Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Modn cryptanalysis

From Wikipedia, the free encyclopedia
Attack applicable to block and stream ciphers
This article includes alist of references,related reading, orexternal links,but its sources remain unclear because it lacksinline citations. Please helpimprove this article byintroducing more precise citations.(August 2017) (Learn how and when to remove this message)

Incryptography,modn cryptanalysis is anattack applicable toblock andstream ciphers. It is a form ofpartitioning cryptanalysis that exploits unevenness in how thecipher operates overequivalence classes (congruence classes)modulon. The method was first suggested in 1999 byJohn Kelsey,Bruce Schneier, andDavid Wagner and applied to RC5P (a variant ofRC5) andM6 (a family of block ciphers used in theFireWire standard). These attacks used the properties of binary addition and bit rotation modulo aFermat prime.

Mod 3 analysis of RC5P

[edit]

For RC5P, analysis was conducted modulo 3. It was observed that the operations in the cipher (rotation and addition, both on 32-bit words) were somewhat biased over congruence classes mod 3. To illustrate the approach, consider left rotation by a single bit:

X1={2X,if X<2312X+1232,if X231{\displaystyle X\lll 1=\left\{{\begin{matrix}2X,&{\mbox{if }}X<2^{31}\\2X+1-2^{32},&{\mbox{if }}X\geq 2^{31}\end{matrix}}\right.}

Then, because

2321(mod3),{\displaystyle 2^{32}\equiv 1{\pmod {3}},\,}

it follows that

X12X(mod3).{\displaystyle X\lll 1\equiv 2X{\pmod {3}}.}

Thus left rotation by a single bit has a simple description modulo 3. Analysis of other operations (data dependent rotation and modular addition) reveals similar, notable biases. Although there are some theoretical problems analysing the operations in combination, the bias can be detected experimentally for the entire cipher. In (Kelsey et al., 1999), experiments were conducted up to seven rounds, and based on this they conjecture that as many as 19 or 20 rounds of RC5P can bedistinguished from random using this attack. There is also a corresponding method for recovering the secretkey.

Against M6 there are attacks mod 5 and mod 257 that are even more effective.

References

[edit]
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=Mod_n_cryptanalysis&oldid=1263968244"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp