Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher

Mixing addition modulo 2 n (+) and exclusive-or ( ) has a host of applications in symmetric cryptography as the operations are fast and nonlinear over GF(2). We deal with a frequently encountered equation (x +y) ((x ) + (y )) = . The diculty of solving an arbitrary system of such equations { named dierential equations of addition (DEA) { is an important consideration in the evaluation of the security of many ciphers against dierential attacks . This paper shows that the satisability of an arbitrary set of DEA { which has so far been assumed hard for large n { is in the complexity class P. We also design an ecient algorithm to obtain all solutions to an arbitrary system of DEA with running time linear in the number of solutions. Our second contribution is solving DEA in an adaptive query model where an equation is formed by a query (; ) and oracle output . The challenge is to optimize the number of queries to solve (x +y) ((x ) + (y )) = . Our algorithm solves this equation with only 3 queries in the worst case. Another algorithm solves the equation (x +y) (x + (y )) = with (n t 1) queries in the worst case (t is the position of the least signicant ‘1’ of x), and thus, outperforms the previous best known algorithm by Muller { presented at FSE ’04 { which required 3(n 1) queries. Most importantly, we show that the upper bounds, for our algorithms, on the number of queries match worst case lower bounds. This, essentially, closes further research in this direction as our lower bounds are optimal. We used our results to cryptanalyze a recently proposed cipher Helix, which was a candidate for consideration in the 802.11i standard. We are successful in reducing the data complexity of a DC attack on the cipher by a factor of 3 in the worst case (a factor of 46.5 in the best case).

[1]  Alfred V. Aho,et al.  The Design and Analysis of Computer Algorithms , 1974 .

[2]  Iyad A. Ajwa,et al.  Grobner Bases Algorithm , 1995 .

[3]  Brian R. Duffy,et al.  The language of machines , 2003, ISICT.

[4]  Xuejia Lai,et al.  Markov Ciphers and Differential Cryptanalysis , 1991, EUROCRYPT.

[5]  Johan Wallén Linear Approximations of Addition Modulo 2n , 2003, FSE.

[6]  Jeffrey D. Ullman,et al.  Introduction to Automata Theory, Languages and Computation , 1979 .

[7]  Adi Shamir,et al.  Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.

[8]  Shai Halevi,et al.  MARS - a candidate cipher for AES , 1999 .

[9]  Thomas A. Berson,et al.  Differential Cryptanalysis Mod 2^32 with Applications to MD5 , 1992, EUROCRYPT.

[10]  Lars R. Knudsen,et al.  Provable security against a differential attack , 1994, Journal of Cryptology.

[11]  Philippe Dumas,et al.  On the Additive Differential Probability of Exclusive-Or , 2004, FSE.

[12]  Alex Biryukov,et al.  Non-randomness of the Full 4 and 5-Pass HAVAL , 2004, SCN.

[13]  Shiho Moriai,et al.  Efficient Algorithms for Computing Differential Properties of Addition , 2001, FSE.

[14]  Bruce Schneier,et al.  Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive , 2003, FSE.

[15]  J. Faugère A new efficient algorithm for computing Gröbner bases (F4) , 1999 .

[16]  David Thomas,et al.  The Art in Computer Programming , 2001 .

[17]  Adi Shamir,et al.  New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.

[18]  Frédéric Muller Differential Attacks against the Helix Stream Cipher , 2004, FSE.

[19]  Willi Meier,et al.  Cryptographic Significance of the Carry for Ciphers Based on Integer Addition , 1990, CRYPTO.

[20]  Bruce Schneier,et al.  The Twofish encryption algorithm: a 128-bit block cipher , 1999 .

[21]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[22]  Adi Shamir,et al.  Cryptographic Applications of T-Functions , 2003, Selected Areas in Cryptography.