An Interactive Tool for Learning Linear and Differential Cryptanalysis of SPNs

نویسنده

  • Mike Carpenter
چکیده

Introduction Linear and differential cryptanalysis have existed for years as a set of tools to establish a metric of resiliency for cryptographic ciphers utilizing the substitution-permutation network (SPN) design, a category of cryptographic cipher in which many popular ciphers, such as the Advanced Encryption Standard (AES). This is typically an involved process with many manual steps, often written specifically for the SPN being analyzed, with minimal reusable or generalized code. As of this writing, there do not exist any tools to make the process interactive for an arbitrary SPN; the few interactive, automated tools that do exist are designed around a particular predefined cipher. The goal of this project is to create Maledict [1] , a Java application inspired and influenced by the tutorial by Howard Heys [4] , with a user interface in Swing in order to provide an interactive experience in the linear and differential cryptanalysis of arbitrary, user-designed substitution-permutation networks. As a part of the interactive process I seek to provide visualizations of various features, such as the pseudo-linear " path " followed through the network by a given bit. I also intend to report meaningful results obtained using the tool, such as linear approximation/difference distribution tables or subkey biases from experimental results. It is my intention that this project provide a foundation for an effective academic tool, which can be used by students to better understand and observe the processes of linear and differential cryptanalysis.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Design of Linear Transformations for Substitution Permutation Encryption Networks

In this paper we study the security of Substitution Permutation Encryption Networks (SPNs) with randomly selected bijective substitution boxes and a randomly selected invertible linear transformation layer. In particular, our results show that for such a 64–bit SPN using 8 8 s-boxes, the number of s-boxes involved in any 2 rounds of a linear approximation or a differential characteristic is equ...

متن کامل

Linear Cryptanalysis of Substitution-Permutation Networks

The subject of this thesis is linear cryptanalysis of substitution-permutation networks (SPNs). We focus on the rigorous form of linear cryptanalysis, which requires the concept of linear hulls. First, we consider SPNs in which the s-boxes are selected independently and uniformly from the set of all bijective n × n s-boxes. We derive an expression for the expected linear probability values of s...

متن کامل

Novel Impossible Differential Cryptanalysis of Zorro Block Cipher

Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...

متن کامل

A new method for accelerating impossible differential cryptanalysis and its application on LBlock

Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...

متن کامل

Impossible Differential Cryptanalysis on Deoxys-BC-256

Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016