Advertisement

Determining Cryptographic Distinguishers for eStream and SHA-3 Candidate Functions with Evolutionary Circuits

  • Petr Švenda
  • Martin Ukrop
  • Vashek Matyáš
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 456)

Abstract

Cryptanalysis of a cryptographic function usually requires advanced cryptanalytical skills and extensive amount of human labor with an option of using randomness testing suites like STS NIST [1] or Dieharder [2]. These can be applied to test statistical properties of cryptographic function outputs. We propose a more open approach based on software circuit that acts as a testing function automatically evolved by a stochastic optimization algorithm. Information leaked during cryptographic function evaluation is used to find a distinguisher [4] of outputs produced by 25 candidate algorithms for eStream and SHA-3 competition from truly random sequences. We obtained similar results (with some exceptions) as those produced by STS NIST and Dieharder tests w.r.t. the number of rounds of the inspected algorithm.

Keywords

eStream Genetic programming Random distinguisher Randomness statistical testing Software circuit 

Notes

Acknowledgments

This work was supported by the GAP202/11/0422 project of the Czech Science Foundation. The access to computing and storage facilities owned by parties and projects contributing to the National Grid Infrastructure MetaCentrum, provided under the program Projects of Large Infrastructure for Research, Development, and Innovations (LM2010005) is highly appreciated.

References

  1. 1.
    Rukhin, A.: A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, version STS-2.1. NIST Special Publication 800–22rev1a (2010)Google Scholar
  2. 2.
    Brown, R.G.: Dieharder: A random number test suite, version 3.31.1 (2004)Google Scholar
  3. 3.
    Svenda, P., Ukrop, M., Matyas, V.: Towards cryptographic function distinguishers with evolutionary circuits. In: SECRYPT, pp. 135–146 (2013)Google Scholar
  4. 4.
    Englund, H., Hell, M., Johansson, T.: A note on distinguishing attacks. In: 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks, pp. 1–4. IEEE (2007)Google Scholar
  5. 5.
    SHA-3 competition, announced 2.11.2007 (2007)Google Scholar
  6. 6.
    ECRYPT: Ecrypt estream competition, announced November 2004 (2004)Google Scholar
  7. 7.
    EACirc project (2013). https://github.com/petrs/eacirc
  8. 8.
    Turan, M.S., Doǧanaksoy, A., Çalik, Ç.: Detailed statistical analysis of synchronous stream ciphers. In: ECRYPT Workshop on the State of the Art of Stream Ciphers (SASC’06) (2006)Google Scholar
  9. 9.
    Doganaksoy, A., Ege, B., Koçak, O., Sulak, F.: Statistical analysis of reduced round compression functions of SHA-3 second round candidates. Technical report, Institute of Applied Mathematics, Middle East Technical University, Turkey (2010)Google Scholar
  10. 10.
    Sulak, F., Doğanaksoy, A., Ege, B., Koçak, O.: Evaluation of randomness test results for short sequences. In: Carlet, C., Pott, A. (eds.) SETA 2010. LNCS, vol. 6338, pp. 309–319. Springer, Heidelberg (2010) CrossRefGoogle Scholar
  11. 11.
    Kaminsky, A.: GPU parallel statistical and cube test analysis of the SHA-3 finalist candidate hash functions. In: 15th SIAM Conference on Parallel Processing for Scientific Computing (PP12), SIAM (2012)Google Scholar
  12. 12.
    Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009) CrossRefGoogle Scholar
  13. 13.
    Delman, B.: Genetic algorithms in cryptography. Ph.D. thesis, Rochester Institute of Technology (2004)Google Scholar
  14. 14.
    Picek, S., Golub, M.: On evolutionary computation methods in cryptography. In: MIPRO, 2011 Proceedings of the 34th International Convention, pp. 1496–1501 (2011)Google Scholar
  15. 15.
    Garrett, A., Hamilton, J., Dozier, G.: A comparison of genetic algorithm techniques for the cryptanalysis of tea. Int. J. Intell. Control Syst. 12, 325–330 (2007)Google Scholar
  16. 16.
    Wheeler, D., Needham, R.: TEA, a tiny encryption algorithm. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 363–366. Springer, Heidelberg (1995) CrossRefGoogle Scholar
  17. 17.
    Castro, J.C.H., Viñuela, P.I.: New results on the genetic cryptanalysis of TEA and reduced-round versions of XTEA. New Gen. Comput. 23, 233–243 (2005)CrossRefMATHGoogle Scholar
  18. 18.
    Hu, W.: Cryptanalysis of TEA using quantum-inspired genetic algorithms. J. Softw. Eng. Appl. 3, 50–57 (2010)CrossRefGoogle Scholar
  19. 19.
    Banzhaf, W., Nordin, P., Keller, R.E., Francone, F.D.: Genetic programming: an introduction: on the automatic evolution of computer programs and its applications (1997)Google Scholar
  20. 20.
    Yao, A.C.: Theory and application of trapdoor functions. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, SFCS ’82, pp. 80–91. IEEE Computer Society, Washington, DC (1982)Google Scholar
  21. 21.
    Webster, A.F., Tavares, S.E.: On the design of S-boxes. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 523–534. Springer, Heidelberg (1986) Google Scholar
  22. 22.
    Stevanović, R., Topić, G., Skala, K., Stipčević, M., Rogina, B.M.: Quantum random bit generator service for Monte Carlo and other stochastic simulations. In: Lirkov, I., Margenov, S., Waśniewski, J. (eds.) LSSC 2007. LNCS, vol. 4818, pp. 508–515. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  23. 23.
    EQRNG Service, H.u. (2014). http://qrng.physik.hu-berlin.de/
  24. 24.
    Ukrop, M.: Usage of evolvable circuit for statistical testing of randomness. Bachelor thesis, Masaryk university (2013)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Masaryk UniversityBrnoCzech Republic

Personalised recommendations