An Enhanced Binary Characteristic Set Algorithm and Its Applications to Algebraic Cryptanalysis

Efficient methods to solve boolean polynomial systems underly the effectiveness of algebraic attacks on cryptographic ciphers and the security of multi-variate cryptosystems. Amongst various polynomial solving algorithms, the binary characteristic set algorithm was recently proposed to solve boolean polynomial systems including those arising from ciphers. In this paper, we propose some novel techniques to enhance the existing characteristic set solver. Specifically, we incorporate the ElimLin procedure and apply basic statistical learning techniques to improve the performance of the characteristic set algorithm. Our experiments show that our enhanced solver EBCSA performs better than existing algebraic methods on some ciphers, including CANFIL and PRESENT ciphers. We also perform the first algebraic cryptanalysis on the PRINCE cipher and an algebraic attack on Toyocrypt in a more practical/realistic setting as compared to previous attacks.

[1]  Josef Pieprzyk,et al.  Extensions of the Cube Attack Based on Low Degree Annihilators , 2009, CANS.

[2]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[3]  Ron Kohavi,et al.  A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.

[4]  Anne Canteaut,et al.  Sieve-in-the-Middle: Improved MITM Attacks (Full Version) , 2013, IACR Cryptol. ePrint Arch..

[5]  David A. Cox,et al.  Ideals, Varieties, and Algorithms , 1997 .

[6]  Serge Vaudenay,et al.  ElimLin Algorithm Revisited , 2012, FSE.

[7]  Andrey Bogdanov,et al.  PRESENT: An Ultra-Lightweight Block Cipher , 2007, CHES.

[8]  Jean Charles Faugère,et al.  A new efficient algorithm for computing Gröbner bases without reduction to zero (F5) , 2002, ISSAC '02.

[9]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[10]  Anne Canteaut,et al.  PRINCE - A Low-latency Block Cipher for Pervasive Computing Applications (Full version) , 2012, IACR Cryptol. ePrint Arch..

[11]  Marc Moreno Maza,et al.  On the Theories of Triangular Sets , 1999, J. Symb. Comput..

[12]  J. Faugère A new efficient algorithm for computing Gröbner bases (F4) , 1999 .

[13]  Xiao-Shan Gao,et al.  A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers* , 2008, J. Syst. Sci. Complex..

[14]  Meiqin Wang,et al.  Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT , 2009, CANS.

[15]  Pouyan Sepehrdad,et al.  Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives , 2012 .

[16]  Jacques Patarin,et al.  About the XL Algorithm over GF(2) , 2003, CT-RSA.

[17]  Frederik Armknecht,et al.  Extending the Resynchronization Attack , 2004, Selected Areas in Cryptography.

[18]  Hideki Imai,et al.  Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[19]  Léo Perrin,et al.  Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE , 2015, Journal of Cryptology.

[20]  Michael Kalkbrener,et al.  A Generalized Euclidean Algorithm for Computing Triangular Representations of Algebraic Varieties , 1993, J. Symb. Comput..

[21]  Jacques Patarin,et al.  Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms , 1996, EUROCRYPT.

[22]  Gregory V. Bard,et al.  Algebraic Cryptanalysis of the Data Encryption Standard , 2007, IMACC.

[23]  Anne Canteaut,et al.  Multiple Differential Cryptanalysis of Round-Reduced PRINCE , 2014, FSE.

[24]  Adi Shamir,et al.  Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations , 2000, EUROCRYPT.

[25]  Itai Dinur,et al.  Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE , 2015, EUROCRYPT.

[26]  Eli Biham,et al.  A Practical Attack on KeeLoq , 2008, Journal of Cryptology.

[27]  Shuang Wu,et al.  Security Analysis of PRINCE , 2013, FSE.

[28]  Jean-Charles Faugère,et al.  Efficient Computation of Zero-Dimensional Gröbner Bases by Change of Ordering , 1993, J. Symb. Comput..

[29]  Philip Hawkes,et al.  Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers , 2004, CRYPTO.

[30]  Adi Shamir,et al.  Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization , 1999, CRYPTO.