Differential Entropy Analysis of the IDEA Cipher

نویسندگان

  • Alex Biryukov
  • Jorge Nakahara
  • Hamdi Murat Yıldırım
چکیده

This paper describes a new cryptanalytic technique that combines differential cryptanalysis with Shannon entropy. We call it differential entropy (DE). The objective is to exploit the non-uniform distribution of output differences from a given mapping as a distinguishing tool in cryptanalysis. Our preferred target is the IDEA block cipher [5] since we detected significantly low entropy at the output of its modular multiplication operation in GF(216 + 1) with 0 ≡ 216 ( ). We further extended this entropy analysis to larger components. We present key-recovery attacks on up to 2.5-round IDEA in the single key-model and without weak-key assumptions. Although there are attacks on the full IDEA cipher [4, 1], our approach is novel and demonstrates new properties of modular multiplication in IDEA. The motivation for this paper came from a simple observation: in conventional differential cryptanalysis (DC) [2] an adversary chooses pairs of plaintexts (P, P ∗) with a carefully chosen difference ∆P = P ⊕ P ∗ that lead to a ciphertext pair (C,C∗) with a predictable target difference ∆C = C ⊕ C∗, with high probability p (compared to a random permutation). Due to the probabilistic nature of the attack, only a fraction, say 1/p, of the chosen data is expected to satisfy ∆C. Consequently, most plaintext pairs are discarded. Thus, if one does not focus only on the highest probability differential trail but rather study the probability distribution of output differences, then one would not have to discard any text pair. To measure the shape of a probability distribution we use Shannon entropy. We are particularly interested in low entropy, which means that the probability distribution is biased towards a few output differences, while the remaining output differences hold with negligible probability. In contrast, a random permutation (over the same domain and range) should have a rather flat probability distribution, which translates into high entropy values. For our attacks, we exploit whenever possible the 16-bit wordwise difference1 8000x, because it bypasses and ⊕ for free. For instance, Subscript x denotes hexadecimal notation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis: A Serious Threat to FPGA Security

Differential Power Analysis (DPA) implies measuring the supply current of a cipher-circuit in an attempt to uncover part of a cipher key. Cryptographic security gets compromised if the current waveforms obtained correlate with those from a hypothetical power model of the circuit. As FPGAs are becoming integral parts of embedded systems and increasingly popular for cryptographic applications and...

متن کامل

Novel Impossible Differential Cryptanalysis of Zorro Block Cipher

Impossible difference attack is a powerful tool for evaluating the security of block ciphers based on finding a differential characteristic with the probability of exactly zero. The linear layer diffusion rate of a cipher plays a fundamental role in the security of the algorithm against the impossible difference attack. In this paper, we show an efficient method, which is independent of the qua...

متن کامل

An Image Encryption Scheme Based on Hybrid Orbit of Hyper-chaotic Systems

This paper puts forward a novel image encryption scheme based on ordinary differential equation system. Firstly, a hyper-chaotic differential equation system is used to generate two hyper-chaotic orbit sequences. Introducing the idea of hybrid orbit, two orbits are mixed to generate a hybrid hyper-chaotic sequence which is used to be the initial chaotic key stream. Secondly, the final encryptio...

متن کامل

Total break of Zorro using linear and differential attacks

An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...

متن کامل

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version)

Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differ- ential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both vers...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012