s-box decompositions and some applications
TRANSCRIPT
![Page 1: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/1.jpg)
S-Box Decompositions and some Applications
Leo Perrin
January 28, 2019, Nancy
![Page 2: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/2.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Curriculum
Currently: post-doc at SECRET in Inria Paris
PhD: University of Luxembourg (symmetric cryptography)
Masters: double degree Centrale Lyon/KTH(discrete math/theoretical CS)
1 / 44
![Page 3: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/3.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Outline
1 My Area of Research: Symmetric Cryptography
2 From Russia With Love
3 Cryptanalysis of a Theorem
4 Conclusion
1 / 44
![Page 4: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/4.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Outline
1 My Area of Research: Symmetric Cryptography
2 From Russia With Love
3 Cryptanalysis of a Theorem
4 Conclusion
1 / 44
![Page 5: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/5.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Symmetric Cryptography
We assume that a secret key has already been shared!
Definition (Block Cipher)
Input: n-bit block x
Parameter: k-bit key π
Output: n-bit block Eπ (x)
Symmetry: E and Eβ1 use thesame π
E
x
Eπ (x)
π
No Key Recovery. Given many pairs (x ,Eπ (x)), it must be impossible torecover π .
Indistinguishability. Given an n permutation P, it must be impossible tofigure out if P = Eπ for some π .
2 / 44
![Page 6: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/6.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Symmetric Cryptography
We assume that a secret key has already been shared!
Definition (Block Cipher)
Input: n-bit block x
Parameter: k-bit key π
Output: n-bit block Eπ (x)
Symmetry: E and Eβ1 use thesame π
E
x
Eπ (x)
π
No Key Recovery. Given many pairs (x ,Eπ (x)), it must be impossible torecover π .
Indistinguishability. Given an n permutation P, it must be impossible tofigure out if P = Eπ for some π .
2 / 44
![Page 7: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/7.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Symmetric Cryptography
We assume that a secret key has already been shared!
Definition (Block Cipher)
Input: n-bit block x
Parameter: k-bit key π
Output: n-bit block Eπ (x)
Symmetry: E and Eβ1 use thesame π
E
x
Eπ (x)
π
No Key Recovery. Given many pairs (x ,Eπ (x)), it must be impossible torecover π .
Indistinguishability. Given an n permutation P, it must be impossible tofigure out if P = Eπ for some π .
2 / 44
![Page 8: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/8.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Symmetric Cryptography
We assume that a secret key has already been shared!
Definition (Block Cipher)
Input: n-bit block x
Parameter: k-bit key π
Output: n-bit block Eπ (x)
Symmetry: E and Eβ1 use thesame π
E
x
Eπ (x)
π
No Key Recovery. Given many pairs (x ,Eπ (x)), it must be impossible torecover π .
Indistinguishability. Given an n permutation P, it must be impossible tofigure out if P = Eπ for some π .
2 / 44
![Page 9: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/9.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Security Arguments
T he Specification
Contains a full design rationale, meaning we can trust the cipher because:
we trust the security arguments of the designer
we have a starting point for cryptanalysis
3 / 44
![Page 10: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/10.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Security Arguments
T he Specification
Does not contain a full design rationale, meaning we cannot trust thecipher because:
we have to start cryptanalysis from scratch
what are they trying to hide?
3 / 44
![Page 11: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/11.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
To Build a Cipher
Iterated Construction
Two different sub-components for f
Linear layer (diffusion)
S-box layer (non-linearity)
4 / 44
![Page 12: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/12.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
To Build a Cipher
Iterated Construction
Two different sub-components for f
Linear layer (diffusion)
S-box layer (non-linearity)
4 / 44
![Page 13: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/13.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
The S-box
Importance of the S-box
If S is such that the maximum number of x such that
S(x) β S(x β a) = b
is low for all a = 0 and b then the cipher may be proved secure againstdifferential attacks.
5 / 44
![Page 14: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/14.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
The S-box
Importance of the S-box
If S is such that the maximum number of x such that
S(x) β S(x β a) = b
is low for all a = 0 and b then the cipher may be proved secure againstdifferential attacks.
5 / 44
![Page 15: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/15.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
S-box Design
6 / 44
![Page 16: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/16.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
S-box Design
6 / 44
![Page 17: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/17.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
S-box Design
Khazad...
iScream...
GrΓΈstl...
6 / 44
![Page 18: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/18.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
S-box Reverse-Engineering
S
7 / 44
![Page 19: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/19.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
S-box Reverse-Engineering
S?
?
?
7 / 44
![Page 20: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/20.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Why Reverse-Engineer S-boxes? (1/3)
A malicious designer can hide a structure in an S-box.
To keep an advantage in implementation (white-box crypto)...... or an advantage in cryptanalysis (backdoor).
eprint report 2015/767
8 / 44
![Page 21: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/21.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Why Reverse-Engineer S-boxes? (1/3)
A malicious designer can hide a structure in an S-box.
To keep an advantage in implementation (white-box crypto)...
... or an advantage in cryptanalysis (backdoor).
eprint report 2015/767
8 / 44
![Page 22: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/22.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Why Reverse-Engineer S-boxes? (1/3)
A malicious designer can hide a structure in an S-box.
To keep an advantage in implementation (white-box crypto)...... or an advantage in cryptanalysis (backdoor).
eprint report 2015/767
8 / 44
![Page 23: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/23.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Why Reverse-Engineer S-boxes? (2/3)
S-box based backdoors in the literature
Rijmen, V., & Preneel, B. (1997). A family of trapdoor ciphers.FSEβ97.
Paterson, K. (1999). Imprimitive Permutation Groups andTrapdoors in Iterated Block Ciphers. FSEβ99.
Blondeau, C., Civino, R., & Sala, M. (2017). Differential Attacks:Using Alternative Operations. eprint report 2017/610.
Bannier, A., & Filiol, E. (2017). Partition-based trapdoor ciphers. InPartition-Based Trapdoor Ciphers. InTechβ17.
9 / 44
![Page 24: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/24.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Why Reverse-Engineer S-boxes? (3/3)
Even without malicious intent, an unexpected structurecan be a problem.
=β We need tools to reverse-engineer S-boxes!
10 / 44
![Page 25: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/25.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
Design and Analysis
Analysis
GLUON-64 hash function (FSEβ14)
PRINCE block cipher (FSEβ15)
TWINE block cipher (FSEβ15)
Design
SPARX block cipher (Asiacryptβ16)
SPARKLE permutation, ESCH hash function,SCHWAEMM authenticated cipher (NIST submission)
Purposefully hard functions (Asiacryptβ17)
MOE block cipher (submitted to EC)
11 / 44
![Page 26: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/26.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
S-box Reverse-Engineering
When the S-box has a BC structure
Feistel network (SACβ15, FSEβ16), SPN (ToSCβ17)
When it doesnβt
Analysis of Skipjack (Cryptoβ15)
Structures in the Russian S-box(Eurocryptβ16, ToSCβ17, ToSCβ19)
Cryptanalysis of a Theorem(Cryptoβ16, IEEE Trans. Inf. Th.β17, FFAβ19, CCβ19)
12 / 44
![Page 27: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/27.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Symmetric Cryptography 101My Contributions
S-box Reverse-Engineering
When the S-box has a BC structure
Feistel network (SACβ15, FSEβ16), SPN (ToSCβ17)
When it doesnβt
Analysis of Skipjack (Cryptoβ15)
Structures in the Russian S-box(Eurocryptβ16, ToSCβ17, ToSCβ19)
Cryptanalysis of a Theorem(Cryptoβ16, IEEE Trans. Inf. Th.β17, FFAβ19, CCβ19)
12 / 44
![Page 28: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/28.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Outline
1 My Area of Research: Symmetric Cryptography
2 From Russia With Love
3 Cryptanalysis of a Theorem
4 Conclusion
12 / 44
![Page 29: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/29.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Outline
We can recover an actual decomposition using patterns in the LAT.
1 TU-decomposition: what is it and how to apply it?
2 First results on the Russian S-box
3 Its intended decomposition (I think)
13 / 44
![Page 30: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/30.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Kuznyechik/Streebog
Streebog
Type Hash function
Publication 2012
Kuznyechik
Type Block cipher
Publication 2015
Common ground
Both are standard symmetric primitives in Russia.
Both were designed by the FSB (TC26).
Both use the same 8 Γ 8 S-box, π.
14 / 44
![Page 31: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/31.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Kuznyechik/Streebog
Streebog
Type Hash function
Publication 2012
Kuznyechik
Type Block cipher
Publication 2015
Common ground
Both are standard symmetric primitives in Russia.
Both were designed by the FSB (TC26).
Both use the same 8 Γ 8 S-box, π.
14 / 44
![Page 32: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/32.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Basic Tools for Analysing S-boxes
Let S : Fn2 β Fn
2 be an S-box.
Definition (DDT)
The Difference Distribution Table of S is a matrix of size 2n Γ 2n suchthat
DDT[a, b] = #{x β Fn2 | S (x β a) β S(x) = b}.
Definition (LAT)
The Linear Approximations Table of S is a matrix of size 2n Γ 2n suchthat
LAT[a, b] =βxβFn
2
(β1)xΒ·aβS(x)Β·b .
15 / 44
![Page 33: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/33.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Basic Tools for Analysing S-boxes
Let S : Fn2 β Fn
2 be an S-box.
Definition (DDT)
The Difference Distribution Table of S is a matrix of size 2n Γ 2n suchthat
DDT[a, b] = #{x β Fn2 | S (x β a) β S(x) = b}.
Definition (LAT)
The Linear Approximations Table of S is a matrix of size 2n Γ 2n suchthat
LAT[a, b] =βxβFn
2
(β1)xΒ·aβS(x)Β·b .
15 / 44
![Page 34: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/34.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Basic Tools for Analysing S-boxes
Let S : Fn2 β Fn
2 be an S-box.
Definition (DDT)
The Difference Distribution Table of S is a matrix of size 2n Γ 2n suchthat
DDT[a, b] = #{x β Fn2 | S (x β a) β S(x) = b}.
Definition (LAT)
The Linear Approximations Table of S is a matrix of size 2n Γ 2n suchthat
LAT[a, b] =βxβFn
2
(β1)xΒ·aβS(x)Β·b .
15 / 44
![Page 35: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/35.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Example
S = [4, 2, 1, 6, 0, 5, 7, 3]
The DDT of S .
β‘β’β’β’β’β’β’β£
8 0 0 0 0 0 0 00 0 0 0 2 2 2 20 0 0 0 2 2 2 20 0 4 4 0 0 0 00 0 0 0 2 2 2 20 4 4 0 0 0 0 00 4 0 4 0 0 0 00 0 0 0 2 2 2 2
β€β₯β₯β₯β₯β₯β₯β¦
#{x β Fn2 | S (x β a)βS(x) = b}
The LAT of S .
β‘β’β’β’β’β’β’β£
8 0 0 0 0 0 0 00 0 4 4 0 0 4 β40 4 4 0 0 4 β4 00 4 0 4 0 β4 0 40 4 0 β4 0 β4 0 β40 β4 4 0 0 β4 β4 00 0 β4 4 0 0 β4 β40 0 0 0 β8 0 0 0
β€β₯β₯β₯β₯β₯β₯β¦βxβFn
2
(β1)xΒ·aβS(x)Β·b .
16 / 44
![Page 36: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/36.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The LAT of π
17 / 44
![Page 37: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/37.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The LAT of π (reordered columns)
18 / 44
![Page 38: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/38.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The LAT of π β π β π
19 / 44
![Page 39: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/39.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The TU-Decomposition
Definition
The TU-decomposition is a decomposition algorithm working againstS-boxes with vector spaces of zeroes in their LAT.
Theorem
βSquare of zeroesβin the LAT.
β
T
U
T and U are mini-block ciphers
π and π are linear permutations.
20 / 44
![Page 40: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/40.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
First Complete Decomposition of π [BPU16]
π
πΌ
π
π β
π1π0
βββ Multiplication in F24
β Inversion in F24
π0, π1, π 4 Γ 4 permutations
π 4 Γ 4 function
πΌ, π Linear permutations
Ugly, but it would not be there if π were random.
21 / 44
![Page 41: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/41.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
First Complete Decomposition of π [BPU16]
π
πΌ
π
π β
π1π0
βββ Multiplication in F24
β Inversion in F24
π0, π1, π 4 Γ 4 permutations
π 4 Γ 4 function
πΌ, π Linear permutations
Ugly, but it would not be there if π were random.
21 / 44
![Page 42: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/42.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Hardware Performance
Structure Area (πm2) Delay (ns)
Naive implementation 3889.6 362.52
With TU-decomposition 1530.1 46.11
Knowledge of this decomposition divides:
the area by 2.5, and
the delay by 8
22 / 44
![Page 43: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/43.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Conclusion for Kuznyechik/Streebog?
The Russian S-box was built witha TU-decomposition...
... or was it?
23 / 44
![Page 44: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/44.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Conclusion for Kuznyechik/Streebog?
The Russian S-box was built witha TU-decomposition...
... or was it?
23 / 44
![Page 45: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/45.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Reopening a Cold Case (Twice)
Detour through Belarus [PU16]
We identified some similar properties between π and the S-box of thestandard of Belarus... Which turned out to be based on a discretelogarithm.
New Patterns [Per18]
π (0β β¨01, 0a, 44, 92β©) = c8β β¨02, 04, 10, 20β©π (0β β¨05, 22, 49, 8bβ©) = 20β β¨01, 0a, 44, 92β© .
β¨01, 0a, 44, 92β© β β¨05, 22, 49, 8bβ© = F82
(c8β β¨05, 22, 49, 8bβ©) β (20β β¨01, 0a, 44, 92β©) = F82
(c8β β¨05, 22, 49, 8bβ©) β© (20β β¨01, 0a, 44, 92β©) = π(0) = fc
24 / 44
![Page 46: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/46.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Reopening a Cold Case (Twice)
Detour through Belarus [PU16]
We identified some similar properties between π and the S-box of thestandard of Belarus... Which turned out to be based on a discretelogarithm.
New Patterns [Per18]
π (0β β¨01, 0a, 44, 92β©) = c8β β¨02, 04, 10, 20β©π (0β β¨05, 22, 49, 8bβ©) = 20β β¨01, 0a, 44, 92β© .
β¨01, 0a, 44, 92β© β β¨05, 22, 49, 8bβ© = F82
(c8β β¨05, 22, 49, 8bβ©) β (20β β¨01, 0a, 44, 92β©) = F82
(c8β β¨05, 22, 49, 8bβ©) β© (20β β¨01, 0a, 44, 92β©) = π(0) = fc
24 / 44
![Page 47: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/47.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Reopening a Cold Case (Twice)
Detour through Belarus [PU16]
We identified some similar properties between π and the S-box of thestandard of Belarus... Which turned out to be based on a discretelogarithm.
New Patterns [Per18]
π (0β β¨01, 0a, 44, 92β©) = c8β β¨02, 04, 10, 20β©π (0β β¨05, 22, 49, 8bβ©) = 20β β¨01, 0a, 44, 92β© .
β¨01, 0a, 44, 92β© β β¨05, 22, 49, 8bβ© = F82
(c8β β¨05, 22, 49, 8bβ©) β (20β β¨01, 0a, 44, 92β©) = F82
(c8β β¨05, 22, 49, 8bβ©) β© (20β β¨01, 0a, 44, 92β©) = π(0) = fc
24 / 44
![Page 48: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/48.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Cosets to Cosets
GF(28) π(GF(28)) = GF(28)
{0}
{fc}
GF(24)*
π (0) β GF(24)*
πΌ16β
GF
(24)*
π ((F4 2
)*)
...
πΌ2β
GF
(24)*
πΌ1β
GF
(24)*
π (15) β GF(24)*
π (14) β GF(24)*
......
25 / 44
![Page 49: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/49.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Cosets to Cosets
GF(28) π(GF(28)) = GF(28)
{0}
{fc}
GF(24)*
π (0) β GF(24)*
πΌ16β
GF
(24)*
π ((F4 2
)*)
...
πΌ2β
GF
(24)*
πΌ1β
GF
(24)*
π (15) β GF(24)*
π (14) β GF(24)*
......
25 / 44
![Page 50: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/50.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Cosets to Cosets
GF(28) π(GF(28)) = GF(28)
{0}
{fc}
GF(24)*
π (0) β GF(24)*
πΌ16β
GF
(24)*
π ((F4 2
)*)
...
πΌ2β
GF
(24)*
πΌ1β
GF
(24)*
π (15) β GF(24)*
π (14) β GF(24)*
......
25 / 44
![Page 51: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/51.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Cosets to Cosets
GF(28) π(GF(28)) = GF(28)
{0}
{fc}
GF(24)*
π (0) β GF(24)*
πΌ16β
GF
(24)*
π ((F4 2
)*)
...
πΌ2β
GF
(24)*
πΌ1β
GF
(24)*
π (15) β GF(24)*
π (14) β GF(24)*
...
...
25 / 44
![Page 52: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/52.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Cosets to Cosets
GF(28) π(GF(28)) = GF(28)
{0}
{fc}
GF(24)*
π (0) β GF(24)*
πΌ16β
GF
(24)*
π ((F4 2
)*)
...
πΌ2β
GF
(24)*
πΌ1β
GF
(24)*
π (15) β GF(24)*
π (14) β GF(24)*
......
25 / 44
![Page 53: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/53.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The TKlog [Per18]
A TKlog operates on GF(22m) and uses:
πΌ: a generator of GF(22m),
π : an affine function Fm2 β GF(22m) with
π (Fm2 ) β GF(2m) = GF(22m),
s: a permutation of Z/(2m β 1)Z.
The corresponding TKlog is denoted Tπ ,s and it works as follows:β§βͺβ¨βͺβ©Tπ ,s(0) = π (0) ,
Tπ ,s
((πΌ2m+1)j
)= π (2m β j), for 1 β€ j β€ 2m β 1 ,
Tπ ,s
(πΌi+(2m+1)j
)= π (2m β i) β
(πΌ2m+1
)s(j), for 0 < i , 0 β€ j < 2m β 1 .
26 / 44
![Page 54: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/54.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Case of π
p = X 8 + X 4 + X 3 + X 2 + 1,
s = [0, 12, 9, 8, 7, 4, 14, 6, 5, 10, 2, 11, 1, 3, 13],
π (x) = Ξ(x) β 0xfc,
Ξ(1) = 0x12, Ξ(2) = 0x26, Ξ(4) = 0x24, Ξ(8) = 0x30
#TKlogs = 16β β p
Γ 15!β β s
Γ7β
i=4
(28 β 2i )β β Ξ
Γ 28β β π (0)
β 282.6
#8-bit perm. = 21684 ; #Affine perm. = 28β β cstte
Γ7β
i=0
(28 β 2i )β β linear part
β 270.2 .
27 / 44
![Page 55: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/55.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
Case of π
p = X 8 + X 4 + X 3 + X 2 + 1,
s = [0, 12, 9, 8, 7, 4, 14, 6, 5, 10, 2, 11, 1, 3, 13],
π (x) = Ξ(x) β 0xfc,
Ξ(1) = 0x12, Ξ(2) = 0x26, Ξ(4) = 0x24, Ξ(8) = 0x30
#TKlogs = 16β β p
Γ 15!β β s
Γ7β
i=4
(28 β 2i )β β Ξ
Γ 28β β π (0)
β 282.6
#8-bit perm. = 21684 ; #Affine perm. = 28β β cstte
Γ7β
i=0
(28 β 2i )β β linear part
β 270.2 .
27 / 44
![Page 56: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/56.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The Linear Layer of Streebog (1/2)
28 / 44
![Page 57: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/57.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The Linear Layer of Streebog (2/2)
It is actually a matrix multiplication in GF(28):β‘β’β’β’β’β’β’β’β’β’β’β£
83 47 8b 07 b2 46 87 6446 b6 0f 01 1a 83 98 8eac cc 9c a9 32 8a 89 5003 21 65 8c ba 93 c1 385b 06 8c 65 18 10 a8 9ef 9 7d 86 d9 8a 32 77 28a4 8b 47 4f 9e f 5 dc 1864 1c 31 4b 2b 8e e0 83
β€β₯β₯β₯β₯β₯β₯β₯β₯β₯β₯β¦.
The polynomial used is the same as in π.
A new security analysis is badly needed!
Reverse-engineering works!
29 / 44
![Page 58: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/58.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The Linear Layer of Streebog (2/2)
It is actually a matrix multiplication in GF(28):β‘β’β’β’β’β’β’β’β’β’β’β£
83 47 8b 07 b2 46 87 6446 b6 0f 01 1a 83 98 8eac cc 9c a9 32 8a 89 5003 21 65 8c ba 93 c1 385b 06 8c 65 18 10 a8 9ef 9 7d 86 d9 8a 32 77 28a4 8b 47 4f 9e f 5 dc 1864 1c 31 4b 2b 8e e0 83
β€β₯β₯β₯β₯β₯β₯β₯β₯β₯β₯β¦.
The polynomial used is the same as in π.
A new security analysis is badly needed!
Reverse-engineering works!
29 / 44
![Page 59: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/59.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The Linear Layer of Streebog (2/2)
It is actually a matrix multiplication in GF(28):β‘β’β’β’β’β’β’β’β’β’β’β£
83 47 8b 07 b2 46 87 6446 b6 0f 01 1a 83 98 8eac cc 9c a9 32 8a 89 5003 21 65 8c ba 93 c1 385b 06 8c 65 18 10 a8 9ef 9 7d 86 d9 8a 32 77 28a4 8b 47 4f 9e f 5 dc 1864 1c 31 4b 2b 8e e0 83
β€β₯β₯β₯β₯β₯β₯β₯β₯β₯β₯β¦.
The polynomial used is the same as in π.
A new security analysis is badly needed!
Reverse-engineering works!
29 / 44
![Page 60: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/60.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
TU-DecompositionDecomposing a Mysterious S-boxThe Plot Thickens
The Linear Layer of Streebog (2/2)
It is actually a matrix multiplication in GF(28):β‘β’β’β’β’β’β’β’β’β’β’β£
83 47 8b 07 b2 46 87 6446 b6 0f 01 1a 83 98 8eac cc 9c a9 32 8a 89 5003 21 65 8c ba 93 c1 385b 06 8c 65 18 10 a8 9ef 9 7d 86 d9 8a 32 77 28a4 8b 47 4f 9e f 5 dc 1864 1c 31 4b 2b 8e e0 83
β€β₯β₯β₯β₯β₯β₯β₯β₯β₯β₯β¦.
The polynomial used is the same as in π.
A new security analysis is badly needed!
Reverse-engineering works!
29 / 44
![Page 61: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/61.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Outline
1 My Area of Research: Symmetric Cryptography
2 From Russia With Love
3 Cryptanalysis of a Theorem
4 Conclusion
29 / 44
![Page 62: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/62.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Outline
We can obtain new mathematical results using decompositions.
1 The big APN problem and its only known solutions
2 Decomposing and generalizing this solution as butterflies
3 Generalizing a property of butterflies
30 / 44
![Page 63: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/63.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
The Big APN Problem
Definition (APN function)
A function S : Fn2 β Fn
2 is Almost Perfect Non-linear (APN) if
S(x β a) β S(x) = b
has 0 or 2 solutions for all a = 0 and for all b.
Big APN Problem
Are there APN permutations operating on Fn2 where n is even? [NK95]
31 / 44
![Page 64: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/64.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
The Big APN Problem
Definition (APN function)
A function S : Fn2 β Fn
2 is Almost Perfect Non-linear (APN) if
S(x β a) β S(x) = b
has 0 or 2 solutions for all a = 0 and for all b.
Big APN Problem
Are there APN permutations operating on Fn2 where n is even? [NK95]
31 / 44
![Page 65: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/65.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Dillon et al.βs Permutation
Only One Known Solution!
For n = 6, Dillon et al. [BDKM09] found an APN permutation.
It is possible to make a TU-decomposition! [PUB16]
32 / 44
![Page 66: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/66.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Dillon et al.βs Permutation
Only One Known Solution!
For n = 6, Dillon et al. [BDKM09] found an APN permutation.
It is possible to make a TU-decomposition! [PUB16]
32 / 44
![Page 67: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/67.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Dillon et al.βs Permutation
Only One Known Solution!
For n = 6, Dillon et al. [BDKM09] found an APN permutation.
It is possible to make a TU-decomposition! [PUB16]
32 / 44
![Page 68: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/68.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Dillon et al.βs Permutation
Only One Known Solution!
For n = 6, Dillon et al. [BDKM09] found an APN permutation.
It is possible to make a TU-decomposition! [PUB16]
32 / 44
![Page 69: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/69.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
On the Butterfly Structure
π½x3
x1/3
βπΌ
β
β
π½x3
x3
βπΌ
β
β
Uβ1
U
Definition (Open Butterfly H3πΌ,π½)
This permutation is an open butterfly[PUB16].
Lemma
Dillonβs permutation is affine-equivalentto H3
w ,1, where Tr (w) = 0.
33 / 44
![Page 70: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/70.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
On the Butterfly Structure
π½x3
x1/3
βπΌ
β
β
π½x3
x3
βπΌ
β
β
Uβ1
U
Definition (Open Butterfly H3πΌ,π½)
This permutation is an open butterfly[PUB16].
Lemma
Dillonβs permutation is affine-equivalentto H3
w ,1, where Tr (w) = 0.
33 / 44
![Page 71: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/71.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Closed Butterflies
βπΌ
β
x3
π½x3 β
βπΌ
β
x3
π½x3 β
U U
Definition (Closed butterfly V3πΌ,π½)
This quadratic function is a closedbutterfly.
Lemma (Equivalence)
Open and closed butterflies with thesame parameters are CCZ-equivalent.
34 / 44
![Page 72: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/72.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Closed Butterflies
βπΌ
β
x3
π½x3 β
βπΌ
β
x3
π½x3 β
U U
Definition (Closed butterfly V3πΌ,π½)
This quadratic function is a closedbutterfly.
Lemma (Equivalence)
Open and closed butterflies with thesame parameters are CCZ-equivalent.
34 / 44
![Page 73: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/73.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Properties of Butterflies
Let n β€ 3 be odd. Butterflies...... are APN but only for n = 3 [CDP17, CPT18]
... are differentially-4 (the best) for n > 3
... have the best non-linearity
... are rather cheap to implement
Open Butterfly
Uβ1
U
2n-bit permutation.Algebraic degree n (or n + 1).
Closed Butterfly
U U
2n-bit function for n β€ 3 odd.Algebraic degree 2.
35 / 44
![Page 74: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/74.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Equivalence Relations (1/2)
Definition (Affine-Equivalence)
F and G are affine equivalent if G (x) = (B β F β A)(x), where A,B areaffine permutations.
Equivalently, we need to have{(x ,G (x)),βx β Fn
2
}=
[Aβ1 0
0 B
]({(x ,F (x)),βx β Fn
2
}).
36 / 44
![Page 75: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/75.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Equivalence Relations (1/2)
Definition (Affine-Equivalence)
F and G are affine equivalent if G (x) = (B β F β A)(x), where A,B areaffine permutations.
Equivalently, we need to have{(x ,G (x)),βx β Fn
2
}=
[Aβ1 0
0 B
]({(x ,F (x)),βx β Fn
2
}).
36 / 44
![Page 76: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/76.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Equivalence Relations (2/2)
Definition (CCZ-Equivalence [CCZ98])
F : Fn2 β Fm
2 and G : Fn2 β Fm
2 are C(arlet)-C(harpin)-Z(inoviev)equivalent if
ΞG ={
(x ,G (x)),βx β Fn2
}= β
({(x ,F (x)),βx β Fn
2
})= β(ΞF ) ,
where β : Fn+m2 β Fn+m
2 is an affine permutation.For example, F and Fβ1 are CCZ-equivalent.
CCZ-equivalence preserves some properties (differential and linear) butnot others (algebraic degree).
The TU-decomposition plays a crucial role in CCZ-equivalence.
37 / 44
![Page 77: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/77.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Equivalence Relations (2/2)
Definition (CCZ-Equivalence [CCZ98])
F : Fn2 β Fm
2 and G : Fn2 β Fm
2 are C(arlet)-C(harpin)-Z(inoviev)equivalent if
ΞG ={
(x ,G (x)),βx β Fn2
}= β
({(x ,F (x)),βx β Fn
2
})= β(ΞF ) ,
where β : Fn+m2 β Fn+m
2 is an affine permutation.For example, F and Fβ1 are CCZ-equivalent.
CCZ-equivalence preserves some properties (differential and linear) butnot others (algebraic degree).
The TU-decomposition plays a crucial role in CCZ-equivalence.
37 / 44
![Page 78: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/78.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Equivalence Relations (2/2)
Definition (CCZ-Equivalence [CCZ98])
F : Fn2 β Fm
2 and G : Fn2 β Fm
2 are C(arlet)-C(harpin)-Z(inoviev)equivalent if
ΞG ={
(x ,G (x)),βx β Fn2
}= β
({(x ,F (x)),βx β Fn
2
})= β(ΞF ) ,
where β : Fn+m2 β Fn+m
2 is an affine permutation.For example, F and Fβ1 are CCZ-equivalent.
CCZ-equivalence preserves some properties (differential and linear) butnot others (algebraic degree).
The TU-decomposition plays a crucial role in CCZ-equivalence.
37 / 44
![Page 79: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/79.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Twist
Any function F : Fn2 β Fm
2 can be projected on Ft2 Γ Fmβt
2 .
T U
x y
u v
t n β t
t m β t
F
Tβ1
U
u y
x v
t n β t
t m β t
G
If T is a permutation for all secondary inputs, then we define thet-twist equivalent of F as G , where
G (x , y) =(Tβ1
y (x),UTβ1y (x)(y)
)for all (x , y) β Ft
2 Γ Fnβt2 .
38 / 44
![Page 80: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/80.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
Twist
Any function F : Fn2 β Fm
2 can be projected on Ft2 Γ Fmβt
2 .
T U
x y
u v
t n β t
t m β t
F
Tβ1
U
u y
x v
t n β t
t m β t
G
If T is a permutation for all secondary inputs, then we define thet-twist equivalent of F as G , where
G (x , y) =(Tβ1
y (x),UTβ1y (x)(y)
)for all (x , y) β Ft
2 Γ Fnβt2 .
38 / 44
![Page 81: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/81.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
TU-Decomposition and CCZ-Equivalence
Theorem ([CP19])
If F and G are CCZ-equivalent then either their equivalence is trivial or itinvolves a t-twist.
In other words, if F is non-trivially CCZ-equivalent to something elsethen it must have a TU-decomposition!
39 / 44
![Page 82: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/82.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Big APN Problem and its Only Known SolutionOn ButterfliesCCZ-Equivalence
TU-Decomposition and CCZ-Equivalence
Theorem ([CP19])
If F and G are CCZ-equivalent then either their equivalence is trivial or itinvolves a t-twist.
In other words, if F is non-trivially CCZ-equivalent to something elsethen it must have a TU-decomposition!
39 / 44
![Page 83: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/83.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Outline
1 My Area of Research: Symmetric Cryptography
2 From Russia With Love
3 Cryptanalysis of a Theorem
4 Conclusion
39 / 44
![Page 84: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/84.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Conclusion
Decompositions play a crucial role in cryptography!
When designing
When implementing
When attacking
They allow us to bring cryptographic techniques to other fields ofmathematics.
40 / 44
![Page 85: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/85.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Conclusion
Decompositions play a crucial role in cryptography!
When designing
When implementing
When attacking
They allow us to bring cryptographic techniques to other fields ofmathematics.
40 / 44
![Page 86: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/86.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Open Problems (Symmetric Cryptography)
Russian Shenanigans
Is it possible to use the latest decomposition of the Russian S-box toattack the corresponding algorithms?
DES
What are the decompositions in the S-boxes of the DES (that we donβtknow of)? Could we use them in attacks?
41 / 44
![Page 87: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/87.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Open Problems (Symmetric Cryptography)
Russian Shenanigans
Is it possible to use the latest decomposition of the Russian S-box toattack the corresponding algorithms?
DES
What are the decompositions in the S-boxes of the DES (that we donβtknow of)? Could we use them in attacks?
41 / 44
![Page 88: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/88.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Open Problems (Discrete Mathematics)
TU-decomposition in GF
The TU-decomposition and the twist are defined over Fn2. Can we find a
nice representation over GF(2n)?
Big APN Problem
Is there an APN permutation of an even number of bits (n β₯ 8)?
Other Decomposition
Are there other decompositions as general as the TU-decomposition? Areother mathematical structures explained by an underlying decomposition?
42 / 44
![Page 89: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/89.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Open Problems (Discrete Mathematics)
TU-decomposition in GF
The TU-decomposition and the twist are defined over Fn2. Can we find a
nice representation over GF(2n)?
Big APN Problem
Is there an APN permutation of an even number of bits (n β₯ 8)?
Other Decomposition
Are there other decompositions as general as the TU-decomposition? Areother mathematical structures explained by an underlying decomposition?
42 / 44
![Page 90: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/90.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
Open Problems (Discrete Mathematics)
TU-decomposition in GF
The TU-decomposition and the twist are defined over Fn2. Can we find a
nice representation over GF(2n)?
Big APN Problem
Is there an APN permutation of an even number of bits (n β₯ 8)?
Other Decomposition
Are there other decompositions as general as the TU-decomposition? Areother mathematical structures explained by an underlying decomposition?
42 / 44
![Page 91: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/91.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
The Last S-Box
14 11 60 6d e9 10 e3 2 b 90 d 17 c5 b0 9f c5
d8 da be 22 8 f3 4 a9 fe f3 f5 fc bc 30 be 26
bb 88 85 46 f4 2e e fd 76 fe b0 11 4e de 35 bb
30 4b 30 d6 dd df df d4 90 7a d8 8c 6a 89 30 39
e9 1 da d2 85 87 d3 d4 ba 2b d4 9f 9c 38 8c 55
d3 86 bb db ec e0 46 48 bf 46 1b 1c d7 d9 1b e0
23 d4 d7 7f 16 3f 3 3 44 c3 59 10 2a da ed e9
8e d8 d1 db cb cb c3 c7 38 22 34 3d db 85 23 7c
24 d1 d8 2e fc 44 8 38 c8 c7 39 4c 5f 56 2a cf
d0 e9 d2 68 e4 e3 e9 13 e2 c 97 e4 60 29 d7 9b
d9 16 24 94 b3 e3 4c 4c 4f 39 e0 4b bc 2c d3 94
81 96 93 84 91 d0 2e d6 d2 2b 78 ef d6 9e 7b 72
ad c4 68 92 7a d2 5 2b 1e d0 dc b1 22 3f c3 c3
88 b1 8d b5 e3 4e d7 81 3 15 17 25 4e 65 88 4e
e4 3b 81 81 fa 1 1d 4 22 0 6 1 27 68 27 2e
3b 83 c7 cc 25 9b d8 d5 1c 1f e5 59 7f 3f 3f ef
43 / 44
![Page 92: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/92.jpg)
My Area of Research: Symmetric CryptographyFrom Russia With Love
Cryptanalysis of a TheoremConclusion
44 / 44
![Page 93: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/93.jpg)
Appendix Details on CCZ-Equivalence
Swap Matrices
The swap matrix permuting Fn+m2 is defined for t β€ min(n,m) as
Mt =
β‘β’β’β£0 0 It 00 Inβt 0 0It 0 0 00 0 0 Imβt
β€β₯β₯β¦ .
It has a simple interpretation:
t n β t t m β t
For all t β€ min(n,m), Mt is an orthogonal and symmetric involution.
1 / 4
![Page 94: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/94.jpg)
Appendix Details on CCZ-Equivalence
Swap Matrices and Twisting
F : Fn2 β Fm
2
T U
t n β t
t m β t
t-twist
G : Fn2 β Fm
2
Tβ1
U
t n β t
t m β t
ΞF ={
(x ,F (x)) ,βx β Fn2
} MtΞG =
{(x ,G (x)) ,βx β Fn
2
}π²F (u) = π²G (Mt(u))
2 / 4
![Page 95: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/95.jpg)
Appendix Details on CCZ-Equivalence
Twisting and CCZ-Class
Lemma
Twisting preserves the CCZ-equivalence class.
3 / 4
![Page 96: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/96.jpg)
Appendix Details on CCZ-Equivalence
Main Result
Theorem
If F : Fn2 β Fm
2 and G : Fn2 β Fm
2 are CCZ-equivalent, then
ΞG = (B ΓMt Γ A)(ΞF ) ,
where A and B are EA-mappings and where
t = dim(projπ±β₯
((AT ΓMt Γ BT )(π±)
)).
Corollary
If a function is CCZ-equivalent but not EA-equivalent to anotherfunction, then they have to be EA-equivalent to functions for which at-twist is possible.
4 / 4
![Page 97: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/97.jpg)
Appendix Details on CCZ-Equivalence
K. A. Browning, J.F. Dillon, R.E. Kibler, and M. T. McQuistan.APN Polynomials and Related Codes.J. of Combinatorics, Information and System Sciences,34(1-4):135β159, 2009.
Alex Biryukov, Leo Perrin, and Aleksei Udovenko.Reverse-engineering the S-box of streebog, kuznyechik andSTRIBOBr1.In Marc Fischlin and Jean-Sebastien Coron, editors,EUROCRYPT 2016, Part I, volume 9665 of LNCS, pages 372β402.Springer, Heidelberg, May 2016.
Claude Carlet, Pascale Charpin, and Victor Zinoviev.Codes, bent functions and permutations suitable for DES-likecryptosystems.Designs, Codes and Cryptography, 15(2):125β156, 1998.
Anne Canteaut, Sebastien Duval, and Leo Perrin.A generalisation of Dillonβs APN permutation with the best knowndifferential and nonlinear properties for all fields of size 24k+2.
4 / 4
![Page 98: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/98.jpg)
Appendix Details on CCZ-Equivalence
IEEE Transactions on Information Theory, 63(11):7575β7591, Nov2017.
Anne Canteaut and Leo Perrin.On CCZ-equivalence, extended-affine equivalence, and functiontwisting.Finite Fields and Their Applications, 56:209β246, 2019.
Anne Canteaut, Leo Perrin, and Shizhu Tian.If a generalised butterfly is APN then it operates on 6 bits.Cryptology ePrint Archive, Report 2018/1036, 2018.https://eprint.iacr.org/2018/1036.
Kaisa Nyberg and Lars R. Knudsen.Provable security against a differential attack.Journal of Cryptology, 8(1):27β37, 1995.
Leo Perrin.Partitions in the S-box of Streebog and Kuznyechik.To appear (IACR ToSC), 2018.
Leo Perrin and Aleksei Udovenko.
4 / 4
![Page 99: S-Box Decompositions and some Applications](https://reader034.vdocument.in/reader034/viewer/2022042914/626a3ed350cda504265f77f1/html5/thumbnails/99.jpg)
Appendix Details on CCZ-Equivalence
Exponential s-boxes: a link between the s-boxes of BelT andKuznyechik/Streebog.IACR Trans. Symm. Cryptol., 2016(2):99β124, 2016.http://tosc.iacr.org/index.php/ToSC/article/view/567.
Leo Perrin, Aleksei Udovenko, and Alex Biryukov.Cryptanalysis of a theorem: Decomposing the only known solution tothe big APN problem.In Matthew Robshaw and Jonathan Katz, editors, CRYPTO 2016,Part II, volume 9815 of LNCS, pages 93β122. Springer, Heidelberg,August 2016.
4 / 4