Hacking of the AES with Boolean Functions
نویسندگان
چکیده
One of the major issues of cryptography is the cryptanalysis of cipher algorithms. Cryptanalysis is the study of methods for obtaining the meaning of encrypted information, without access to the secret information that is normally required. Some mechanisms for breaking codes include differential cryptanalysis, advanced statistics and brute-force. Recent works also attempt to use algebraic tools to reduce the cryptanalysis of a block cipher algorithm to the resolution of a system of quadratic equations describing the ciphering structure. In our study, we will also use algebraic tools but in a new way: by using Boolean functions and their properties. A Boolean function is a function from F 2 → F2 with n > 1, characterized by its truth table. The arguments of Boolean functions are binary words of length n. Any Boolean function can be represented, uniquely, by its algebraic normal form which is an equation which only contains additions modulo 2 – the XOR function – and multiplications modulo 2 – the AND function. Our aim is to describe the AES algorithm as a set of Boolean functions then calculate their algebraic normal forms by using the Möbius transforms. After, we use a specific representation for these equations to facilitate their analysis and particularly to try a combinatorial analysis. Through this approach we obtain a new kind of equations system. This equations system is more easily implementable and could open new ways to cryptanalysis.
منابع مشابه
ON THE FUZZY SET THEORY AND AGGREGATION FUNCTIONS: HISTORY AND SOME RECENT ADVANCES
Several fuzzy connectives, including those proposed by Lotfi Zadeh, can be seen as linear extensions of the Boolean connectives from the scale ${0,1}$ into the scale $[0,1]$. We discuss these extensions, in particular, we focus on the dualities arising from the Boolean dualities. These dualities allow to transfer the results from some particular class of extended Boolean functions, e.g., from c...
متن کاملAbout Filliol's Observations on DES, AES and Hash Functions (draft)
Recently Filiol proposed to test cryptographic algorithms by making statistics on the number of low degree terms in the boolean functions. The paper has been published on eprint on 23th of July 2002. In this paper we reproduce some of Filiol’s simulations. We did not confirm his results: our results suggest that DES, AES, and major hash functions have no significative bias and their output bits...
متن کاملNormality of Vectorial Functions
The most important building blocks of symmetric cryptographic primitives such as the DES or the AES, are vectorial Boolean functions, also called S-boxes. In this paper, we extend the definition of normality for Boolean functions into several new affine invariant properties for vectorial Boolean functions. We compute the probability of occurrence of these properties and present practical algori...
متن کاملApplications of Boolean Functions in Cryptography
Nonlinear Boolean functions are considered for a long time to construct symmetric cryptosystems. In order to resist the known attacks, many properties of Boolean functions must be utilized. In this paper we analyze some major properties according to different attacks and list some research topics. We also analyze the performance of the S-box in classical algorithms such as DES and AES, and the ...
متن کاملGene regulation: hacking the network on a sugar high.
In a recent issue of Molecular Cell, Kaplan et al. (2008) determine the input functions for 19 E. coli sugar-utilization genes by using a two-dimensional high-throughput approach. The resulting input-function map reveals that gene network regulation follows non-Boolean, and often nonmonotonic, logic.
متن کامل