Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Paper 2015/268

Improved Top-Down Techniques in Differential Cryptanalysis

Itai Dinur, Orr Dunkelman, Masha Gutman, and Adi Shamir

Abstract

The fundamental problem of differential cryptanalysis is to find the highest entries in the Difference Distribution Table (DDT) of a given mapping F over n-bit values, and in particular to find the highest diagonal entries which correspond to the best iterative characteristics of $F$. The standard bottom-up approach to this problem is to consider all the internal components of the mapping along some differential characteristic, and to multiply their transition probabilities. However, this can provide seriously distorted estimates since the various events can be dependent, and there can be a huge number of low probability characteristics contributing to the same high probability entry. In this paper we use a top-down approach which considers the given mapping as a black box, and uses only its input/output relations in order to obtain direct experimental estimates for its DDT entries which are likely to be much more accurate. In particular, we describe three new techniques which reduce the time complexity of three crucial aspects of this problem: Finding the exact values of all the diagonal entries in the DDT for small values of n, approximating all the diagonal entries which correspond to low Hamming weight differences for large values of $n$, and finding an accurate approximation for any $DDT$ entry whose large value is obtained from many small contributions. To demonstrate the potential contribution of our new techniques, we apply them to the SIMON family of block ciphers, show experimentally that most of the previously published bottom-up estimates of the probabilities of various differentials are off by a significant factor, and describe new differential properties which can cover more rounds with roughly the same probability for several of its members. In addition, we show how to use our new techniques to attack a 1-key version of the iterated Even-Mansour scheme in the related key setting, obtaining the first generic attack on 4 rounds of this well-studied construction.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
differential cryptanalysisdifference distribution tablesiterative characteristicsEven-MansourSIMON
Contact author(s)
orrd @ cs haifa ac il
History
2015-03-23: received
Short URL
https://ia.cr/2015/268
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2015/268,
      author = {Itai Dinur and Orr Dunkelman and Masha Gutman and Adi Shamir},
      title = {Improved Top-Down Techniques in Differential Cryptanalysis},
      howpublished = {Cryptology {ePrint} Archive, Paper 2015/268},
      year = {2015},
      url = {https://eprint.iacr.org/2015/268}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.