SlideShare a Scribd company logo
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Algebraic Insights into the Secret Feistel Network
Léo Perrin1,2 Aleksei Udovenko1,2
1University of Luxembourg,
2SnT
March 22, 2016
1 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Outline
HDIM
LAT ANF
Distinguishing
Feistel Networks
Recovering
Whitening
Linear Layers
Impossible
Monomials
Attack
2 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
3 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Linear Approximation Table (LAT)
Definition (LAT, Fourier Transform, Walsh Spectrum)
The Linear Approximation Table of f : {0, 1}n → {0, 1}m is a
2n × 2m matrix L where
L[a, b] = #{x ∈ Fn
2, a · x = b · f (x)} − 2n−1
= −
1
2
x∈Fn
2
(−1)a·x⊕b·f (x)
.
4 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Jackson Pollock Representation of LAT
[Biryukov, Perrin CRYPTO2015]: graphical representation of LAT
to reverse-engineer S-Boxes.
S-Box F of Skipjack
5 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Jackson Pollock Representation of LAT
[Biryukov, Perrin CRYPTO2015]: graphical representation of LAT
to reverse-engineer S-Boxes.
S-Box F of Skipjack
4-round Feistel Network
with bijective functions
5 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
4-round Feistel Network
with bijective functions
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
4-round Feistel Network
with bijective functions
5-round Feistel Network
with bijective functions
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
6-round Feistel Network
with bijective functions
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4
Idea
Look at LAT modulo 4!
Why? LAT modulo 2k is related to algebraic degree.
6-round Feistel Network
with bijective functions
Random permutation
6 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
Explanation? It is a bilinear form!
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
Explanation? It is a bilinear form!
The following is true:
L[a, b]
2
≡
x∈Fn
2
b · F(x) a · x (mod 2). (1)
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Bilinear Form
LAT modulo 4 has highly linear patterns even for random
permutations.
Explanation? It is a bilinear form!
The following is true:
L[a, b]
2
≡
x∈Fn
2
b · F(x) a · x (mod 2). (1)
⇒ express L[a, b]/2 as a vector-matrix-vector product:
L[a, b]
2
≡ bT
× ˆH(F) × a (mod 2), (2)
where ˆH(F) is an n × n matrix over F2, such that
ˆH(F)[i, j] =
x∈Fn
2
ei · F(x) ej · x . (3)
7 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Another meaning of LAT modulo 4
Algebraic Normal Form (ANF)
Recall that any Boolean function f mapping n bits to 1 can be
represented in a unique way as:
f (x) =
u∈Fn
2
auxu
=
u∈Fn
2
au
i∈[0,n−1]
xui
i .
8 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Another meaning of LAT modulo 4
Algebraic Normal Form (ANF)
Recall that any Boolean function f mapping n bits to 1 can be
represented in a unique way as:
f (x) =
u∈Fn
2
auxu
=
u∈Fn
2
au
i∈[0,n−1]
xui
i .
Lemma (Another meaning of LAT modulo 4)
ˆH(F)[i, j] = 1 if and only if the ANF of ith bit of F contains the
monomial k=j xk (which has degree n − 1).
8 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
For one row/column we need 2n−1 data and 2n−1 time.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
For one row/column we need 2n−1 data and 2n−1 time.
For whole ˆH(F) we need full codebook and n2n−1 time.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
High-Degree Indicator Matrix
Definition (High-Degree Indicator Matrix)
We will call ˆH(F) High-Degree Indicator Matrix (HDIM).
Computing the HDIM
Each row or column of ˆH(F) is a ⊕-sum of F over a particular
cube of dimension n − 1.
For one row/column we need 2n−1 data and 2n−1 time.
For whole ˆH(F) we need full codebook and n2n−1 time.
Neglible memory complexity - n bits to store the sum.
9 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Properties of HDIM
Theorem (Linear transformations and HDIM)
Let µ, η be linear n-bit mappings, F be an n-bit permutation and
let G = η ◦ F ◦ µ. Then it holds that
ˆH(G) = η × ˆH(F) × (µt
)−1
.
10 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Properties of HDIM
Theorem (Linear transformations and HDIM)
Let µ, η be linear n-bit mappings, F be an n-bit permutation and
let G = η ◦ F ◦ µ. Then it holds that
ˆH(G) = η × ˆH(F) × (µt
)−1
.
Linear transformations applied to a permutation modify its
HDIM in a linear way.
We will use this Theorem to recover whitening linear layers.
10 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
11 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4 patterns
Recall the LAT modulo 4 patterns that we have spotted:
4-round Feistel Network
with bijective functions
5-round Feistel Network
with bijective functions
12 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
LAT modulo 4 patterns
Recall the LAT modulo 4 patterns that we have spotted:
Can be nicely rephrased in terms of HDIM.
4-round Feistel Network
with bijective functions
5-round Feistel Network
with bijective functions
12 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
HDIM Patterns in Feistel Networks
Theorem
Let Fr be r-round Feistel Network with bijective functions. Then
ˆH(F4
) =






0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 0 0 0
0 0 0 ? ? ?
0 0 0 ? ? ?
0 0 0 ? ? ?






ˆH(F5
) =






0 0 0 ? ? ?
0 0 0 ? ? ?
0 0 0 ? ? ?
? ? ? ? ? ?
? ? ? ? ? ?
? ? ? ? ? ?






Example is given for n = 3 (6-bit Feistel Network).
13 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
For non-bijective round functions, the results hold for one
round less.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
For non-bijective round functions, the results hold for one
round less.
Distinguisher for Feistel Networks: one HDIM row or column is
enough.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by Number of Rounds
Theorem
Let Fr
d be a Feistel Network with r rounds and degree d of
round functions.
Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter.
Assume that the round functions are permutations. Then
ˆH(Fr
d ) =
0 0
0 ?
, when θ(d, r) < 2n.
ˆH(Fr
d ) =
0 ?
? ?
, when θ(d, r − 1) < 2n.
For non-bijective round functions, the results hold for one
round less.
Distinguisher for Feistel Networks: one HDIM row or column is
enough. Weak compared to known distinguishers for up to 5
rounds, but can attack more rounds when the degree is low.
14 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
Change sum variables:
=
α||γ∈F2n
2
ei · g(α, γ) ej · h(α, γ) .
f r/2 −1
α γ
f r/2
β
f r/2 +1
hg
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
Change sum variables:
=
α||γ∈F2n
2
ei · g(α, γ) ej · h(α, γ) .
Calculate the degrees of h and g
straightforwardly and sum them.
f r/2 −1
α γ
f r/2
β
f r/2 +1
hg
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Proof Idea
Recall the equation for HDIM:
ˆH(F)[i, j] =
x∈F2n
2
ei · F(x) ej · x
Change sum variables:
=
α||γ∈F2n
2
ei · g(α, γ) ej · h(α, γ) .
Calculate the degrees of h and g
straightforwardly and sum them.
For bijective round functions, we can
get one round more by summing over
α and β.
f r/2 −1
α γ
f r/2
β
f r/2 +1
hg
15 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Feistel Network with Whitening Linear Layers
The AFrA structure:
Feistel Network with
r rounds and n-bit branches.
fi : secret and independent
random functions.
whitened with secret affine
layers Ain, Aout.
n bits n bits
Ain
f0
f1
fr−2
fr−1
Aout
16 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Feistel Network with Whitening Linear Layers
The AFrA structure:
Feistel Network with
r rounds and n-bit branches.
fi : secret and independent
random functions.
whitened with secret affine
layers Ain, Aout.
Cryptanalysis goals:
distinguish from random
permutation;
recover the secret
components.
n bits n bits
Ain
f0
f1
fr−2
fr−1
Aout
16 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
Then by properties of HDIM we have:
η−1
× ˆH(G) × µt
=
0 0
0 ?
.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
Then by properties of HDIM we have:
η−1
× ˆH(G) × µt
=
0 0
0 ?
.
Parts of η and µ merge into the Feistel structure, so we have
less unknowns and we can solve the system.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking AFr
A
Let F be a Feistel Network with r rounds, such that
ˆH(F) =
0 0
0 ?
(e.g. 4 rounds with bijective functions).
Let G = η ◦ F ◦ µ. That is, G is AFrA.
Then by properties of HDIM we have:
η−1
× ˆH(G) × µt
=
0 0
0 ?
.
Parts of η and µ merge into the Feistel structure, so we have
less unknowns and we can solve the system.
Distinguisher for AFrA and Partial recovery of linear layers.
Complexity is dominated by computing HDIM - n22n−1.
17 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
One of such cases is when the linear layers are inverses of each
other (A−1FrA).
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
One of such cases is when the linear layers are inverses of each
other (A−1FrA).
Another possible case is one-sided whitening: FrA.
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Attacking one round more
In some special cases we can attack one more round. Then we
will need only that ˆH(F) =
0 ?
? ?
(for example, 5 rounds
with bijective functions).
One of such cases is when the linear layers are inverses of each
other (A−1FrA).
Another possible case is one-sided whitening: FrA.
Partial recovery of linear layers for A−1FrA or FrA.
Complexity is dominated by computing HDIM - n22n−1.
18 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
19 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
This is an extreme case, we tried to cover more rounds, but we
recovered only surrounding linear layers.
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
This is an extreme case, we tried to cover more rounds, but we
recovered only surrounding linear layers.
Consider the case when ˆH(F) =
0 0
0 ?
. There are 3n2
impossible terms of degree n − 1. But there are more
impossible terms of lower degree.
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalizing to other ANF Monomials
Previously, we exploited predictable absence of particular terms
of degree n − 1 in the ANFs of some output bits (entries
ˆH(F)i,j = 0).
This is an extreme case, we tried to cover more rounds, but we
recovered only surrounding linear layers.
Consider the case when ˆH(F) =
0 0
0 ?
. There are 3n2
impossible terms of degree n − 1. But there are more
impossible terms of lower degree.
The predictable absence of such terms may be used to recover
a secret round function.
20 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (1/2)
Consider a 5-round Feistel Network F with bijective round
functions. Let f be the last round function.
au = 0
au = 1/0 au = 1/0
F5 F2 F1 F0
f0
f1
f2
21 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (1/2)
Consider a 5-round Feistel Network F with bijective round
functions. Let f be the last round function.
We can prove that there are more than 2n monomials which
can’t occur in the ANFs on right branch of the 4-round FN.
au = 0
au = 1/0 au = 1/0
F5 F2 F1 F0
f0
f1
f2
21 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (1/2)
Consider a 5-round Feistel Network F with bijective round
functions. Let f be the last round function.
We can prove that there are more than 2n monomials which
can’t occur in the ANFs on right branch of the 4-round FN.
This gives us information about the last round function f .
au = 0
au = 1/0 au = 1/0
F5 F2 F1 F0
f0
f1
f2
21 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (2/2)
We obtain a linear system with 2n unknowns (ANF coefficients
of fi ) and more than 2n equations.
22 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (2/2)
We obtain a linear system with 2n unknowns (ANF coefficients
of fi ) and more than 2n equations.
By solving the system we recover the secret round function f
(up to a XOR constant).
22 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Recovery attack on 5-round Feistel Network (2/2)
We obtain a linear system with 2n unknowns (ANF coefficients
of fi ) and more than 2n equations.
By solving the system we recover the secret round function f
(up to a XOR constant).
Complexity is dominated by generating the system and is
O(23n).
22 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
Theorem (Impossible Monomials in Feistel Networks)
Let F be a 2n-bit Feistel Network with r rounds and round
functions of degree at most d. If dr−2 < n, then there are at least
2n impossible monomials in the ANFs of right bits of F.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
Theorem (Impossible Monomials in Feistel Networks)
Let F be a 2n-bit Feistel Network with r rounds and round
functions of degree at most d. If dr−2 < n, then there are at least
2n impossible monomials in the ANFs of right bits of F.
Recovery attack when dr−3 < n. Note that the bound is not
tight, the previously described attack on 5 rounds does not
satisfy this condition.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Generalization by number of rounds
If the degrees of round functions are low, we can attack more
rounds.
Theorem (Impossible Monomials in Feistel Networks)
Let F be a 2n-bit Feistel Network with r rounds and round
functions of degree at most d. If dr−2 < n, then there are at least
2n impossible monomials in the ANFs of right bits of F.
Recovery attack when dr−3 < n. Note that the bound is not
tight, the previously described attack on 5 rounds does not
satisfy this condition.
Moreover, with low degrees there are less unknowns and we
need less impossible monomials.
23 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
24 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
Division Property allows to find cubes of dimension 2n − 1 (or
less) over which a given Feistel Network sums to zero.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
Division Property allows to find cubes of dimension 2n − 1 (or
less) over which a given Feistel Network sums to zero.
Such cubes correspond to the absent ANF coefficients of
degree 2n − 1 (or less) which correspond to zero items in
HDIM.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Relation with Division Property
Division Property is a tool for integral attacks introduced
recently by Todo.
Division Property allows to find cubes of dimension 2n − 1 (or
less) over which a given Feistel Network sums to zero.
Such cubes correspond to the absent ANF coefficients of
degree 2n − 1 (or less) which correspond to zero items in
HDIM.
The results for concrete Feistel Networks obtained by Todo are
very similar to ours.
25 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Plan
1 Introducing HDIM
2 HDIM in Feistel Networks
3 Impossible Monomials Attack
4 Division property
5 Conclusions
26 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Conclusions
HDIM
LAT ANF
Distinguishing
Feistel Networks
Recovering
Whitening
Linear Layers
Impossible
Monomials
Attack
27 / 27
Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions
Conclusions
HDIM
LAT ANF
Distinguishing
Feistel Networks
Recovering
Whitening
Linear Layers
Impossible
Monomials
Attack
Thank you!
27 / 27

More Related Content

What's hot

C programming session 01
C programming session 01C programming session 01
C programming session 01
AjayBahoriya
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd Iaetsd
 

What's hot (20)

Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
Joint Compensation of CIM3 and I/Q Imbalance in the Up-conversion Mixer with ...
 
Domain adaptation
Domain adaptationDomain adaptation
Domain adaptation
 
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES AlgorithmFPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
FPGA Implementation of SubByte & Inverse SubByte for AES Algorithm
 
C programming session 01
C programming session 01C programming session 01
C programming session 01
 
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...IRJET-  	  Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
IRJET- Implementation of Reversible Radix-2 FFT VLSI Architecture using P...
 
S.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zoneS.A.kalaiselvan- robust video data hiding at forbidden zone
S.A.kalaiselvan- robust video data hiding at forbidden zone
 
Ir2415241528
Ir2415241528Ir2415241528
Ir2415241528
 
High Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic MultiplierHigh Speed Area Efficient 8-point FFT using Vedic Multiplier
High Speed Area Efficient 8-point FFT using Vedic Multiplier
 
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
1.[1 5]implementation of pre compensation fuzzy for a cascade pid controller ...
 
Hufman coding basic
Hufman coding basicHufman coding basic
Hufman coding basic
 
Graphical Model Selection for Big Data
Graphical Model Selection for Big DataGraphical Model Selection for Big Data
Graphical Model Selection for Big Data
 
FPGA based BCH Decoder
FPGA based BCH DecoderFPGA based BCH Decoder
FPGA based BCH Decoder
 
Image compression models
Image compression modelsImage compression models
Image compression models
 
Assessment and linear programming under fuzzy conditions
Assessment and linear programming under fuzzy conditionsAssessment and linear programming under fuzzy conditions
Assessment and linear programming under fuzzy conditions
 
Graph Kernels for Chemical Informatics
Graph Kernels for Chemical InformaticsGraph Kernels for Chemical Informatics
Graph Kernels for Chemical Informatics
 
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization andIaetsd fpga implementation of cordic algorithm for pipelined fft realization and
Iaetsd fpga implementation of cordic algorithm for pipelined fft realization and
 
Transform coding
Transform codingTransform coding
Transform coding
 
20120140506008 2
20120140506008 220120140506008 2
20120140506008 2
 
Uic Montone Thesis
Uic Montone ThesisUic Montone Thesis
Uic Montone Thesis
 
UIC Thesis Montone
UIC Thesis MontoneUIC Thesis Montone
UIC Thesis Montone
 

Viewers also liked

Deepak bhalla cv word format
Deepak bhalla cv word formatDeepak bhalla cv word format
Deepak bhalla cv word format
Deepak Bhalla
 
Formats i composicions
Formats i composicionsFormats i composicions
Formats i composicions
martivmontoya
 
薏苡仁粉
薏苡仁粉薏苡仁粉
薏苡仁粉
mikejiang
 
开化龙顶
开化龙顶开化龙顶
开化龙顶
mikejiang
 
como insertar un power point
como insertar un power pointcomo insertar un power point
como insertar un power point
sdfbjkgfrfbjk
 

Viewers also liked (20)

引導討論:Facilitation
引導討論:Facilitation引導討論:Facilitation
引導討論:Facilitation
 
Deepak bhalla cv word format
Deepak bhalla cv word formatDeepak bhalla cv word format
Deepak bhalla cv word format
 
CyberLab CCEH Session - 17 Buffer Overflow
CyberLab CCEH Session - 17 Buffer OverflowCyberLab CCEH Session - 17 Buffer Overflow
CyberLab CCEH Session - 17 Buffer Overflow
 
Formats i composicions
Formats i composicionsFormats i composicions
Formats i composicions
 
薏苡仁粉
薏苡仁粉薏苡仁粉
薏苡仁粉
 
开化龙顶
开化龙顶开化龙顶
开化龙顶
 
como insertar un power point
como insertar un power pointcomo insertar un power point
como insertar un power point
 
NBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then iceNBTC#2 - Why instrumentation is cooler then ice
NBTC#2 - Why instrumentation is cooler then ice
 
MIT 教我的七堂課
MIT 教我的七堂課MIT 教我的七堂課
MIT 教我的七堂課
 
CyberLab CCEH Session - 8 Sniffers
CyberLab CCEH Session - 8 SniffersCyberLab CCEH Session - 8 Sniffers
CyberLab CCEH Session - 8 Sniffers
 
Huca marketing online
Huca marketing onlineHuca marketing online
Huca marketing online
 
linkdin
linkdinlinkdin
linkdin
 
D2-4 2012里山倡議研討會-貢寮1011116
D2-4 2012里山倡議研討會-貢寮1011116D2-4 2012里山倡議研討會-貢寮1011116
D2-4 2012里山倡議研討會-貢寮1011116
 
Exploits & Mitigations - Memory Corruption Techniques
Exploits & Mitigations - Memory Corruption TechniquesExploits & Mitigations - Memory Corruption Techniques
Exploits & Mitigations - Memory Corruption Techniques
 
案例示範:UberX、Airbnb
案例示範:UberX、Airbnb案例示範:UberX、Airbnb
案例示範:UberX、Airbnb
 
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
2011.10.21新營社大演講版 -鹽業:人與海洋的時空對話
 
Web cam sensing using sdk tool
Web cam sensing using sdk tool Web cam sensing using sdk tool
Web cam sensing using sdk tool
 
20161222 網路工具教學與應用
20161222 網路工具教學與應用20161222 網路工具教學與應用
20161222 網路工具教學與應用
 
山海國土議題盤點【原住民土地治理】林嘉男
山海國土議題盤點【原住民土地治理】林嘉男山海國土議題盤點【原住民土地治理】林嘉男
山海國土議題盤點【原住民土地治理】林嘉男
 
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
BSides LV 2016 - Beyond the tip of the iceberg - fuzzing binary protocols for...
 

Similar to Algebraic Insights into the Secret Feistel Network

AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdfAdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
Po-Chuan Chen
 
hankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijchankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijc
Vasilis Tsoulkas
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzer
butest
 
Manifold learning with application to object recognition
Manifold learning with application to object recognitionManifold learning with application to object recognition
Manifold learning with application to object recognition
zukun
 
Moim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionMoim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash function
IAEME Publication
 
Knoxville aug02-full
Knoxville aug02-fullKnoxville aug02-full
Knoxville aug02-full
douglaslyon
 

Similar to Algebraic Insights into the Secret Feistel Network (20)

Cr24608612
Cr24608612Cr24608612
Cr24608612
 
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdfAdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
AdaMix: Mixture-of-Adaptations for Parameter-efficient Model Tuning.pdf
 
Computer Network Assignment Help
Computer Network Assignment HelpComputer Network Assignment Help
Computer Network Assignment Help
 
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
Embedding of Poly Honeycomb Networks and the Metric dimension of Star of Davi...
 
Computer Science Assignment Help
Computer Science Assignment HelpComputer Science Assignment Help
Computer Science Assignment Help
 
Lecture 11 compiler ii
Lecture 11 compiler iiLecture 11 compiler ii
Lecture 11 compiler ii
 
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
Streaming Random Forest Learning in Spark and StreamDM with Heitor Murilogome...
 
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveFPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
FPGA Implementation of FIR Filter using Various Algorithms: A Retrospective
 
hankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijchankel_norm approximation_fir_ ijc
hankel_norm approximation_fir_ ijc
 
4g lte matlab
4g lte matlab4g lte matlab
4g lte matlab
 
Jörg Stelzer
Jörg StelzerJörg Stelzer
Jörg Stelzer
 
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksRelay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
 
Oops recap
Oops recapOops recap
Oops recap
 
Addressing Scenario
Addressing ScenarioAddressing Scenario
Addressing Scenario
 
Parallel External Memory Algorithms Applied to Generalized Linear Models
Parallel External Memory Algorithms Applied to Generalized Linear ModelsParallel External Memory Algorithms Applied to Generalized Linear Models
Parallel External Memory Algorithms Applied to Generalized Linear Models
 
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdfptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
ptu3-harvey-m-deitel-paul-j-deitel-tem-r-nieto-contributor-paul-j-deitel.pdf
 
Manifold learning with application to object recognition
Manifold learning with application to object recognitionManifold learning with application to object recognition
Manifold learning with application to object recognition
 
Proposal for adding Named Dimensions to HDF5 Arrays
Proposal for adding Named Dimensions to HDF5 ArraysProposal for adding Named Dimensions to HDF5 Arrays
Proposal for adding Named Dimensions to HDF5 Arrays
 
Moim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash functionMoim a novel design of cryptographic hash function
Moim a novel design of cryptographic hash function
 
Knoxville aug02-full
Knoxville aug02-fullKnoxville aug02-full
Knoxville aug02-full
 

Recently uploaded

Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...
Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...
Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...
Sérgio Sacani
 
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynypptAerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
sreddyrahul
 
THYROID-PARATHYROID medical surgical nursing
THYROID-PARATHYROID medical surgical nursingTHYROID-PARATHYROID medical surgical nursing
THYROID-PARATHYROID medical surgical nursing
Jocelyn Atis
 
Anemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditionsAnemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditions
muralinath2
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
AADYARAJPANDEY1
 

Recently uploaded (20)

insect taxonomy importance systematics and classification
insect taxonomy importance systematics and classificationinsect taxonomy importance systematics and classification
insect taxonomy importance systematics and classification
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 
Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...Multi-source connectivity as the driver of solar wind variability in the heli...
Multi-source connectivity as the driver of solar wind variability in the heli...
 
Constraints on Neutrino Natal Kicks from Black-Hole Binary VFTS 243
Constraints on Neutrino Natal Kicks from Black-Hole Binary VFTS 243Constraints on Neutrino Natal Kicks from Black-Hole Binary VFTS 243
Constraints on Neutrino Natal Kicks from Black-Hole Binary VFTS 243
 
electrochemical gas sensors and their uses.pptx
electrochemical gas sensors and their uses.pptxelectrochemical gas sensors and their uses.pptx
electrochemical gas sensors and their uses.pptx
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
 
INSIGHT Partner Profile: Tampere University
INSIGHT Partner Profile: Tampere UniversityINSIGHT Partner Profile: Tampere University
INSIGHT Partner Profile: Tampere University
 
NuGOweek 2024 full programme - hosted by Ghent University
NuGOweek 2024 full programme - hosted by Ghent UniversityNuGOweek 2024 full programme - hosted by Ghent University
NuGOweek 2024 full programme - hosted by Ghent University
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...
Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...
Gliese 12 b: A Temperate Earth-sized Planet at 12 pc Ideal for Atmospheric Tr...
 
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynypptAerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
 
THYROID-PARATHYROID medical surgical nursing
THYROID-PARATHYROID medical surgical nursingTHYROID-PARATHYROID medical surgical nursing
THYROID-PARATHYROID medical surgical nursing
 
Anemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditionsAnemia_ different types_causes_ conditions
Anemia_ different types_causes_ conditions
 
biotech-regenration of plants, pharmaceutical applications.pptx
biotech-regenration of plants, pharmaceutical applications.pptxbiotech-regenration of plants, pharmaceutical applications.pptx
biotech-regenration of plants, pharmaceutical applications.pptx
 
National Biodiversity protection initiatives and Convention on Biological Di...
National Biodiversity protection initiatives and  Convention on Biological Di...National Biodiversity protection initiatives and  Convention on Biological Di...
National Biodiversity protection initiatives and Convention on Biological Di...
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
Topography and sediments of the floor of the Bay of Bengal
Topography and sediments of the floor of the Bay of BengalTopography and sediments of the floor of the Bay of Bengal
Topography and sediments of the floor of the Bay of Bengal
 

Algebraic Insights into the Secret Feistel Network

  • 1. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Algebraic Insights into the Secret Feistel Network Léo Perrin1,2 Aleksei Udovenko1,2 1University of Luxembourg, 2SnT March 22, 2016 1 / 27
  • 2. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Outline HDIM LAT ANF Distinguishing Feistel Networks Recovering Whitening Linear Layers Impossible Monomials Attack 2 / 27
  • 3. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 3 / 27
  • 4. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Linear Approximation Table (LAT) Definition (LAT, Fourier Transform, Walsh Spectrum) The Linear Approximation Table of f : {0, 1}n → {0, 1}m is a 2n × 2m matrix L where L[a, b] = #{x ∈ Fn 2, a · x = b · f (x)} − 2n−1 = − 1 2 x∈Fn 2 (−1)a·x⊕b·f (x) . 4 / 27
  • 5. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Jackson Pollock Representation of LAT [Biryukov, Perrin CRYPTO2015]: graphical representation of LAT to reverse-engineer S-Boxes. S-Box F of Skipjack 5 / 27
  • 6. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Jackson Pollock Representation of LAT [Biryukov, Perrin CRYPTO2015]: graphical representation of LAT to reverse-engineer S-Boxes. S-Box F of Skipjack 4-round Feistel Network with bijective functions 5 / 27
  • 7. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 6 / 27
  • 8. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 4-round Feistel Network with bijective functions 6 / 27
  • 9. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 4-round Feistel Network with bijective functions 5-round Feistel Network with bijective functions 6 / 27
  • 10. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 6-round Feistel Network with bijective functions 6 / 27
  • 11. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 Idea Look at LAT modulo 4! Why? LAT modulo 2k is related to algebraic degree. 6-round Feistel Network with bijective functions Random permutation 6 / 27
  • 12. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. 7 / 27
  • 13. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. Explanation? It is a bilinear form! 7 / 27
  • 14. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. Explanation? It is a bilinear form! The following is true: L[a, b] 2 ≡ x∈Fn 2 b · F(x) a · x (mod 2). (1) 7 / 27
  • 15. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Bilinear Form LAT modulo 4 has highly linear patterns even for random permutations. Explanation? It is a bilinear form! The following is true: L[a, b] 2 ≡ x∈Fn 2 b · F(x) a · x (mod 2). (1) ⇒ express L[a, b]/2 as a vector-matrix-vector product: L[a, b] 2 ≡ bT × ˆH(F) × a (mod 2), (2) where ˆH(F) is an n × n matrix over F2, such that ˆH(F)[i, j] = x∈Fn 2 ei · F(x) ej · x . (3) 7 / 27
  • 16. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Another meaning of LAT modulo 4 Algebraic Normal Form (ANF) Recall that any Boolean function f mapping n bits to 1 can be represented in a unique way as: f (x) = u∈Fn 2 auxu = u∈Fn 2 au i∈[0,n−1] xui i . 8 / 27
  • 17. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Another meaning of LAT modulo 4 Algebraic Normal Form (ANF) Recall that any Boolean function f mapping n bits to 1 can be represented in a unique way as: f (x) = u∈Fn 2 auxu = u∈Fn 2 au i∈[0,n−1] xui i . Lemma (Another meaning of LAT modulo 4) ˆH(F)[i, j] = 1 if and only if the ANF of ith bit of F contains the monomial k=j xk (which has degree n − 1). 8 / 27
  • 18. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). 9 / 27
  • 19. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. 9 / 27
  • 20. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. For one row/column we need 2n−1 data and 2n−1 time. 9 / 27
  • 21. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. For one row/column we need 2n−1 data and 2n−1 time. For whole ˆH(F) we need full codebook and n2n−1 time. 9 / 27
  • 22. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions High-Degree Indicator Matrix Definition (High-Degree Indicator Matrix) We will call ˆH(F) High-Degree Indicator Matrix (HDIM). Computing the HDIM Each row or column of ˆH(F) is a ⊕-sum of F over a particular cube of dimension n − 1. For one row/column we need 2n−1 data and 2n−1 time. For whole ˆH(F) we need full codebook and n2n−1 time. Neglible memory complexity - n bits to store the sum. 9 / 27
  • 23. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Properties of HDIM Theorem (Linear transformations and HDIM) Let µ, η be linear n-bit mappings, F be an n-bit permutation and let G = η ◦ F ◦ µ. Then it holds that ˆH(G) = η × ˆH(F) × (µt )−1 . 10 / 27
  • 24. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Properties of HDIM Theorem (Linear transformations and HDIM) Let µ, η be linear n-bit mappings, F be an n-bit permutation and let G = η ◦ F ◦ µ. Then it holds that ˆH(G) = η × ˆH(F) × (µt )−1 . Linear transformations applied to a permutation modify its HDIM in a linear way. We will use this Theorem to recover whitening linear layers. 10 / 27
  • 25. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 11 / 27
  • 26. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 patterns Recall the LAT modulo 4 patterns that we have spotted: 4-round Feistel Network with bijective functions 5-round Feistel Network with bijective functions 12 / 27
  • 27. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions LAT modulo 4 patterns Recall the LAT modulo 4 patterns that we have spotted: Can be nicely rephrased in terms of HDIM. 4-round Feistel Network with bijective functions 5-round Feistel Network with bijective functions 12 / 27
  • 28. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions HDIM Patterns in Feistel Networks Theorem Let Fr be r-round Feistel Network with bijective functions. Then ˆH(F4 ) =       0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? 0 0 0 ? ? ? 0 0 0 ? ? ?       ˆH(F5 ) =       0 0 0 ? ? ? 0 0 0 ? ? ? 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?       Example is given for n = 3 (6-bit Feistel Network). 13 / 27
  • 29. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. 14 / 27
  • 30. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. 14 / 27
  • 31. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. 14 / 27
  • 32. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. For non-bijective round functions, the results hold for one round less. 14 / 27
  • 33. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. For non-bijective round functions, the results hold for one round less. Distinguisher for Feistel Networks: one HDIM row or column is enough. 14 / 27
  • 34. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by Number of Rounds Theorem Let Fr d be a Feistel Network with r rounds and degree d of round functions. Let θ(d, r) = d r/2 −1 + d r/2 −1 be a parameter. Assume that the round functions are permutations. Then ˆH(Fr d ) = 0 0 0 ? , when θ(d, r) < 2n. ˆH(Fr d ) = 0 ? ? ? , when θ(d, r − 1) < 2n. For non-bijective round functions, the results hold for one round less. Distinguisher for Feistel Networks: one HDIM row or column is enough. Weak compared to known distinguishers for up to 5 rounds, but can attack more rounds when the degree is low. 14 / 27
  • 35. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x 15 / 27
  • 36. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x Change sum variables: = α||γ∈F2n 2 ei · g(α, γ) ej · h(α, γ) . f r/2 −1 α γ f r/2 β f r/2 +1 hg 15 / 27
  • 37. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x Change sum variables: = α||γ∈F2n 2 ei · g(α, γ) ej · h(α, γ) . Calculate the degrees of h and g straightforwardly and sum them. f r/2 −1 α γ f r/2 β f r/2 +1 hg 15 / 27
  • 38. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Proof Idea Recall the equation for HDIM: ˆH(F)[i, j] = x∈F2n 2 ei · F(x) ej · x Change sum variables: = α||γ∈F2n 2 ei · g(α, γ) ej · h(α, γ) . Calculate the degrees of h and g straightforwardly and sum them. For bijective round functions, we can get one round more by summing over α and β. f r/2 −1 α γ f r/2 β f r/2 +1 hg 15 / 27
  • 39. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Feistel Network with Whitening Linear Layers The AFrA structure: Feistel Network with r rounds and n-bit branches. fi : secret and independent random functions. whitened with secret affine layers Ain, Aout. n bits n bits Ain f0 f1 fr−2 fr−1 Aout 16 / 27
  • 40. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Feistel Network with Whitening Linear Layers The AFrA structure: Feistel Network with r rounds and n-bit branches. fi : secret and independent random functions. whitened with secret affine layers Ain, Aout. Cryptanalysis goals: distinguish from random permutation; recover the secret components. n bits n bits Ain f0 f1 fr−2 fr−1 Aout 16 / 27
  • 41. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. 17 / 27
  • 42. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. Then by properties of HDIM we have: η−1 × ˆH(G) × µt = 0 0 0 ? . 17 / 27
  • 43. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. Then by properties of HDIM we have: η−1 × ˆH(G) × µt = 0 0 0 ? . Parts of η and µ merge into the Feistel structure, so we have less unknowns and we can solve the system. 17 / 27
  • 44. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking AFr A Let F be a Feistel Network with r rounds, such that ˆH(F) = 0 0 0 ? (e.g. 4 rounds with bijective functions). Let G = η ◦ F ◦ µ. That is, G is AFrA. Then by properties of HDIM we have: η−1 × ˆH(G) × µt = 0 0 0 ? . Parts of η and µ merge into the Feistel structure, so we have less unknowns and we can solve the system. Distinguisher for AFrA and Partial recovery of linear layers. Complexity is dominated by computing HDIM - n22n−1. 17 / 27
  • 45. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). 18 / 27
  • 46. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). One of such cases is when the linear layers are inverses of each other (A−1FrA). 18 / 27
  • 47. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). One of such cases is when the linear layers are inverses of each other (A−1FrA). Another possible case is one-sided whitening: FrA. 18 / 27
  • 48. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Attacking one round more In some special cases we can attack one more round. Then we will need only that ˆH(F) = 0 ? ? ? (for example, 5 rounds with bijective functions). One of such cases is when the linear layers are inverses of each other (A−1FrA). Another possible case is one-sided whitening: FrA. Partial recovery of linear layers for A−1FrA or FrA. Complexity is dominated by computing HDIM - n22n−1. 18 / 27
  • 49. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 19 / 27
  • 50. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). 20 / 27
  • 51. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). This is an extreme case, we tried to cover more rounds, but we recovered only surrounding linear layers. 20 / 27
  • 52. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). This is an extreme case, we tried to cover more rounds, but we recovered only surrounding linear layers. Consider the case when ˆH(F) = 0 0 0 ? . There are 3n2 impossible terms of degree n − 1. But there are more impossible terms of lower degree. 20 / 27
  • 53. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalizing to other ANF Monomials Previously, we exploited predictable absence of particular terms of degree n − 1 in the ANFs of some output bits (entries ˆH(F)i,j = 0). This is an extreme case, we tried to cover more rounds, but we recovered only surrounding linear layers. Consider the case when ˆH(F) = 0 0 0 ? . There are 3n2 impossible terms of degree n − 1. But there are more impossible terms of lower degree. The predictable absence of such terms may be used to recover a secret round function. 20 / 27
  • 54. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (1/2) Consider a 5-round Feistel Network F with bijective round functions. Let f be the last round function. au = 0 au = 1/0 au = 1/0 F5 F2 F1 F0 f0 f1 f2 21 / 27
  • 55. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (1/2) Consider a 5-round Feistel Network F with bijective round functions. Let f be the last round function. We can prove that there are more than 2n monomials which can’t occur in the ANFs on right branch of the 4-round FN. au = 0 au = 1/0 au = 1/0 F5 F2 F1 F0 f0 f1 f2 21 / 27
  • 56. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (1/2) Consider a 5-round Feistel Network F with bijective round functions. Let f be the last round function. We can prove that there are more than 2n monomials which can’t occur in the ANFs on right branch of the 4-round FN. This gives us information about the last round function f . au = 0 au = 1/0 au = 1/0 F5 F2 F1 F0 f0 f1 f2 21 / 27
  • 57. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (2/2) We obtain a linear system with 2n unknowns (ANF coefficients of fi ) and more than 2n equations. 22 / 27
  • 58. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (2/2) We obtain a linear system with 2n unknowns (ANF coefficients of fi ) and more than 2n equations. By solving the system we recover the secret round function f (up to a XOR constant). 22 / 27
  • 59. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Recovery attack on 5-round Feistel Network (2/2) We obtain a linear system with 2n unknowns (ANF coefficients of fi ) and more than 2n equations. By solving the system we recover the secret round function f (up to a XOR constant). Complexity is dominated by generating the system and is O(23n). 22 / 27
  • 60. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. 23 / 27
  • 61. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. Theorem (Impossible Monomials in Feistel Networks) Let F be a 2n-bit Feistel Network with r rounds and round functions of degree at most d. If dr−2 < n, then there are at least 2n impossible monomials in the ANFs of right bits of F. 23 / 27
  • 62. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. Theorem (Impossible Monomials in Feistel Networks) Let F be a 2n-bit Feistel Network with r rounds and round functions of degree at most d. If dr−2 < n, then there are at least 2n impossible monomials in the ANFs of right bits of F. Recovery attack when dr−3 < n. Note that the bound is not tight, the previously described attack on 5 rounds does not satisfy this condition. 23 / 27
  • 63. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Generalization by number of rounds If the degrees of round functions are low, we can attack more rounds. Theorem (Impossible Monomials in Feistel Networks) Let F be a 2n-bit Feistel Network with r rounds and round functions of degree at most d. If dr−2 < n, then there are at least 2n impossible monomials in the ANFs of right bits of F. Recovery attack when dr−3 < n. Note that the bound is not tight, the previously described attack on 5 rounds does not satisfy this condition. Moreover, with low degrees there are less unknowns and we need less impossible monomials. 23 / 27
  • 64. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 24 / 27
  • 65. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. 25 / 27
  • 66. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. Division Property allows to find cubes of dimension 2n − 1 (or less) over which a given Feistel Network sums to zero. 25 / 27
  • 67. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. Division Property allows to find cubes of dimension 2n − 1 (or less) over which a given Feistel Network sums to zero. Such cubes correspond to the absent ANF coefficients of degree 2n − 1 (or less) which correspond to zero items in HDIM. 25 / 27
  • 68. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Relation with Division Property Division Property is a tool for integral attacks introduced recently by Todo. Division Property allows to find cubes of dimension 2n − 1 (or less) over which a given Feistel Network sums to zero. Such cubes correspond to the absent ANF coefficients of degree 2n − 1 (or less) which correspond to zero items in HDIM. The results for concrete Feistel Networks obtained by Todo are very similar to ours. 25 / 27
  • 69. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Plan 1 Introducing HDIM 2 HDIM in Feistel Networks 3 Impossible Monomials Attack 4 Division property 5 Conclusions 26 / 27
  • 70. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Conclusions HDIM LAT ANF Distinguishing Feistel Networks Recovering Whitening Linear Layers Impossible Monomials Attack 27 / 27
  • 71. Introducing HDIM HDIM in Feistel Networks Impossible Monomials Attack Division property Conclusions Conclusions HDIM LAT ANF Distinguishing Feistel Networks Recovering Whitening Linear Layers Impossible Monomials Attack Thank you! 27 / 27