+ All Categories
Home > Documents > Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe...

Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe...

Date post: 29-Dec-2019
Category:
Upload: others
View: 6 times
Download: 0 times
Share this document with a friend
59
Cryptanalysis A walk through time Arka Rai Choudhuri [email protected]
Transcript
Page 1: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

CryptanalysisA walk through time

Arka Rai Choudhuri

[email protected]

Page 2: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 3: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

How many can you identify?

Page 4: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

History(or how I will give you hope of becoming world famous and earning $70 million along the way)

Page 5: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Disclaimer

http://explosm.net/comics/3557/

Cryptography’s butt

Page 6: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

AOUSATUPRSVNEG

SOURAV SEN GUPTA

USVRAO ENS PUTGA

Transposition Cipher

Page 7: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Caesar cipher

Simple shifting of letters.

Only 13 possible keys.

Easy to break exhaustively.

Page 8: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Substitution Cipher

Earliest mention in the Kama-sutra.

26! Number of keys.

88 bits of secrecy.

Page 9: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Arab Cryptanalysis

Al-Kindi β€œOn Deciphering Cryptographic Messages”

9th century

FREQUENY ANALYSIS

Page 10: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Structure of the English language

Move to digrams

and trigrams for

better results.

Page 11: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Mary Queen of Scots (16th Century)

Assassinate

Page 12: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Solved by Elizabeth’s

cryptanalyst

Page 13: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 14: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Vigenère cipher (16th century)

Overcome the statistical weakness of ciphers?

Polyalphabetic ciphers

– A letter in the cipher can represent multiple letters from the plain text

Not broken till the 19th century.

Page 15: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

How do we figure out the length?

Page 16: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Use properties of the English language.

𝑖=0

25

𝑝𝑖2 β‰ˆ 0.065

If 𝑝𝑖 follow the letter frequencies. Else,

𝑖=0

251

262β‰ˆ 0.038

Page 17: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Increase the keyword length?

Create a keyword that is as long as the message.

Can’t use the methods discussed previously.

Are we done?

Page 18: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 19: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 20: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Failed because the key wasn’t β€œrandom” enough?

Page 21: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

What is random?

https://xkcd.com/221/

http://dilbert.com/strip/2001-10-25

Page 22: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Why does it work?

Generate all possible plaintexts from a given ciphertext.

All the keys will look random.

Page 23: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Zodiac

Late 60s in the US.

Killer sent ciphers to solve.

Page 24: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 25: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

β€œI LIKE KILLING PEOPLE BECAUSE IT IS SO MUCH FUN IT IS MORE

FUN THAN KILLING WILD GAME IN THE FORREST BECAUSE MAN

IS THE MOST DANGEROUE ANAMAL OF ALL TO KILL

SOMETHING GI..”

Page 26: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

But who is the zodiac?

340 character cipher.

Unsolved to this day.

Page 27: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 28: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Beale cipher

Page 29: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

3 cipher

- Location

- Contents

- Names of treasure owners

Page 30: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

3 cipher

- Location

- Contents

- Names of treasure owners

Buried treasure of gold, silver and jewels estimated to be worth over US$63 million as of September 2011

Page 31: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Was it an elaborate

hoax?

Why has it withstood

cryptanalysis for

centuries?

Page 32: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Enigma

Marian Rejewski

Page 33: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Differential CryptanalysisWhere your disillusionment dies.

Page 34: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

DES

L R

L R

Linear Operations

Linear Operations

Subkey

S-Box

Page 35: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

S-Box

Substitution boxes

Non-Linear

Can’t represent output bits as linear operation of input bits.

Page 36: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

S-Box

Substitution boxes

Non-Linear

Implemented by a table look-up

Page 37: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

S-Box

S1(101011)

Page 38: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

S-Box

S1(101011)

Page 39: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

S-Box

S1(101011) = 7

Page 40: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

How can we use an S-box?

Key

X

S

Page 41: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

K

X

S

00 01 10 11

0 10 01 11 00

1 00 10 01 11

Inputs are known

𝑋1 = 110 π‘Žπ‘›π‘‘ 𝑋2 = 010Outputs of S-box known

𝑆(𝑋1 βŠ• 𝐾) = 10 π‘Žπ‘›π‘‘ 𝑆(𝑋2 βŠ• 𝐾 ) = 01

Page 42: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

K

X

S

00 01 10 11

0 10 01 11 00

1 00 10 01 11

Inputs are known

𝑋1 = 110 π‘Žπ‘›π‘‘ 𝑋2 = 010Outputs of S-box known

𝑆(𝑋1 βŠ• 𝐾) = 10 π‘Žπ‘›π‘‘ 𝑆(𝑋2 βŠ• 𝐾 ) = 01

𝑋1 βŠ• 𝐾 ∈ 000,101⟹ 𝐾 ∈ {110,011}

Page 43: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

K

X

S

00 01 10 11

0 10 01 11 00

1 00 10 01 11

Inputs are known

𝑋1 = 110 π‘Žπ‘›π‘‘ 𝑋2 = 010Outputs of S-box known

𝑆(𝑋1 βŠ• 𝐾) = 10 π‘Žπ‘›π‘‘ 𝑆(𝑋2 βŠ• 𝐾 ) = 01

𝑋1 βŠ• 𝐾 ∈ 000,101⟹ 𝐾 ∈ {110,011}

𝑋2 βŠ• 𝐾 ∈ 001,110⟹ 𝐾 ∈ {011,100}K=011

Page 44: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Differences

Focus on input and output differences.

We know the inputs 𝑋1and 𝑋2. But the input to the S-boxes are 𝑋1 βŠ•πΎ and 𝑋2 βŠ• 𝐾.

XOR of the input to the S-box(𝑋1βŠ• 𝐾) βŠ• (𝑋2βŠ• 𝐾) = 𝑋1 βŠ• 𝑋2

The difference is independent of the key.

Page 45: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

TINY DES (TDES)

L R

L R

πŠπ’Š

SR

Expand

SL

8

12

126 6

44

8

8

8

𝐹 𝑅, 𝐾 = 𝑆(𝑒π‘₯π‘π‘Žπ‘›π‘‘ 𝑅 βŠ• 𝐾)

Page 46: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

π’™πŸŽπ’™πŸ“ 0 1 2 3 4 5 6 7 8 9 A B C D E F

0 C 5 0 A E 7 2 8 D 4 3 9 6 F 1 B

1 1 C 9 6 3 E B 2 F 8 4 5 D A 0 7

2 F A E 6 D 8 2 4 1 7 9 0 3 5 B C

3 0 A 3 C 8 2 1 E 9 7 F 6 B 5 D 4

𝐾1 = π‘˜2π‘˜4π‘˜5π‘˜6π‘˜7π‘˜1π‘˜10π‘˜11π‘˜12π‘˜14π‘˜15π‘˜8

𝐾2 = π‘˜4π‘˜6π‘˜7π‘˜0π‘˜1π‘˜3π‘˜11π‘˜12π‘˜13π‘˜15π‘˜8π‘˜9

𝐾3 = π‘˜6π‘˜0π‘˜1π‘˜2π‘˜3π‘˜5π‘˜12π‘˜13π‘˜14π‘˜8π‘˜9π‘˜10

𝐾4 = π‘˜0π‘˜2π‘˜3π‘˜4π‘˜5π‘˜7π‘˜13π‘˜14π‘˜15π‘˜9π‘˜10π‘˜11

Page 47: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

π’™πŸŽπ’™πŸ“ 0 1 2 3 4 5 6 7 8 9 A B C D E F

0 C 5 0 A E 7 2 8 D 4 3 9 6 F 1 B

1 1 C 9 6 3 E B 2 F 8 4 5 D A 0 7

2 F A E 6 D 8 2 4 1 7 9 0 3 5 B C

3 0 A 3 C 8 2 1 E 9 7 F 6 B 5 D 4

𝐾1 = π‘˜2π‘˜4π‘˜5π‘˜6π‘˜7π‘˜1π‘˜10π‘˜11π‘˜12π‘˜14π‘˜15π‘˜8

𝐾2 = π‘˜4π‘˜6π‘˜7π‘˜0π‘˜1π‘˜3π‘˜11π‘˜12π‘˜13π‘˜15π‘˜8π‘˜9

𝐾3 = π‘˜6π‘˜0π‘˜1π‘˜2π‘˜3π‘˜5π‘˜12π‘˜13π‘˜14π‘˜8π‘˜9π‘˜10

𝐾4 = π‘˜0π‘˜2π‘˜3π‘˜4π‘˜5π‘˜7π‘˜13π‘˜14π‘˜15π‘˜9π‘˜10π‘˜11

𝑒π‘₯π‘π‘Žπ‘›π‘‘ 𝑅 = 𝑒π‘₯π‘π‘Žπ‘›π‘‘ π‘Ÿ0π‘Ÿ1 β‹― π‘Ÿ7 = (π‘Ÿ4π‘Ÿ7π‘Ÿ2π‘Ÿ1π‘Ÿ5π‘Ÿ7π‘Ÿ0π‘Ÿ2π‘Ÿ6π‘Ÿ5π‘Ÿ0π‘Ÿ3)

Page 48: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

𝑋1 βŠ• 𝑋2 = 001000 ⟹ 𝑆𝑅 𝑋1 βŠ• 𝑆𝑅 𝑋2 = 0010 with probability ΒΎ

If 𝑋1 βŠ• 𝑋2 = 000000 ⟹ 𝑆𝑅 𝑋1 βŠ• 𝑆𝑅 𝑋2 = 0000 with probability 1

𝑃 = (𝐿0| 𝑅0 π‘Žπ‘›π‘‘ 𝑃 = ( 𝐿0|| 𝑅0)

𝑃 βŠ• 𝑃 = (𝐿0| 𝑅0 βŠ• ( 𝐿0|| 𝑅0) = 0000 0000 0000 0010 = 0π‘₯0002

Chosen plaintext attack

Page 49: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

𝑒π‘₯π‘π‘Žπ‘›π‘‘ 𝑋1 βŠ• 𝑒π‘₯π‘π‘Žπ‘›π‘‘ 𝑋1 = 𝑒π‘₯π‘π‘Žπ‘›π‘‘(𝑋1 βŠ• 𝑋2)

𝑅0 βŠ• 𝑅0 = 0000 0010 ⟹ 𝑒π‘₯π‘π‘Žπ‘›π‘‘ 𝑅0 βŠ• 𝑒π‘₯π‘π‘Žπ‘›π‘‘ 𝑅0 = 𝑒π‘₯π‘π‘Žπ‘›π‘‘ 𝑅0 βŠ• 𝑅0

= 𝑒π‘₯π‘π‘Žπ‘›π‘‘ 0000 0010= 000000 001000

𝐹 𝑅0, 𝐾 βŠ• 𝐹 𝑅0, 𝐾 = 𝑆 𝑒 𝑅0 βŠ• 𝐾 βŠ• 𝑆(𝑒 𝑅0 βŠ• 𝐾)

= 0000 0010 with probability ΒΎ

Is the β€œexpand” function linear?

Page 50: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

𝑅2 βŠ• 𝑅2 = 𝐿1 βŠ• 𝐹 𝑅1, 𝐾2 βŠ• ( 𝐿1 βŠ• 𝐹( 𝑅1, 𝐾2))

= 𝐿1 βŠ• 𝐿1 βŠ• (𝐹 𝑅1, 𝐾2 βŠ• 𝐹( 𝑅1, 𝐾2))

= 𝑅0 βŠ• 𝑅0 βŠ• (𝐹 𝑅1, 𝐾2 βŠ• 𝐹( 𝑅1, 𝐾2))

= 0000 0010 βŠ• 0000 0010= 0000 0000

With probability 3

4Γ—

3

4

Page 51: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 52: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Recovering the key

What do we have?

𝑃 βŠ• 𝑃 ⟹ (𝐿0βŠ• 𝐿0)||(𝑅0βŠ• 𝑅0)

𝐢 βŠ• 𝐢 ⟹ (𝐿4βŠ• 𝐿4)||(𝑅4 βŠ• 𝑅4)

𝑅4 = 𝐿3 βŠ• 𝐹 𝑅3, 𝐾4 π‘Žπ‘›π‘‘ 𝑅4 = 𝐿3 βŠ• 𝐹 𝑅3, 𝐾4

⟹ 𝑅4= 𝐿3 βŠ• 𝐹 𝐿4, 𝐾4 π‘Žπ‘›π‘‘ 𝑅4 = 𝐿3 βŠ• 𝐹 𝐿4, 𝐾4

⟹ 𝐿3= 𝑅4 βŠ• 𝐹 𝐿4, 𝐾4 π‘Žπ‘›π‘‘ 𝐿3 = 𝑅4 βŠ• 𝐹 𝐿4, 𝐾4

Page 53: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

If

𝐢 βŠ• 𝐢 = 0π‘₯0202,

with high probability,

𝐿3 = 𝐿3

⟹ 𝑅4 βŠ• 𝐹 𝐿4, 𝐾4 = 𝑅4 βŠ• 𝐹 𝐿4, 𝐾4

⟹ 𝑅4 βŠ• 𝑅4 = 𝐹 𝐿4, 𝐾4 βŠ• 𝐹 𝐿4, 𝐾4

Page 54: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

If

𝐢 βŠ• 𝐢 = 0π‘₯0202,

with high probability,

𝐿3 = 𝐿3

⟹ 𝑅4 βŠ• 𝐹 𝐿4, 𝐾4 = 𝑅4 βŠ• 𝐹 𝐿4, 𝐾4

⟹ 𝑅4 βŠ• 𝑅4 = 𝐹 𝐿4, 𝐾4 βŠ• 𝐹 𝐿4, 𝐾4

Let,

𝐿4 = 𝑙0𝑙1𝑙2𝑙3𝑙4𝑙5𝑙6𝑙7 π‘Žπ‘›π‘‘ 𝐿4 = 𝑙0 𝑙1 𝑙2 𝑙3 𝑙4 𝑙5 𝑙6 𝑙7

Then0000 0010 = 𝑆𝐿(𝑙4𝑙7𝑙2𝑙1𝑙5𝑙7 βŠ• π‘˜0π‘˜2π‘˜3π‘˜4π‘˜5π‘˜7)||𝑆𝑅(𝑙0𝑙2𝑙6𝑙5𝑙0𝑙3 βŠ• π‘˜13π‘˜14π‘˜15π‘˜9π‘˜10π‘˜11)

βŠ• (𝑆𝐿 𝑙4 𝑙7 𝑙2 𝑙1 𝑙5 𝑙7 βŠ• π‘˜0π‘˜2π‘˜3π‘˜4π‘˜5π‘˜7 ||𝑆𝑅 𝑙0 𝑙2 𝑙6 𝑙5 𝑙0 𝑙3 βŠ• π‘˜13π‘˜14π‘˜15π‘˜9π‘˜10π‘˜11 )

Page 55: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Algorithm

1. Pick plaintext pairs with the given difference.

2. Run the algorithm with the unknown key to get ciphertext pairs.

3. Discard ciphertext pairs that don’t satisfy output difference.

4. For all possible values of the 6 key bits identified, check if the derived condition holds.

Page 56: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall
Page 57: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

These key bits can be guessed separately from the others.

The remaining keys bits can be guessed by exhaustive search with one cipher text.

Thus an overall complexity of about 211 which is better than the exhaustive search over the entire keyspace.

Page 58: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Swept under the rug

What is a good probability?

How many plaintextpairs do we need?

Are there assumptions that we’ve taken for granted?

Page 59: Cryptanalysis - Indian Statistical Institutercbose/internship/lectures2016/rt11slides.pdfThe remaining keys bits can be guessed by exhaustive search with one cipher text. Thus an overall

Thank you


Recommended