Abstract

At Eurocrypt 2017 the first secret-key distinguisher for 5-round AES - based on the “multiple-of-8” property - has been presented. Although it allows to distinguish a random permutation from an AES-like one, it seems rather hard to implement a key-recovery attack different than brute-force like using such a distinguisher. In this paper we introduce “Mixture Differential Cryptanalysis” on round-reduced AESlike ciphers, a way to translate the (complex) “multiple-of-8” 5-round distinguisher into a simpler and more convenient one (though, on a smaller number of rounds). Given a pair of chosen plaintexts, the idea is to construct new pairs of plaintexts by mixing the generating variables of the original pair of plaintexts. Here we theoretically prove that for 4-round AES the corresponding ciphertexts of the original pair of plaintexts lie in a particular subspace if and only if the corresponding pairs of ciphertexts of the new pairs of plaintexts have the same property. Such secret-key distinguisher - which is independent of the secret-key, of the details of the S-Box and of the MixColumns matrix (except for the branch number equal to 5) - can be used as starting point to set up new key-recovery attacks on round-reduced AES. Besides a theoretical explanation, we also provide a practical verification both of the distinguisher and of the attack.

Highlights

  • Block ciphers are certainly among the most important cryptographic primitives

  • New differential distinguishers have been proposed in the literature, precisely the polytopic cryptanalysis [Tie16] at Eurocrypt 2016 and the yoyo distinguisher on SPN constructions [RBH17] at Asiacrypt 2017, which present an important difference with respect to the previously recalled attacks

  • Instead of working on each couple1 of two pairs independently of the others as in the previous scenario, in these cases the attacker works on the relations that hold among the couples of pairs of texts

Read more

Summary

Introduction

Block ciphers are certainly among the most important cryptographic primitives. They are designed by iterating an efficiently implementable round function many times in the hope that the resulting composition behaves like a randomly drawn permutation. “Multiple-of-8” distinguisher [GRR17a] proposed at Eurocrypt 2017 by Grassi, Rechberger and Rønjom is the first 5-round secret-key distinguisher for AES that exploits a property which is independent of the secret key and of the details of the S-Box This distinguisher is based on a new structural property for up to 5 rounds of AES: by appropriate choices of a number of input pairs it is possible to make sure that the number of times that the difference of the resulting output pairs lie in a particular subspace is always a multiple of 8. As we are going to show, such new proposed technique leads to a new distinguisher and key-recovery attacks on 4- and 5-round AES (respectively) with data and computational complexity similar than other attacks in literature Such distinguisher and attack - fully practically verified - are general enough to be applied to any AES-like cipher, and they might be valuable as a reference framework. To give a concrete example, in [BEK16] authors exploit - in a new way - known properties of round-reduced AES to set up a new attack on ELmD [DN], another finalist of the on-going CAESAR competition

Related Work
Description of AES
Subspace Trails
Since for a random permutation the same number
New 4-round Secret-Key Distinguisher for AES
Mixture Differential Distinguisher for 4-round AES
Proof using the “super-Sbox” Notation
Data and Computational Cost
Practical Verification
Generic Mixture Differential Distinguishers for 4-round AES
Comparison with Other 4-round Secret-Key Distinguishers
New Key-Recovery Attack on 5-round AES
Data and Computational Costs
A How to Compute the Number of Pairs with n Equal Generating Variables
C Integral Attack on 5-round AES
Result
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call