Reconstructing an S-box from its Difference Distribution Table
In this paper we study the problem of recovering a secret S-box from its difference distribution table (DDT). While being an interesting theoretical problem on its own, the ability to recover the S-box from the DDT of a secret S-box can be used in cryptanalytic attacks where the attacker can obtain...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2019-06-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://ojs-speed.ub.rub.de/index.php/ToSC/article/view/8319 |
id |
doaj-e712a0645172441a9183ae92d0568178 |
---|---|
record_format |
Article |
spelling |
doaj-e712a0645172441a9183ae92d05681782021-04-02T11:48:59ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2019-06-012019210.13154/tosc.v2019.i2.193–217Reconstructing an S-box from its Difference Distribution TableOrr Dunkelman0Senyang Huang1Department of Computer Science, University of HaifaDepartment of Computer Science, University of Haifa In this paper we study the problem of recovering a secret S-box from its difference distribution table (DDT). While being an interesting theoretical problem on its own, the ability to recover the S-box from the DDT of a secret S-box can be used in cryptanalytic attacks where the attacker can obtain the DDT (e.g., in Bar-On et al.’s attack on GOST), in supporting theoretical analysis of the properties of difference distribution tables (e.g., in Boura et al.’s work), or in some analysis of S-boxes with unknown design criteria (e.g., in Biryukov and Perrin’s analysis). We show that using the well established relation between the DDT and the linear approximation table (LAT), one can devise an algorithm different from the straightforward guess-and-determine (GD) algorithm proposed by Boura et al. Moreover, we show how to exploit this relation, and embed the knowledge obtained from it in the GD algorithm. We tested our new algorithm on random S-boxes of different sizes, and for random 14-bit bijective S-boxes, our results outperform the GD attack by several orders of magnitude. https://ojs-speed.ub.rub.de/index.php/ToSC/article/view/8319S-boxDDTLATthe sign determination problem |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Orr Dunkelman Senyang Huang |
spellingShingle |
Orr Dunkelman Senyang Huang Reconstructing an S-box from its Difference Distribution Table IACR Transactions on Symmetric Cryptology S-box DDT LAT the sign determination problem |
author_facet |
Orr Dunkelman Senyang Huang |
author_sort |
Orr Dunkelman |
title |
Reconstructing an S-box from its Difference Distribution Table |
title_short |
Reconstructing an S-box from its Difference Distribution Table |
title_full |
Reconstructing an S-box from its Difference Distribution Table |
title_fullStr |
Reconstructing an S-box from its Difference Distribution Table |
title_full_unstemmed |
Reconstructing an S-box from its Difference Distribution Table |
title_sort |
reconstructing an s-box from its difference distribution table |
publisher |
Ruhr-Universität Bochum |
series |
IACR Transactions on Symmetric Cryptology |
issn |
2519-173X |
publishDate |
2019-06-01 |
description |
In this paper we study the problem of recovering a secret S-box from its difference distribution table (DDT). While being an interesting theoretical problem on its own, the ability to recover the S-box from the DDT of a secret S-box can be used in cryptanalytic attacks where the attacker can obtain the DDT (e.g., in Bar-On et al.’s attack on GOST), in supporting theoretical analysis of the properties of difference distribution tables (e.g., in Boura et al.’s work), or in some analysis of S-boxes with unknown design criteria (e.g., in Biryukov and Perrin’s analysis).
We show that using the well established relation between the DDT and the linear approximation table (LAT), one can devise an algorithm different from the straightforward guess-and-determine (GD) algorithm proposed by Boura et al. Moreover, we show how to exploit this relation, and embed the knowledge obtained from it in the GD algorithm. We tested our new algorithm on random S-boxes of different sizes, and for random 14-bit bijective S-boxes, our results outperform the GD attack by several orders of magnitude.
|
topic |
S-box DDT LAT the sign determination problem |
url |
https://ojs-speed.ub.rub.de/index.php/ToSC/article/view/8319 |
work_keys_str_mv |
AT orrdunkelman reconstructingansboxfromitsdifferencedistributiontable AT senyanghuang reconstructingansboxfromitsdifferencedistributiontable |
_version_ |
1721571237301321728 |