Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer

Lorenzo Grassi, Christian Rechberger, Markus Schofnegger*

*Korrespondierende/r Autor/in für diese Arbeit

Publikation: Beitrag in einer FachzeitschriftArtikel

Abstract

Designing cryptographic permutations and block ciphers using a substitution-permutation network (SPN) approach where the nonlinear part does not cover the entire state has recently gained attention due to favorable implementation characteristics in various scenarios.

For word-oriented partial SPN (P-SPN) schemes with a fixed linear layer, our goal is to better understand how the details of the linear layer affect the security of the construction. In this paper, we derive conditions that allow us to either set up or prevent attacks based on infinitely long truncated differentials with probability 1. Our analysis is rather broad compared to earlier independent work on this problem since we consider (1) both invariant and non-invariant/iterative trails, and (2) trails with and without active S-boxes.

For these cases, we provide rigorous sufficient and necessary conditions for the matrix that defines the linear layer to prevent the analyzed attacks. On the practical side, we present a tool that can determine whether a given linear layer is vulnerable based on these results. Furthermore, we propose a sufficient condition for the linear layer that, if satisfied, ensures that no infinitely long truncated differential exists. This condition is related to the degree and the irreducibility of the minimal polynomial of the matrix that defines the linear layer.

Besides P-SPN schemes, our observations may also have a crucial impact on the Hades design strategy, which mixes rounds with full S-box layers and rounds with partial S-box layers.
Originalspracheenglisch
Seiten (von - bis)314-352
Seitenumfang39
FachzeitschriftIACR Transactions on Symmetric Cryptology
Jahrgang2021
Ausgabenummer2
DOIs
PublikationsstatusVeröffentlicht - 2021

ASJC Scopus subject areas

  • Software
  • !!Computational Mathematics
  • Angewandte Mathematik
  • !!Computer Science Applications

Fingerprint

Untersuchen Sie die Forschungsthemen von „Proving Resistance Against Infinitely Long Subspace Trails: How to Choose the Linear Layer“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren