Rotational Cryptanalysis From a Differential-linear Perspective: Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette

The differential-linear attack, combining the power of the two most effective techniques for symmetric-key cryptanalysis, was proposed by Langford and Hellman at CRYPTO 1994. From the exact formula for evaluating the bias of a differential-linear distinguisher (JoC 2017), to the differential-linear connectivity table (DLCT) technique for dealing with the dependencies in the switch between the differential and linear parts (EUROCRYPT 2019), and to the improvements in the context of cryptanalysis of ARX primitives (CRYPTO 2020), we have seen significant development of the differential-linear attack during the last four years. In this work, we further extend this framework by replacing the differential part of the attack by rotational-xor differentials. Along the way, we establish the theoretical link between the rotational-xor differential and linear approximations, revealing that it is nontrivial to directly apply the closed formula for the bias of ordinary differentiallinear attack to rotational differential-linear cryptanalysis. We then revisit the rotational cryptanalysis from the perspective of differentiallinear cryptanalysis and generalize Morawiecki et al.’s technique for analyzing Keccak, which leads to a practical method for estimating the bias of a (rotational) differential-linear distinguisher in the special case where the output linear mask is a unit vector. Finally, we apply the rotational differential-linear technique to the permutations involved in FRIET, Xoodoo, Alzette, and SipHash. This gives significant improvements over existing cryptanalytic results, or offers explanations for previous experimental distinguishers without a theoretical foundation. To confirm the validity of our analysis, all distinguishers with practical complexities are verified experimentally.

[1]  Jing Zhang,et al.  Differential-Multiple Linear Cryptanalysis , 2009, Inscrypt.

[2]  Ivica Nikolic,et al.  Rotational Cryptanalysis of ARX , 2010, FSE.

[3]  Serge Vaudenay,et al.  Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.

[4]  Gregor Leander,et al.  A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack , 2011, CRYPTO.

[5]  Emanuele Bellini,et al.  Rotational analysis of ChaCha permutation , 2020, IACR Cryptol. ePrint Arch..

[6]  Ron Steinfeld,et al.  Rotational Cryptanalysis of ARX Revisited , 2015, FSE.

[7]  Tao Huang,et al.  Boomerang Connectivity Table: A New Cryptanalysis Tool , 2018, IACR Cryptol. ePrint Arch..

[8]  Yosuke Todo,et al.  Improved Differential-Linear Attacks with Applications to ARX Ciphers , 2020, Journal of Cryptology.

[9]  Susan K. Langford,et al.  Differential-Linear Cryptanalysis , 1994, CRYPTO.

[10]  Gregor Leander,et al.  Differential-Linear Cryptanalysis Revisited , 2016, Journal of Cryptology.

[11]  Yunwen Liu,et al.  Rotational Cryptanalysis in the Presence of Constants , 2016, IACR Trans. Symmetric Cryptol..

[12]  Ivica Nikolic,et al.  Rotational Rebound Attacks on Reduced Skein , 2010, Journal of Cryptology.

[13]  Alex Biryukov,et al.  Design Strategies for ARX with Provable Bounds: Sparx and LAX , 2016, ASIACRYPT.

[14]  Gregor Leander,et al.  Differential-Linear Cryptanalysis Revisited , 2014, FSE.

[15]  Vincent Rijmen,et al.  Rotational Cryptanalysis on MAC Algorithm Chaskey , 2020, IACR Cryptol. ePrint Arch..

[16]  Jiqiang Lu A methodology for differential-linear cryptanalysis and its applications , 2015, Des. Codes Cryptogr..

[17]  Yosuke Todo,et al.  Structural Evaluation by Generalized Integral Property , 2015, EUROCRYPT.

[18]  Yunwen Liu,et al.  Rotational-XOR Cryptanalysis of Simon-like Block Ciphers , 2020, IACR Cryptol. ePrint Arch..

[19]  Kostas Papagiannopoulos,et al.  Friet: An Authenticated Encryption Scheme with Built-in Fault Detection , 2020, IACR Cryptol. ePrint Arch..

[20]  Mitsuru Matsui,et al.  Linear Cryptanalysis Method for DES Cipher , 1994, EUROCRYPT.

[21]  Jakub Töpfer Links Between Differential and Linear Cryptanalysis , 2015 .

[22]  Orr Dunkelman,et al.  DLCT: A New Tool for Differential-Linear Cryptanalysis , 2019, IACR Cryptol. ePrint Arch..

[23]  Joan Daemen,et al.  The design of Xoodoo and Xoofff , 2018, IACR Trans. Symmetric Cryptol..

[24]  Yosuke Todo,et al.  Bit-Based Division Property and Application to Simon Family , 2016, FSE.

[25]  Jean-Philippe Aumasson,et al.  SipHash: A Fast Short-Input PRF , 2012, INDOCRYPT.

[26]  David A. Wagner,et al.  The Boomerang Attack , 1999, FSE.

[27]  Tyge Tiessen,et al.  Polytopic Cryptanalysis , 2016, EUROCRYPT.

[28]  Guido Bertoni,et al.  Farfalle: parallel permutation-based cryptography , 2017, IACR Trans. Symmetric Cryptol..

[29]  Luan Cardoso dos Santos,et al.  Alzette: A 64-Bit ARX-box - (Feat. CRAX and TRAX) , 2020, CRYPTO.

[30]  Claude Carlet,et al.  Boolean Functions for Cryptography and Error-Correcting Codes , 2010, Boolean Models and Methods.

[31]  Yu Sasaki,et al.  Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64 , 2016, Journal of Cryptology.

[32]  Hongbo Yu,et al.  Cryptanalysis of Reduced-Round SipHash , 2023, IACR Cryptol. ePrint Arch..

[33]  Stefan Kölbl,et al.  Observations on the SIMON Block Cipher Family , 2015, CRYPTO.

[34]  Samuel Neves,et al.  Analysis of NORX: Investigating Differential and Rotational Properties , 2014, LATINCRYPT.

[35]  Brice Minaud,et al.  A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro , 2015, EUROCRYPT.

[36]  Yunwen Liu,et al.  Rotational-XOR Cryptanalysis of Reduced-round SPECK , 2017, IACR Cryptol. ePrint Arch..

[37]  Marian Srebrny,et al.  Rotational Cryptanalysis of Round-Reduced Keccak , 2013, FSE.