Revisiting key schedule's diffusion in relation with round function's diffusion
نویسندگان
چکیده
We study the weakness of key schedules from an observation: many existing attacks use the fact that the key schedules poorly distribute key bits in the diffusion path of round function. This reminds us of the importance of the diffusion’s relation between key schedule and round function. We present new cryptanalysis results by exploring such diffusion relation and propose a new criterion for necessary key schedule diffusion. We discuss potential attacks and summarize the causes for key schedules without satisfying this criterion. One major cause is that overlapping between the diffusion of key schedule and round function leads to information leakage of key bits. Finally, a measure to estimate our criterion for recursive key schedules is presented. Today designing key schedule still lacks practical and necessary principles. For a practical key schedule with limited diffusion, our work adds more insight to its requirements and helps to maximize the security level.
منابع مشابه
Statistical Testing of the Initializing Stage of a Block Cipher, as Part of the Security Assessment
Block ciphers are used on a large scale in cryptographic applications. The process of testing the security provided by the block algorithms is very complex and expensive. The paper focuses on the algorithm which generates the round keys, paying attention to the dependence relation between the master key and the round keys. Approaching some elements belonging to data testing stage, we analyze th...
متن کاملChanging probabilities of differentials and linear sums via isomorphisms of ciphers
Ciphers y = C(x, k) and = (, ) are isomorphic if there exists invertible computable in both directions map y ↔ , x ↔ , k ↔ . Cipher is vulnerable if and only if isomorphic cipher is vulnerable. Instead of computing the key of a cipher it is sufficient to find suitable isomorphic cipher and compute its key. If φ is arbitrary substitution and T is round substitution, its conjugate = φTφ...
متن کاملA New Chaotic Image Encryption Using Parametric Switching Based Permutation and Diffusion
In this paper, a new loss-less symmetric image encryption using a permutation and diffusion structure is proposed. A new key generation process generates secondary keys that act as control parameter for permutation order and diffusion bit generator. The Image pixels are scrambled in bit level. Permutation order is generated using the parametric switching type that permutes the pixel in bit wise...
متن کاملCalculation Technology Diffusion in Upstream and It’s Effect on the Cost of Oil and Gas Production in Iran
In this study, the impact of technological improvement and depletion in upstream sector on the average cost of oil and gas production in Iran is studied in 1967-2017. For this purpose, global technology diffusion trend is calculated, so five variables that have had the most effect on global upstream is considered. Using acquired trend for technology and taking other related determinants into ac...
متن کاملTransposition of AES Key Schedule
In this paper, we point out a new weakness of the AES key schedule by revisiting an old observation exploited by many known attacks. We also discover a major cause for this weakness is that the column-by-column word-wise property in the key schedule matches nicely with the MixColumns operation in the cipher’s diffusion layer. Then we propose a new key schedule by minor modification to increase ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012