On the Origin of Yet another Channel

نویسندگان

  • Petr Svenda
  • Václav Matyás
چکیده

Cryptanalysis of a cryptographic function like stream, block or hash function usually requires human cryptanalytical skills and labour. However, some automation is possible – e.g., by randomness testing suites like NIST/Diehard that can be applied to test statistical properties of cryptographic function outputs. Yet such testing suites are limited only to predefined statistical functions. We propose more open approach based on combination of software circuits and evolutionary algorithms to search for unwanted statistical properties like next bit predictability or random data non-distinguishability. Design of a software circuit acting as a testing function is automatically evolved by a stochastic optimization algorithm and uses the potentially unknown “other channel” leaking information during cryptographic function evaluation. We tested this approach on candidate algorithms for SHA-3 and eStream competitions with comparable (but slightly worse) results as STS NIST and Diehard tests w.r.t. the number of rounds of the inspected algorithm, where tests are still able to detect unwanted statistical properties in output. Additionally, the proposed approach is not limited only to assess randomness-like properties in function output, but can be also used for other tests like whether a function is invertible or how does its avalanche effect degrade. 1 Unguided hunt for weaknesses in cryptographic functions The main motivation for this work is to provide a tool with the crucial ability to automatically probe for unwanted properties of cryptographic functions that signalize flaws in the function design. Such properties might be (note that we intentionally target a broad range of cryptographic functions): – predictability of next output bit (stream ciphers), – corrupted avalanche effect (hash functions, stream ciphers), – distinguishability of function outputs from truly random data (block ciphers), etc. Typical cryptanalytical approach against new cryptographic function is usually based on application of various statistical testing tools (STS NIST, Diehard) as the first step and then application of established cryptanalytical procedures (algorithmic attacks, differential cryptanalysis) combined with an in-depth knowledge of the inspected function. The first step can be at least partly automated and (relatively) easy to apply, but will detect only most visible defects in function construction or apply only to limited number of algorithm rounds. The second approach usually yields much stronger insight and detected more defects, but usually requires extensive human cryptanalytical labour. Additionally, general statistical testing tools are limited to a predefined set of statistical tests. That on one hand makes the follow-up analytical work easier if the function does not pass a certain test, yet on the other hand severely limits the potential to detect other defects. We designed and tested an automated process that can be used in a similar manner as general statistical testing suites, but additionally provides the possibility to construct (again automatically) new tests. We represent “tests” as a hardware-like circuit with a software emulator to execute the circuit over given inputs and to compute outputs and evolutionary algorithms (EAs) to design the circuit layout (“wires” and “gates”). Although such an automated tool will not (at least for the moment) outperform a skilled cryptographer on particular cryptographic function, it still has two main advantages: – It can be applied automatically against multiple different cryptographic functions with no additional human labour working implementation of the inspected function is sufficient. – It may discover and use unanticipated information leakage “channels” from the function than those usually assumed by cryptographers. We implemented the tool (more details given in Section 3) and tested our idea on SHA-3/e-Stream candidate functions (details are given in Section 4). Results are very similar to those obtained from NIST and Diehard test suites w.r.t. the number of rounds of the inspected function where tests were able to find some defects. Based on experience with behaviour and significance of results, we add detailed discussion about potential extensions, expressive power of an circuit and interesting behaviour detected (Section 5). Conclusions are given in Section 6.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Rare Variation of Right Subclavian Artery Origin from Posterior Surface of Aortic Arch

Purpose: Several variations of aortic arch have been reported yet. In present study another variation of aortic arch was reported. Right subclavian artery arises from posterior surface of the distal end of the aortic arch. Case Report: we present a variation of an aorticarch in which right subclavian artery arisesfrom posterior surface of the distal end of the aortic arch and passing behind eso...

متن کامل

Yet Another Application of the Theory of ODE in the Theory of Vector Fields

In this paper we are supposed to define the θ−vector field on the n−surface S and then investigate about the existence and uniqueness of its integral curves by the Theory of Ordinary Differential Equations. Then thesubject is followed through some examples.

متن کامل

Resistance to Flow in a V-Shaped Bottom Channel

Water flow in open channels is always subject to the resistance to flow and energy dissipation. For design purposes, one of the needed variables is the hydraulic resistance coefficient. For this mean, the influence of cross-sectional shape together with secondary flow cells and lateral distribution of true boundary shear stress have not yet been fully explored. This paper surveys the number of ...

متن کامل

A Note on the Gargar Irrigation System

Sasanian’s imperial policy aimed to construct new towns, massive irrigation infrastructures, and land modification bydepopulating rural areas in order to carry out massive agriculture projects particularly in Khuzestan. Shushtar with itsancient relics presents a unique chance to investigate some of these development activities, mainly in terms of irrigation.Several chief irrigation organs have ...

متن کامل

Cosserat fluids and the continuum mechanics of turbulence: a generalized Navier–Stokes-α equation with complete boundary conditions

We here develop a continuum-mechanical formulation and generalization of the Navier– Stokes-α equation based on a general framework for fluid-dynamical theories involving gradient dependencies (Fried & Gurtin 2005). That generalization entails two additional material length scales: one of energetic origin, the other of dissipative origin. In contrast to Lagrangian averaging, our formulation del...

متن کامل

Quality Factor Enhancement of Optical Channel Drop Filters Based on Photonic Crystal Ring Resonators

In this paper, a channel drop ring resonator filter based on two dimensional photonic crystal is proposed which is suitable for all optical communication systems. The multilayer of silicon rods in the center of resonant ring enables one to adjust resonant wavelength of the ring and enhance power coupling efficiency between ring and waveguide. Refractive index and radius of multilayer rods insid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013