impossible Monomials in Feistel Networks) Let F be a 2n-bit Feistel Network with r rounds and round functions of degree at most d. If dr−2 < n, then there are at least 2n impossible monomials in the ANFs of right bits of F. 23 / 27
  • 62. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. Theorem (Impossible Monomials in Feistel Networks) Let F be a 2n-bit Feistel Network with r rounds and round functions of degree at most d. If dr−2 < n, then there are at least 2n impossible monomials in the ANFs of right bits of F. Recovery attack when dr−3 < n. Note that the bound is not tight, the previously described attack on 5 rounds does not satisfy this condition. 23 / 27
  • 63. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. Theorem (Impossible Monomials in Feistel Networks) Let F be a 2n-bit Feistel Network with r rounds and round functions of degree at most d. If dr−2 < n, then there are at least 2n impossible monomials in the ANFs of right bits of F. Recovery attack when dr−3 < n. Note that the bound is not tight, the previously described attack on 5 rounds does not satisfy this condition. Moreover, with low degrees there are less unknowns and we need less impossible monomials. 23 / 27
  • 64. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 24 / 27
  • 65. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. 25 / 27
  • 66. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. Division Property allows to find cubes of dimension 2n − 1 (or less) over which a given Feistel Network sums to zero. 25 / 27
  • 67. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. Division Property allows to find cubes of dimension 2n − 1 (or less) over which a given Feistel Network sums to zero. Such cubes correspond to the absent ANF coefficients of degree 2n − 1 (or less) which correspond to zero items in HDIM. 25 / 27
  • 68. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. Division Property allows to find cubes of dimension 2n − 1 (or less) over which a given Feistel Network sums to zero. Such cubes correspond to the absent ANF coefficients of degree 2n − 1 (or less) which correspond to zero items in HDIM. The results for concrete Feistel Networks obtained by Todo are very similar to ours. 25 / 27
  • 69. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 26 / 27
  • 70. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Conclusions HDIM LAT ANF Distinguishing Feistel Networks Recovering Whitening Linear Layers Impossible Monomials Attack 27 / 27
  • 71. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Conclusions HDIM LAT ANF Distinguishing Feistel Networks Recovering Whitening Linear Layers Impossible Monomials Attack Thank you! 27 / 27