Statistics of Random Permutations and the Cryptanalysis of Periodic Block Ciphers

被引:8
作者
Bard, Gregory V. [2 ]
Ault, Shaun V.
Courtois, Nicolas T. [1 ]
机构
[1] UCL, London WC1E 6BT, England
[2] Univ Wisconsin, Madison, WI 53706 USA
基金
美国国家科学基金会;
关键词
analytic combinatorics; cycle structure; cryptanalysis; EGF; generating functions; iterations of permutations; Keeloq; OGF; random permutations; MODES;
D O I
10.1080/01611194.2011.632806
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
It has been stated many times that a block cipher is "intended to be'' computationally indistinguishable from a random permutation of appropriate domain and range. But what are the properties of a random permutation? In this article, by the aid of exponential generating functions (EGFs) and ordinary generating functions (OGFs), we derive a series of corollaries of interest to the cryptographic community. While the notion of EGFs and OGFs is known among combinatoricists, we believe that the subject is relatively unfamiliar to those working in cryptography. As an application, we present three cryptanalytic attacks. The first two are on the block cipher Keeloq, used in the remote keyless-entry systems of automobiles. While these attacks have appeared in heuristic form before, we render them rigorous, with exact (instead of experimental) analysis of their running time. Furthermore, we demonstrate that these attacks can succeed with less data available than was previously thought-namely, that less than the entire codebook need be checked, and we give a formula for the probability of success in terms of the fraction of the codebook used. It is hoped that the rigor will also serve as a pedagogical aid for those who wish to understand these attacks at the deepest level. The third attack is against the (roughly) millionth-fold iteration of any block cipher. In particular, we create a distinguishing attack, whereby the iteration of a cipher by a number of times equal to a highly composite number is breakable, but merely one fewer round is considerably more secure. We then extend this to a key-recovery attack in a "Triple-DES'' style construction, but using AES-256 and iterating the middle cipher (roughly) a million-fold. We furthermore show that if a cipher must be iterated, then it should be iterated a prime number of times to avoid this attack. It is hoped that these results will showcase the utility of exponential and ordinary generating functions and will encourage their use in cryptanalytic research, as well as provide an introduction to Keeloq.
引用
收藏
页码:240 / 262
页数:23
相关论文
共 25 条
[1]  
[Anonymous], 2009, Handbook of Satisfiability
[2]  
[Anonymous], 1979, Asterisque
[3]  
Bard G. V., 2009, THESIS U MARYLAND CO
[4]  
Bard GV, 2009, ALGEBRAIC CRYPTANALYSIS, P1, DOI 10.1007/978-0-387-88757-9_1
[5]  
Bard GregoryV., 2007, EFFICIENT METHODS CO
[6]   Cryptanalysis of multiple modes of operation [J].
Biham, E .
JOURNAL OF CRYPTOLOGY, 1998, 11 (01) :45-58
[7]   Cryptanalysis of triple modes of operation [J].
Biham, E .
JOURNAL OF CRYPTOLOGY, 1999, 12 (03) :161-184
[8]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[9]   An improvement of Davies' attack on DES [J].
Biham, E ;
Biryukov, A .
JOURNAL OF CRYPTOLOGY, 1997, 10 (03) :195-205
[10]  
Biham E., 2008, LNCS, P1