SlideShare a Scribd company logo
1 of 24
Bicliques for Preimages:
Attacks on Skein-512 and
the SHA-2 family
          Dmitry Khovratovich1 Christian Rechberger2
                    Alexandra Savelieva3
                         1 Microsoft   Research Redmond, USA
                                 2 DTU   MAT, Denmark
       3 National   Research University Higher School of Economics, Russia

19th International Workshop on Fast Software Encryption - FSE 2012
                        March 19-21, 2012
Recent Progress in Preimage
Attacks – MD4, MD5, and Tiger
                                                        2010
                           2009                 Guo, Ling, Rechberger,
                                                and Wang. Advanced
                                                meet-in-the-middle
   2008                Sasaki, Aoki: Finding    preimage attacks: First
                       Preimages in Full MD5    results on full Tiger, and
                       Faster Than Exhaustive   improved results on
Sasaki and Aoki.       Search. EUROCRYPT        MD4 and SHA-2.
Preimage attacks on    2009                     ASIACRYPT'10
step-reduced MD5.
ACISP'08.
                      Introduction of Initial Structure

Introduction of Splice-and-Cut Framework
                                                                             2
Recent Progress in Preimage
Attacks – SHA-x Family
                                                    2010
                       2009                 Guo, Ling, Rechberger,
                                            and Wang. Advanced
                                            meet-in-the-middle
  2008            Aoki and Sasaki. Meet-    preimage attacks: First
                  in-the-middle preimage    results on full Tiger, and
                  attacks against reduced   improved results on
                  SHA-0 and SHA-1.          MD4 and SHA-2.
                  CRYPTO'09.                ASIACRYPT'10.

                Introduction of Initial Structure

Introduction of Splice-and-Cut Framework
                                                                         3
Problem
• Concrete examples of the initial structure are
  extremely sophisticated and hard to generalize.
• Many ad-hoc / not formalized techniques are
  used to build initial structures
• While the other elements of splice-and-cut
  framework seem exhausted already, the concept
  behind initial structure has large potential and
  few boundaries.

                                                     4
Purpose of our Research
• To replace the idea of the initial structure with a
  more formal and generic concept
• To design generic algorithms for constructing the
  initial structure
• To reduce manual efforts and time to build the
  initial structure



                                                        5
Preimage Attacks
• Preimage attack on hash function.
  • Given h, find M: H(M) = f (M; IV ) = h
  • For an n-bit ideal hash function: complexity 2n
• Pseudo-preimage attack on compression function.
  • Given h, find M and CV: f (M; CV) = h.
  • For an n-bit ideal compression function: complexity 2n.
• Pseudo-preimage attacks yielding preimages
  • If a pseudo-preimage for the n-bit compression
    function is constructed in time 2x , x < n - 2, then the
    full preimage can be found in time 21+(n+x)/2 .
                                                               6
New attacks on Skein-512 and
the SHA-2 family
 Reference        Target     Steps              Complexity, 2x              Memory
                                      Pseudo-      Second        Preimage
                                     preimage     preimage
Our results      Skein-512    22       508          511             -         26
Our results      Skein-512    37      511.2           -             -         264
Our results      Skein-512    72        -          511.7            -        Negl.
Aoki et.al.’09   SHA-256      43      251.9        254.9          254.9       26
Our results      SHA-256      45       253         255.5          255.5       26
Our results      SHA-256      52       255            -             -         26
Aoki et.al.’09   SHA-512      46       509         511.5          511.5       26
Our results      SHA-512      50       509         511.5          511.5       24
Our results      SHA-512      57       511            -             -         26     7
Hash Functions with Merkle-
Damgård Structure
•   M is arbitrarily long
•   Iterative design
•   H(M) = f (M [s]; CV [s] )
•   CV[i+1] = f (M [i]; CV [i] )




                                   8
Compression Functions in Davies-
Meier Mode
• Blockcipher-based compression function:
                   f (M; CV) = EM(CV)  CV;
• where E is a block cipher keyed with scheduled input M




                                                           9
Splice-and-Cut Attacks:
Basic Strategy




                          10
Partial Matching and ~ Fixing




                                11
Initial Structure




                    12
Biclique – Formal Definition




                               13
Biclique of dimension 2 in the MITM
attack on a DM compression function




                                      14
How it works
• Suppose message M[1,3] is a preimage
Advantage
• The complexity of testing 22d messages for
  preimages:

    C = 2d(Cbackward + Cforward) + Cbicl [+ Crecheck ]

• One needs 2n-2d bicliques of dimension d to test
  2n preimage candidates.

                                                         16
Differential Perspective on
Bicliques
• Vast pool of already existing tools when it comes to
  finding differential trails in hash functions
• Very precise and economic use of degrees of
  freedom in the resulting attacks




                                                         17
Biclique Construction Algorithms
# Main idea             Application           Attacks
1 Fully specified or    Bicliques of          Reduced Skein
  truncated             arbitrary             hash function
  differential trails   dimension
2 Modification of       For the case when     Reduced
  Algorithm 1 for       we control internal   SHA-2 hash
  hash functions in     state and message     and
  DM mode               injections within     compression
                        the biclique          functions
3 Use rebound           For bicliques of      Reduced Skein
  approach to get       dimension 1           compression     18
  more rounds                                 function
Number of Attacked SHA-2 Hash
Function Rounds - Our Improvements
  Hash Chunks Partial         Partial     Initial   Total
function      matching        fixing    structure
SHA-256    29         7          3         4+2      43+2
SHA-512    29         7          8         2+4      46+4

• Compared to:
  • Aoki, Guo, Matusiewicz, Sasaki, and Wang. Preimages for
    step-reduced SHA-2. In ASIACRYPT’09.

                                                              19
Summary of Our Contributions
• Formalization of Initial Structure technique as a ‘Biclique’
   • 3 generic and flexible algorithms for constructing bicliques
   • differential perspective that allows for application of differential
     trails, message modification techniques etc. in splice-and-cut
     framework
• SHA-2 family
   • attack on 45-round SHA-256 and 50-round SHA-512 in the hash
     mode
   • attack on 52-round SHA-256 and 57-round SHA-512
     compression function
• SHA-3 finalist Skein
   • attack on 22 rounds of Skein-512 hash function
                                                                            20
   • attack on 37 rounds of Skein-512 compression function
   • MITM speed-up of brute force attack on 72 rounds of Skein-512
Results in Perspective
• We targeted a main security property, not some
  artificial distinguishing property.

• We have results on the real hash, not some
  pseudo-attacks, or results that only work with
  full access to compression function, cipher or
  permutation


                                                   21
Follow-up Work
• Biclique Cryptanalysis of the Full AES by Bogdanov,
  Khovratovich, and Rechberger (2011) - First application to
  block ciphers
• A Meet-in-the-Middle Attack on the Full KASUMI by Jia, Yu,
  and Wang (2011) - Exploits a new property of the cipher
• Narrow Bicliques: Cryptanalysis of Full IDEA by
  Khovratovich, Leurent, and Rechberger (2012) - Variants of
  attacks that are many million times faster than brute-force
• Even more results on: SQUARE (by Mala, 2011), IDEA (by
  Biham, Dunkelman, Keller, and Shamir, 2011), and ARIA (by
  Chen and Xu, 2012)                                            22
Future Work
• Application of the Biclique framework to other
  hash functions and block ciphers

• Generalization of the Biclique technique, e.g.
  identifying situations where a graph can be used
  that deviates from the Biclique definition.

• New design criteria for hash-functions based on
  their ability to resist meet-in-the-middle attacks
                                                       23
Questions?
Dmitry Khovratovich Christian Rechberger
          Alexandra Savelieva


                                           24

More Related Content

What's hot

Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionJunpei Kawamoto
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
 
Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...
Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...
Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...Kuntal Bhowmick
 
kaggle NFL 1st and Future - Impact Detection
kaggle NFL 1st and Future - Impact Detectionkaggle NFL 1st and Future - Impact Detection
kaggle NFL 1st and Future - Impact DetectionKazuyuki Miyazawa
 
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...Kuntal Bhowmick
 
Speech recognition using hidden markov model mee 03_19
Speech recognition using hidden markov model mee 03_19Speech recognition using hidden markov model mee 03_19
Speech recognition using hidden markov model mee 03_19NGUYEN_SPKT
 

What's hot (6)

Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based Encryption
 
Using NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key CryptographyUsing NP Problems to Share Keys in Secret-Key Cryptography
Using NP Problems to Share Keys in Secret-Key Cryptography
 
Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...
Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...
Multiple Choice Questions on JAVA (object oriented programming) bank 3 -- cla...
 
kaggle NFL 1st and Future - Impact Detection
kaggle NFL 1st and Future - Impact Detectionkaggle NFL 1st and Future - Impact Detection
kaggle NFL 1st and Future - Impact Detection
 
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
Multiple Choice Questions on JAVA (object oriented programming) bank 2 -- bas...
 
Speech recognition using hidden markov model mee 03_19
Speech recognition using hidden markov model mee 03_19Speech recognition using hidden markov model mee 03_19
Speech recognition using hidden markov model mee 03_19
 

Viewers also liked

GeoDesign for Sustainable Development
GeoDesign for Sustainable DevelopmentGeoDesign for Sustainable Development
GeoDesign for Sustainable DevelopmentTom Gardner
 
Wassic Presentation ArcGIS Online 2012 05 18
Wassic Presentation ArcGIS Online   2012 05 18Wassic Presentation ArcGIS Online   2012 05 18
Wassic Presentation ArcGIS Online 2012 05 18Tom Gardner
 
Perth Esri Australia SIBA DIGO Presentation
Perth Esri Australia SIBA DIGO PresentationPerth Esri Australia SIBA DIGO Presentation
Perth Esri Australia SIBA DIGO PresentationTom Gardner
 
GeoDesign for Civic Engagement and Sustainable Development
GeoDesign for Civic Engagement and Sustainable DevelopmentGeoDesign for Civic Engagement and Sustainable Development
GeoDesign for Civic Engagement and Sustainable DevelopmentTom Gardner
 
Segundo reto en point
Segundo  reto en pointSegundo  reto en point
Segundo reto en pointanalis8
 
GeoDesign for Collaborative Planning
GeoDesign for Collaborative PlanningGeoDesign for Collaborative Planning
GeoDesign for Collaborative PlanningTom Gardner
 
Euler circuits and dna sequencing by hybridization
Euler circuits and dna sequencing by hybridizationEuler circuits and dna sequencing by hybridization
Euler circuits and dna sequencing by hybridizationMountville Mills
 
The Journey of Geo Enablement
The Journey of Geo EnablementThe Journey of Geo Enablement
The Journey of Geo EnablementTom Gardner
 
Morgan birthday
Morgan birthdayMorgan birthday
Morgan birthdaycvas
 
CS_GA2009_Paper
CS_GA2009_PaperCS_GA2009_Paper
CS_GA2009_PaperAlexandra
 
Developers.IO 2016 | 疎結合で非同期なチーム開発
Developers.IO 2016 | 疎結合で非同期なチーム開発Developers.IO 2016 | 疎結合で非同期なチーム開発
Developers.IO 2016 | 疎結合で非同期なチーム開発Motokatsu Matsui
 
Applied linguistic
Applied linguisticApplied linguistic
Applied linguisticVui Nguyen
 
second language acquisition
second language acquisitionsecond language acquisition
second language acquisitionVui Nguyen
 

Viewers also liked (18)

GeoDesign for Sustainable Development
GeoDesign for Sustainable DevelopmentGeoDesign for Sustainable Development
GeoDesign for Sustainable Development
 
Wassic Presentation ArcGIS Online 2012 05 18
Wassic Presentation ArcGIS Online   2012 05 18Wassic Presentation ArcGIS Online   2012 05 18
Wassic Presentation ArcGIS Online 2012 05 18
 
Cases
CasesCases
Cases
 
O2ne draft white
O2ne draft whiteO2ne draft white
O2ne draft white
 
Perth Esri Australia SIBA DIGO Presentation
Perth Esri Australia SIBA DIGO PresentationPerth Esri Australia SIBA DIGO Presentation
Perth Esri Australia SIBA DIGO Presentation
 
GeoDesign for Civic Engagement and Sustainable Development
GeoDesign for Civic Engagement and Sustainable DevelopmentGeoDesign for Civic Engagement and Sustainable Development
GeoDesign for Civic Engagement and Sustainable Development
 
Apresentação ShareNext
Apresentação ShareNextApresentação ShareNext
Apresentação ShareNext
 
Segundo reto en point
Segundo  reto en pointSegundo  reto en point
Segundo reto en point
 
GeoDesign for Collaborative Planning
GeoDesign for Collaborative PlanningGeoDesign for Collaborative Planning
GeoDesign for Collaborative Planning
 
Euler circuits and dna sequencing by hybridization
Euler circuits and dna sequencing by hybridizationEuler circuits and dna sequencing by hybridization
Euler circuits and dna sequencing by hybridization
 
The Journey of Geo Enablement
The Journey of Geo EnablementThe Journey of Geo Enablement
The Journey of Geo Enablement
 
Morgan birthday
Morgan birthdayMorgan birthday
Morgan birthday
 
CS_GA2009_Paper
CS_GA2009_PaperCS_GA2009_Paper
CS_GA2009_Paper
 
Spp process
Spp processSpp process
Spp process
 
俺のLambda
俺のLambda俺のLambda
俺のLambda
 
Developers.IO 2016 | 疎結合で非同期なチーム開発
Developers.IO 2016 | 疎結合で非同期なチーム開発Developers.IO 2016 | 疎結合で非同期なチーム開発
Developers.IO 2016 | 疎結合で非同期なチーム開発
 
Applied linguistic
Applied linguisticApplied linguistic
Applied linguistic
 
second language acquisition
second language acquisitionsecond language acquisition
second language acquisition
 

Similar to Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family

MCA Daemon: Hybrid Throughput Analysis Beyond Basic Blocks
MCA Daemon: Hybrid Throughput Analysis Beyond Basic BlocksMCA Daemon: Hybrid Throughput Analysis Beyond Basic Blocks
MCA Daemon: Hybrid Throughput Analysis Beyond Basic BlocksMin-Yih Hsu
 
Replatforming Legacy Packaged Applications: Block-by-Block with Minecraft
Replatforming Legacy Packaged Applications: Block-by-Block with MinecraftReplatforming Legacy Packaged Applications: Block-by-Block with Minecraft
Replatforming Legacy Packaged Applications: Block-by-Block with MinecraftVMware Tanzu
 
Grow and Shrink - Dynamically Extending the Ruby VM Stack
Grow and Shrink - Dynamically Extending the Ruby VM StackGrow and Shrink - Dynamically Extending the Ruby VM Stack
Grow and Shrink - Dynamically Extending the Ruby VM StackKeitaSugiyama1
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionIJORCS
 
Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Databricks
 
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakLearn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakPyData
 
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat Security Conference
 
Narrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullideaNarrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullideaRifad Mohamed
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSkyhigh Networks
 
(CMP305) Deep Learning on AWS Made EasyCmp305
(CMP305) Deep Learning on AWS Made EasyCmp305(CMP305) Deep Learning on AWS Made EasyCmp305
(CMP305) Deep Learning on AWS Made EasyCmp305Amazon Web Services
 
Micro-Architectural Attacks on Cyber-Physical Systems
Micro-Architectural Attacks on Cyber-Physical SystemsMicro-Architectural Attacks on Cyber-Physical Systems
Micro-Architectural Attacks on Cyber-Physical SystemsHeechul Yun
 
Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...
Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...
Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...Sung Kim
 
Recent Advances in Kernel-Based Graph Classification
Recent Advances in Kernel-Based Graph ClassificationRecent Advances in Kernel-Based Graph Classification
Recent Advances in Kernel-Based Graph ClassificationChristopher Morris
 
32 dynamic linking nd overlays
32 dynamic linking nd overlays32 dynamic linking nd overlays
32 dynamic linking nd overlaysmyrajendra
 
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...Sangwoo Mo
 
Learning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method NamesLearning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method NamesDongsun Kim
 
Challenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkChallenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkDatabricks
 
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengChallenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengDatabricks
 

Similar to Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family (20)

MCA Daemon: Hybrid Throughput Analysis Beyond Basic Blocks
MCA Daemon: Hybrid Throughput Analysis Beyond Basic BlocksMCA Daemon: Hybrid Throughput Analysis Beyond Basic Blocks
MCA Daemon: Hybrid Throughput Analysis Beyond Basic Blocks
 
Replatforming Legacy Packaged Applications: Block-by-Block with Minecraft
Replatforming Legacy Packaged Applications: Block-by-Block with MinecraftReplatforming Legacy Packaged Applications: Block-by-Block with Minecraft
Replatforming Legacy Packaged Applications: Block-by-Block with Minecraft
 
Grow and Shrink - Dynamically Extending the Ruby VM Stack
Grow and Shrink - Dynamically Extending the Ruby VM StackGrow and Shrink - Dynamically Extending the Ruby VM Stack
Grow and Shrink - Dynamically Extending the Ruby VM Stack
 
Algebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression FunctionAlgebraic Fault Attack on the SHA-256 Compression Function
Algebraic Fault Attack on the SHA-256 Compression Function
 
Report
ReportReport
Report
 
Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™Web-Scale Graph Analytics with Apache® Spark™
Web-Scale Graph Analytics with Apache® Spark™
 
lec16-memory.ppt
lec16-memory.pptlec16-memory.ppt
lec16-memory.ppt
 
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr TeterwakLearn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
Learn to Build an App to Find Similar Images using Deep Learning- Piotr Teterwak
 
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
BlueHat v18 || Record now, decrypt later - future quantum computers are a pre...
 
Narrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullideaNarrow bicliques cryptanalysisoffullidea
Narrow bicliques cryptanalysisoffullidea
 
Searching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done RightSearching Encrypted Cloud Data: Academia and Industry Done Right
Searching Encrypted Cloud Data: Academia and Industry Done Right
 
(CMP305) Deep Learning on AWS Made EasyCmp305
(CMP305) Deep Learning on AWS Made EasyCmp305(CMP305) Deep Learning on AWS Made EasyCmp305
(CMP305) Deep Learning on AWS Made EasyCmp305
 
Micro-Architectural Attacks on Cyber-Physical Systems
Micro-Architectural Attacks on Cyber-Physical SystemsMicro-Architectural Attacks on Cyber-Physical Systems
Micro-Architectural Attacks on Cyber-Physical Systems
 
Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...
Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...
Puzzle-Based Automatic Testing: Bringing Humans Into the Loop by Solving Puzz...
 
Recent Advances in Kernel-Based Graph Classification
Recent Advances in Kernel-Based Graph ClassificationRecent Advances in Kernel-Based Graph Classification
Recent Advances in Kernel-Based Graph Classification
 
32 dynamic linking nd overlays
32 dynamic linking nd overlays32 dynamic linking nd overlays
32 dynamic linking nd overlays
 
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
A Unified Framework for Computer Vision Tasks: (Conditional) Generative Model...
 
Learning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method NamesLearning to Spot and Refactor Inconsistent Method Names
Learning to Spot and Refactor Inconsistent Method Names
 
Challenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache SparkChallenging Web-Scale Graph Analytics with Apache Spark
Challenging Web-Scale Graph Analytics with Apache Spark
 
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui MengChallenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
Challenging Web-Scale Graph Analytics with Apache Spark with Xiangrui Meng
 

Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family

  • 1. Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family Dmitry Khovratovich1 Christian Rechberger2 Alexandra Savelieva3 1 Microsoft Research Redmond, USA 2 DTU MAT, Denmark 3 National Research University Higher School of Economics, Russia 19th International Workshop on Fast Software Encryption - FSE 2012 March 19-21, 2012
  • 2. Recent Progress in Preimage Attacks – MD4, MD5, and Tiger 2010 2009 Guo, Ling, Rechberger, and Wang. Advanced meet-in-the-middle 2008 Sasaki, Aoki: Finding preimage attacks: First Preimages in Full MD5 results on full Tiger, and Faster Than Exhaustive improved results on Sasaki and Aoki. Search. EUROCRYPT MD4 and SHA-2. Preimage attacks on 2009 ASIACRYPT'10 step-reduced MD5. ACISP'08. Introduction of Initial Structure Introduction of Splice-and-Cut Framework 2
  • 3. Recent Progress in Preimage Attacks – SHA-x Family 2010 2009 Guo, Ling, Rechberger, and Wang. Advanced meet-in-the-middle 2008 Aoki and Sasaki. Meet- preimage attacks: First in-the-middle preimage results on full Tiger, and attacks against reduced improved results on SHA-0 and SHA-1. MD4 and SHA-2. CRYPTO'09. ASIACRYPT'10. Introduction of Initial Structure Introduction of Splice-and-Cut Framework 3
  • 4. Problem • Concrete examples of the initial structure are extremely sophisticated and hard to generalize. • Many ad-hoc / not formalized techniques are used to build initial structures • While the other elements of splice-and-cut framework seem exhausted already, the concept behind initial structure has large potential and few boundaries. 4
  • 5. Purpose of our Research • To replace the idea of the initial structure with a more formal and generic concept • To design generic algorithms for constructing the initial structure • To reduce manual efforts and time to build the initial structure 5
  • 6. Preimage Attacks • Preimage attack on hash function. • Given h, find M: H(M) = f (M; IV ) = h • For an n-bit ideal hash function: complexity 2n • Pseudo-preimage attack on compression function. • Given h, find M and CV: f (M; CV) = h. • For an n-bit ideal compression function: complexity 2n. • Pseudo-preimage attacks yielding preimages • If a pseudo-preimage for the n-bit compression function is constructed in time 2x , x < n - 2, then the full preimage can be found in time 21+(n+x)/2 . 6
  • 7. New attacks on Skein-512 and the SHA-2 family Reference Target Steps Complexity, 2x Memory Pseudo- Second Preimage preimage preimage Our results Skein-512 22 508 511 - 26 Our results Skein-512 37 511.2 - - 264 Our results Skein-512 72 - 511.7 - Negl. Aoki et.al.’09 SHA-256 43 251.9 254.9 254.9 26 Our results SHA-256 45 253 255.5 255.5 26 Our results SHA-256 52 255 - - 26 Aoki et.al.’09 SHA-512 46 509 511.5 511.5 26 Our results SHA-512 50 509 511.5 511.5 24 Our results SHA-512 57 511 - - 26 7
  • 8. Hash Functions with Merkle- Damgård Structure • M is arbitrarily long • Iterative design • H(M) = f (M [s]; CV [s] ) • CV[i+1] = f (M [i]; CV [i] ) 8
  • 9. Compression Functions in Davies- Meier Mode • Blockcipher-based compression function: f (M; CV) = EM(CV)  CV; • where E is a block cipher keyed with scheduled input M 9
  • 11. Partial Matching and ~ Fixing 11
  • 13. Biclique – Formal Definition 13
  • 14. Biclique of dimension 2 in the MITM attack on a DM compression function 14
  • 15. How it works • Suppose message M[1,3] is a preimage
  • 16. Advantage • The complexity of testing 22d messages for preimages: C = 2d(Cbackward + Cforward) + Cbicl [+ Crecheck ] • One needs 2n-2d bicliques of dimension d to test 2n preimage candidates. 16
  • 17. Differential Perspective on Bicliques • Vast pool of already existing tools when it comes to finding differential trails in hash functions • Very precise and economic use of degrees of freedom in the resulting attacks 17
  • 18. Biclique Construction Algorithms # Main idea Application Attacks 1 Fully specified or Bicliques of Reduced Skein truncated arbitrary hash function differential trails dimension 2 Modification of For the case when Reduced Algorithm 1 for we control internal SHA-2 hash hash functions in state and message and DM mode injections within compression the biclique functions 3 Use rebound For bicliques of Reduced Skein approach to get dimension 1 compression 18 more rounds function
  • 19. Number of Attacked SHA-2 Hash Function Rounds - Our Improvements Hash Chunks Partial Partial Initial Total function matching fixing structure SHA-256 29 7 3 4+2 43+2 SHA-512 29 7 8 2+4 46+4 • Compared to: • Aoki, Guo, Matusiewicz, Sasaki, and Wang. Preimages for step-reduced SHA-2. In ASIACRYPT’09. 19
  • 20. Summary of Our Contributions • Formalization of Initial Structure technique as a ‘Biclique’ • 3 generic and flexible algorithms for constructing bicliques • differential perspective that allows for application of differential trails, message modification techniques etc. in splice-and-cut framework • SHA-2 family • attack on 45-round SHA-256 and 50-round SHA-512 in the hash mode • attack on 52-round SHA-256 and 57-round SHA-512 compression function • SHA-3 finalist Skein • attack on 22 rounds of Skein-512 hash function 20 • attack on 37 rounds of Skein-512 compression function • MITM speed-up of brute force attack on 72 rounds of Skein-512
  • 21. Results in Perspective • We targeted a main security property, not some artificial distinguishing property. • We have results on the real hash, not some pseudo-attacks, or results that only work with full access to compression function, cipher or permutation 21
  • 22. Follow-up Work • Biclique Cryptanalysis of the Full AES by Bogdanov, Khovratovich, and Rechberger (2011) - First application to block ciphers • A Meet-in-the-Middle Attack on the Full KASUMI by Jia, Yu, and Wang (2011) - Exploits a new property of the cipher • Narrow Bicliques: Cryptanalysis of Full IDEA by Khovratovich, Leurent, and Rechberger (2012) - Variants of attacks that are many million times faster than brute-force • Even more results on: SQUARE (by Mala, 2011), IDEA (by Biham, Dunkelman, Keller, and Shamir, 2011), and ARIA (by Chen and Xu, 2012) 22
  • 23. Future Work • Application of the Biclique framework to other hash functions and block ciphers • Generalization of the Biclique technique, e.g. identifying situations where a graph can be used that deviates from the Biclique definition. • New design criteria for hash-functions based on their ability to resist meet-in-the-middle attacks 23
  • 24. Questions? Dmitry Khovratovich Christian Rechberger Alexandra Savelieva 24