Exponential S-Boxes: a Link Between the S-Boxes of BelT and Kuznyechik/Streebog

被引:6
作者
Perrin, Leo [1 ]
Udovenko, Aleksei [1 ]
机构
[1] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, Luxembourg, Luxembourg
关键词
Reverse-Engineering; S-Box; Streebog; Kuznyechik; STRIBOBr1; White-Box; Linear Approximation Table; Exponentiation; BelT;
D O I
10.13154/tosc.v2016.i2.99-124
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The block cipher Kuznyechik and the hash function Streebog were recently standardized by the Russian Federation. These primitives use a common 8-bit S-Box, denoted pi, which is given only as a look-up table. The rationale behind its design is, for all practical purposes, kept secret by its authors. In a paper presented at Eurocrypt 2016, Biryukov et al. reverse-engineered this S-Box and recovered an unusual Feistel-like structure relying on finite field multiplications. In this paper, we provide a new decomposition of this S-Box and describe how we obtained it. The first step was the analysis of the 8-bit S-Box of the current standard block cipher of Belarus, BelT. This S-Box is a variant of a so-called exponential substitution, a concept we generalize into pseudo-exponential substitution. We derive distinguishers for such permutations based on properties of their linear approximation tables and notice that pi shares some of them. We then show that pi indeed has a decomposition based on a pseudo-exponential substitution. More precisely, we obtain a simpler structure based on an 8-bit finite field exponentiation, one 4-bit S-Box, a linear layer and a few modular arithmetic operations. We also make several observations which may help cryptanalysts attempting to reverse-engineer other S-Boxes. For example, the visual pattern used in the previous work as a starting point to decompose pi is mathematically formalized and the use of differential patterns involving operations other than exclusive-or is explored.
引用
收藏
页码:99 / 124
页数:26
相关论文
共 35 条
[21]  
Hakala RM, 2010, LECT NOTES COMPUT SC, V6338, P333, DOI 10.1007/978-3-642-15874-2_29
[22]  
Kazymyrov O., 2013, IACR CRYPTOLOGY EPRI, V2013, P556
[23]  
MASSEY JL, 1969, IEEE T INFORM THEORY, V15, P122, DOI 10.1109/TIT.1969.1054260
[24]  
Matsui M., 1994, ADV CRYPTOLOGY EUROC, P386
[25]  
National Security Agency National Security Agency, 1998, SKIPJACK KEA ALG SPE
[26]  
Nyberg K., 1993, LNCS, V765, P55, DOI DOI 10.1007/3-540-48285-7_6
[27]  
Oliynykov R, 2015, 2015650 CRYPT EPRINT
[28]   Cryptanalysis of a Theorem: Decomposing the Only Known Solution to the Big APN Problem [J].
Perrin, Leo ;
Udovenko, Aleksei ;
Biryukov, Alex .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 :93-122
[29]   Rotation symmetry in algebraicall generated cryptographic substitution tables [J].
Rijmen, Vincent ;
Barreto, Paulo S. L. M. ;
Filho, Decio L. Gazzoni .
INFORMATION PROCESSING LETTERS, 2008, 106 (06) :246-250
[30]  
[Сааринен М.-Ю. О. Saarinen M.-J. O.], 2015, [Математические вопросы криптографии, Matematicheskie voprosy kriptografii], V6, P67