/
1 Lect. 10 : 1 Lect. 10 :

1 Lect. 10 : - PowerPoint Presentation

tatyana-admore
tatyana-admore . @tatyana-admore
Follow
417 views
Uploaded On 2016-09-22

1 Lect. 10 : - PPT Presentation

Cryptanalysis 2 Block Cipher Attack Scenarios Attacks on encryption schemes Ciphertext only attack only ciphertexts are given Known plaintext attack plaintext ciphertext pairs are given ID: 469848

plaintext cryptanalysis ciphertext attack cryptanalysis plaintext attack ciphertext attacks differential channel key linear chosen output block input side ciphers

Share:

Link:

Embed:

Download Presentation from below link

Download Presentation The PPT/PDF document "1 Lect. 10 :" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.


Presentation Transcript

Slide1

1

Lect. 10 :

Cryptanalysis Slide2

2

Block Cipher – Attack Scenarios

Attacks on encryption schemes

Ciphertext only attack

: only ciphertexts are given

Known plaintext attack: (plaintext, ciphertext) pairs are givenChosen plaintext attack: (chosen plaintext, corresponding ciphertext) pairsAdaptively chosen plaintext attackChosen ciphertext attack: (chosen ciphertext, corresponding plaintext) pairsAdaptively chosen ciphertext attack

E

K

D

K

Plaintext

Ciphertext

Plaintext

Ciphertext

Encryption Oracle

Decryption OracleSlide3

3

Cryptanalysis of Block Ciphers

Statistical Cryptanalysis

Differential cryptanalysis (DC)

Linear Cryptanalysis (LC) Various key schedule cryptanalysis Algebraic Cryptanalysis Interpolation attacks Side Channel Cryptanalysis timing attacks differential fault analysis

differential power analysis, etc.Slide4

4

Cryptanalysis of Block Ciphers - DC

Differential Cryptanalysis

E. Biham and A. Shamir : Crypto90, Crypto92

Chosen plaintext attack, O(Breaking DES16 ~ 247) Look for correlations in Round function input and output (DES : 247) high-probability differentials, impossible differentials truncated differentials, higher-order differentialsE

Input difference

Output difference

Statistically non-uniform probability distribution: higher prob. for some fixed pattern

X

&

Y

X =

X

XY = Y 

Y

Prob.

K

* E.Biham, A. Shamir,”Differential Cryptanalysis of the Data Encryption Standard”, Springer-Verlag, 1993Slide5

5

Cryptanalysis of Block Ciphers - LC

Linear Cryptanalysis

Matsui : Eurocrypt93, Crypto94 Known Plaintext Attack, O(Breaking DES16) ~ 243 Look for correlations between key and cipher input and output linear approximation, non-linear approximation, generalized I/O sums, partitioning cryptanalysisE

Input X

Output Y

Linear equation between some bits of X, Y and K may hold with higher prob. than others

K

* M. Matsui, ”Linear Cryptanalysis Method for DES Cipher”, Proc. of Eurocrypt’93,LNCS765, pp.386-397Slide6

6

Other Attacks on Block Ciphers

Algebraic Cryptanalysis

deterministic/probabilistic interpolation attacks

Key Schedule Cryptanalysis Look for correlations between key changes & cipher input/output equivalent keys, weak or semi-weak keys related key attacks Side-Channel Cryptanalysis

timing attacks

differential fault analysis

differential power analysis, etc.Slide7

Traditional Cryptographic Model vs. Side Channel

7

Side Channel

Power Consumption / Timing / EM Emissions / Acoustic

Radiation / Temperature / Power Supply / Clock Rate, etc.

E()

D()

Key

Attacker

Ke

Kd

C

C=E(P,Ke)

P=D(C,Kd)

Insecure channel

Secure channel

P

DSlide8

Model of Attack

-Embedded security

8