ON SOME SCIENTIFIC PROBLEMS IN CRYPTANALYSIS OF SYMMETRIC ALGORITHMS
Abstract
A survey of some important scientific directions in the sphere of symmetric cryptography is presented. We emphasize problems connected with weak keys, with statistical analysis of symmetric algorithms and with investigation of iterative constructions. Some problems, specific to stream ciphers, iterative block ciphers and cryptographic hash-functions are considered. We also advocate practical significance of scientific work in cryptanalysis and sketch its basic principles.
About the Authors
A. I. PestunovRussian Federation
Pestunov Andrey I., Candidate of Physical and Mathematical Sciences, Associate Professor
A. A. Perov
Russian Federation
Perov Artem A., postgraduate
T. M. Pestunova
Russian Federation
Pestunova Tamara M., Candidate of Technical Sciences, Associate Professor
References
1. Agibalov G.P. Logicheskie uravnenija v kriptoanalize generatorov kljuchevogo potoka // Vestnik Tomskogo universiteta. Prilozhenie. 2003. № 6. P. 42–49.
2. Agibalov G.P. Metody reshenija sistem polinomial’nyh uravnenij nad konechnym polem // Vestnik Tomskogo universiteta. Prilozhenie. 2006. № 17. P. 47–52.
3. Agibalov G.P. Jelementy teorii differencial’nogo kriptoanaliza iterativnyh blochnyh shifrov s additivnym raundovym kljuchom // Prikladnaja diskretnaja matematika. 2008. № 1. P. 34–42.
4. Doroshenko S.A., Lubkin A.M., Monarev V.A. i dr. Ataka na potokovye shifry RC4 i ZK-CRYPT s ispol’zovaniem testa «Stopka knig» // Vestnik SibGUTI. 2007. № 1. P. 31–34.
5. Pestunov A.I. Differencial’nyj kriptoanaliz blochnogo shifra CAST-256 // Bezopasnost’ informacionnyh tehnologij. 2009. № 4. P. 57–62. 6. Pestunov A.I. Differencial’nyj kriptoanaliz blochnogo shifra MARS // Prikladnaja diskretnaja matematika. 2009. № 4. P. 56–63.
6. Pestunov A.I. Statisticheskij analiz sovremennyh blochnyh shifrov // Vychislitel’nye tehnologii. 2007. T. 12. № 2. P. 122–129.
7. Pudovkina M.A., Horuzhenko G.I. O klassah slabyh kljuchej obobshhennoj shifrsistemy PRINT // Matematicheskie voprosy kriptografii. 2013. T. 4. № 2. P. 113–125.
8. Rjabko B.Ja., Monarev V.A., Shokin Ju.V. Novyj tip atak na blokovye shifry // Problemy peredachi informacii. 2005. T. 41. № 4. P. 97–107.
9. Rjabko B.Ja., Stognienko V.S., Shokin Ju.I. Adaptivnyj kriterij hi-kvadrat dlja razlichenija blizkih gipotez pri bol’shom chisle klassov i ego primenenie k nekotorym zadacham kriptografii // Problemy peredachi informacii. 2003. T. 39. № 2. P. 207–215.
10. Rjabko B.Ja., Fionov A.N. Osnovy sovremennoj kriptografii i steganografii // M.: Gorjachaja linija-Telekom, 2010. 232 p.
11. Fergjuson N., Shnajer B. Prakticheskaja kriptografija. M.: Izdatel’skij dom «Vil’jams», 2005. 424 p.
12. Cheremushkin A.V. Kriptograficheskie protokoly. Osnovnye svojstva i ujazvimosti: ucheb. posobie dlja stud. uchrezhdenij vyssh. prof. obrazovanija. M.: Izdatel’skij centr «Akademija», 2009. 272 p.
13. Shennon K. Raboty po teorii informacii i kibernetike. M.: Izdatel’stvo inostrannoj literatury, 1963. 830 p.
14. Aerts W., Biham E., Dunkelman O. et al. A practical attack on KeeLoq // Journal of Cryptology. 2012. Vol. 25. P. 136–157.
15. Biham E., Dunkelman O., Keller N., Shamir A. New attacks on IDEA with at least 6 rounds // Journal of Cryptology. 2015. Vol. 28. P. 209–239.
16. Birykov A., Kushilevitz E. From dierential cryptanalysis to ciphertext-only attacks // Proc. CRYPTO-1998. Lecture Notes in Computer Science. Vol. 1462. P. 72–88.
17. Biryukov A., Nakahara J., Prenel B., Vandewalle J. New weak-key classes of IDEA // Proc. ICICS-2002. Lecture Notes in Computer Science. Vol. 2513. P. 315–326.
18. Courtois N., Pieprzyk J. Cryptanalysis of block ciphers with overdened systems of equations // Proc. ASIACRYPT-2002. Lecture Notes in Computer Science. Vol. 2501. P. 267–287.
19. Dunkelman O., Keller N., Shamir A. A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony // Journal of Cryptology. 2014. Vol. 27. P. 824–849.
20. Dunkelman O., Keller N., Shamir A. Improved single-key attacks on 8-round AES-192 and AES-256 // Journal of Cryptology. 2015. Vol. 28. P. 397–422.
21. Furman V. Dierential cryptanalysis of Nimbus // Proc. Fast Software Encryption – 2001. Lecture Notes in Computer Science. Vol. 2355. P. 187–195.
22. Hell M., Johansson T. Breaking the stream ciphers F-FCSR-H and F-FCSR-16 in real time // Journal of Cryptology. 2011. Vol. 24. P. 427–445.
23. Isobe T. A single-key attack on the full GOST block cipher // Journal of Cryptology. 2013. Vol. 26. P. 172–189.
24. Kara O., Manap C. A new class of weak keys for Blowfish // Proc. Fast Software Encryption-2007. Lecture Notes in Computer Science. Vol. 4593. P. 167–180.
25. Kim J. On the security of the block cipher GOST suitable for the protection in U-business services // Personal and ubiquitous computing. 2013. Vol. 17. P. 1429–1435.
26. Kim J., Park J., Kim Y.-G. Weak keys of the block cipher SEED-192 for related-key differential attacks // Proc. STA-2011. P. 167–180.
27. Knudsen L., Meier W. Correlations in RC6 // Proc. Fast Software Encryption-2001. Lecture Notes in Computer Science. Vol. 1978. P. 94–108.
28. Lu J., Yap W.-S., Wei Y. Weak keys of the full MISTY1 block cipher for related-key differential cryptanalysis // Proc. RSA-2013. Lecture Notes in Computer Science. Vol. 7779. P. 389–404.
29. Mala H., Dakhilalian M., Rijmen V., Modarres-Hashemi M. Improved impossible differential cryptanalysis of 7-round AES-128 // Proc. INDOCRYPT-2010. Lecture Notes in Computer Science. Vol. 6498. P. 282–291.
30. Mantin I. Predicting and distinguishing attacks on RC4 keystream generator // Proc. EUROCRYPT-2005. Lecture Notes in Computer Science. Vol. 3494. P. 491–506.
31. Matsui M. Key collisions of the RC4 stream cipher // Proc. Fast Software Encryption-2009. Vol. 5665. P. 38–50.
32. Nakahara J. Differential and linear attacks on the full WIDEA-n block ciphers (under weak keys) // Proc. CANS-2012. Lecture Notes in Computer Science. Vol. 7712. P. 56–71.
33. Rostovtsev A. AES-like ciphers: are special S-boxes better then random ones? (virtual isomorphisms again) // Cryptology ePrint Archive. Report 2013/148.
34. Stankovski P., Hell M., Johansson T. An efficient state recovery attack on the X-FCSR family of stream ciphers // Journal of Cryptology. 2014. Vol. 27. P. 1–22.
35. www.keylength.com – BlueKrypt. Cryptographic Key Length Recommendation. 2016.
Review
For citations:
Pestunov A.I., Perov A.A., Pestunova T.M. ON SOME SCIENTIFIC PROBLEMS IN CRYPTANALYSIS OF SYMMETRIC ALGORITHMS. Vestnik NSUEM. 2016;(3):280-298. (In Russ.)