Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.

作者: Christian Rechberger , Gregor Leander , Philipp Jovanovic , Christof Beierle , Martin M. Lauridsen

DOI:

关键词: Hash functionAdvanced Encryption StandardComputer sciencePermutationArithmeticContext (language use)Block cipherRange (mathematics)

摘要: Designing block ciphers and hash functions in a manner that resemble the AES many aspects has been very popular since Rijndael was adopted as Advanced Encryption Standard. However, sharp contrast to MixColumns operation, security implications of way state is permuted by operation resembling ShiftRows never studied depth. Here, we provide first structured study influence ShiftRows-like operations, or more generally, word-wise permutations, AES-like with respect diffusion properties resistance towards differentialand linear attacks. After formalizing concept guaranteed trail weights, show range equivalence results for permutation layers this context. We prove weight analysis when using arbitrary rotations special case, reduces consideration specific normal form. Using mixed-integer programming approach, obtain optimal parameters wide ciphers, improvements on Rijndael-192, Rijndael-256, PRIMATEs-80 Prost-128. As separate result, cases geometry seemingly bound can be obtained cyclic only layer, i.e. implementation friendly way.

参考文章(20)
Jian Guo, Thomas Peyrin, Axel Poschmann, The PHOTON family of lightweight Hash functions international cryptology conference. ,vol. 2011, pp. 222- 239 ,(2011) , 10.1007/978-3-642-22792-9_13
Vincent Rijmen, Paulo S.L.M, The WHIRLPOOL Hashing Function ,(2003)
Christof Beierle, Philipp Jovanovic, Martin M. Lauridsen, Gregor Leander, Christian Rechberger, Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows the cryptographers track at the rsa conference. pp. 37- 58 ,(2015) , 10.1007/978-3-319-16715-2_3
Dominic Welsh, Codes and Cryptography ,(1988)
Joan Daemen, Vincent Rijmen, The Wide Trail Design Strategy Lecture Notes in Computer Science. ,vol. 2260, pp. 222- 238 ,(2001) , 10.1007/3-540-45325-3_20
Joan Daemen, Lars R. Knudsen, Vincent Rijmen, Linear Frameworks for Block Ciphers Designs, Codes and Cryptography. ,vol. 22, pp. 65- 87 ,(2001) , 10.1023/A:1008303310011
Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun, Miroslav Knezevic, Lars R. Knudsen, Gregor Leander, Ventzislav Nikov, Christof Paar, Christian Rechberger, Peter Rombouts, Søren S. Thomsen, Tolga Yalçın, PRINCE – A Low-Latency Block Cipher for Pervasive Computing Applications Advances in Cryptology – ASIACRYPT 2012. pp. 208- 225 ,(2012) , 10.1007/978-3-642-34961-4_14
Roland Häggkvist, Tristan M. J. Denley, Armen S. Asratian, Bipartite graphs and their applications ,(1998)
Florence Jessie MacWilliams, Neil James Alexander Sloane, The Theory of Error-Correcting Codes ,(1977)
Eli Biham, Adi Shamir, Differential cryptanalysis of DES-like cryptosystems international cryptology conference. ,vol. 4, pp. 2- 21 ,(1990) , 10.1007/BF00630563