THE ARX STRUCTURE OF π CIPHER

44
1 The ARX structure of π-Cipher LAP ’15 THE ARX STRUCTURE OF π-CIPHER Hristina Mihajloska FCSE, UKIM, Macedonia Danilo Gligoroski ITEM, NTNU, Norway Simona Samardjiska FCSE, UKIM, Macedonia [email protected]

Transcript of THE ARX STRUCTURE OF π CIPHER

Page 1: THE ARX STRUCTURE OF π CIPHER

1

The ARX structure of π-Cipher LAP ’15

THE ARX STRUCTURE OF π-CIPHER

Hristina Mihajloska FCSE, UKIM, Macedonia

Danilo Gligoroski ITEM, NTNU, Norway

Simona Samardjiska FCSE, UKIM, Macedonia

[email protected]

Page 2: THE ARX STRUCTURE OF π CIPHER

2

The ARX structure of π-Cipher LAP ’15

CAESAR = Competition for Authenticated Encryption: Security Applicability and Robustness

• Will identify a portfolio of authenticated ciphers that

– offer advantages over AES-GCM

– are suitable for widespread adoption

• Follows a long tradition of focused competitions in symmetric-key cryptography

• Currently 2 round

– 29 candidates remaining

Authenticated Encryption Zoo: https://aezoo.compute.dtu.dk

Page 3: THE ARX STRUCTURE OF π CIPHER

3

The ARX structure of π-Cipher LAP ’15

What is Authenticated Encryption (AE)?

message messageDear Bob I miss you… Dear Bob I miss you…

Page 4: THE ARX STRUCTURE OF π CIPHER

4

The ARX structure of π-Cipher LAP ’15

What is Authenticated Encryption (AE)?

message messageDear Bob I miss you…

Dear Bob I miss you… Dear Bob I miss you…

Page 5: THE ARX STRUCTURE OF π CIPHER

5

The ARX structure of π-Cipher LAP ’15

What is Authenticated Encryption (AE)?

message message

Encryption algorithm

Decryption algorithm

ciphertext ciphertextdX#Crthkcbys@5zdh…

Dear Bob I miss you… Dear Bob I miss you…

message’

Page 6: THE ARX STRUCTURE OF π CIPHER

6

The ARX structure of π-Cipher LAP ’15

What is Authenticated Encryption (AE)?

message message

Encryption algorithm

Decryption algorithm

ciphertext ciphertextdX#Crthkcbys@5zdh…

Dear Bob I miss you… Dear Bob I miss you…

ciphertext’

message’

Dear Bob I HATE you…

Page 7: THE ARX STRUCTURE OF π CIPHER

7

The ARX structure of π-Cipher LAP ’15

What is Authenticated Encryption (AE)?

message message

Encryption algorithm

Decryption algorithm

Dear Bob I miss you… Dear Bob I miss you…

message’

Dear Bob I HATE you…

MAC calculate

MAC verify

ciphertextMAC

ciphertext’MAC’

Page 8: THE ARX STRUCTURE OF π CIPHER

8

The ARX structure of π-Cipher LAP ’15

What is Authenticated Encryption (AE)?

message message

Encryption algorithm

Decryption algorithm

Dear Bob I miss you… Dear Bob I miss you…

message’

Dear Bob I HATE you…

MAC calculate

MAC verify

ciphertextMAC

ciphertext’MAC’

If MAC(ciphertext’) ≠ MAC’

I knew Alice would never write this!!

Page 9: THE ARX STRUCTURE OF π CIPHER

9

The ARX structure of π-Cipher LAP ’15

What is Authenticated Encryption (AE)?

message message

Encryption algorithm

Decryption algorithm

Dear Bob I miss you… Dear Bob I miss you…

message’

Dear Bob I HATE you…

MAC calculate

MAC verify

ciphertextMAC

ciphertext’MAC’

If MAC(ciphertext’) ≠ MAC’

I knew Alice would never write this!!

AE = Authenticated Encryption provides privacy and authenticity of data

Page 10: THE ARX STRUCTURE OF π CIPHER

10

The ARX structure of π-Cipher LAP ’15

π-Cipher: one of the candidates of the CAESAR competition

• An authenticated encryption cipher with associated data• Second round candidate• Norwegian-Macedonian-German collaboration

– Danilo Gligoroski, NTNU– Hristina Mihajloska, FINKI– Simona Samardjiska, FINKI– Håkon Jacobsen, NTNU– Mohamed El-Hadedy, NTNU– Rune Erlend Jensen, NTNU– Daniel Otte, RUB

Page 11: THE ARX STRUCTURE OF π CIPHER

11

The ARX structure of π-Cipher LAP ’15

Inside π-Cipher: Processing the message

Main component of π-Cipher

Core permutationπ-function

Page 12: THE ARX STRUCTURE OF π CIPHER

12

The ARX structure of π-Cipher LAP ’15

• One round of the π-function

• The number of rounds R is a tweakable parameter

• V.2 recommendation R = 3

Inside the π-functionQuasigroupoperation *

Quasigroup string transformation

Page 13: THE ARX STRUCTURE OF π CIPHER

13

The ARX structure of π-Cipher LAP ’15

Inside the quasigroup operation *

X, Y and Z - 4-tuples

of ω-bit words (ω = 16, 32, 64)

ARX design

• Addition ⊞ modulo 2ω

• Rotation to the left ROTLr(X)

• XOR ⊕ on ω–bit words

Page 14: THE ARX STRUCTURE OF π CIPHER

14

The ARX structure of π-Cipher LAP ’15

Inside the quasigroup operation *

The quasigroup operation *:

Z = X * Y ≡ ∂(μ(X) ⊞ω ν(Y))

Isotopic

Page 15: THE ARX STRUCTURE OF π CIPHER

15

The ARX structure of π-Cipher LAP ’15

Algorithmic view of *

The isotopy

Page 16: THE ARX STRUCTURE OF π CIPHER

16

The ARX structure of π-Cipher LAP ’15

Algorithmic view of *

Two orthogonal Latin squares

0 1 2 3

1 0 3 2

2 3 0 1

3 2 1 0

0 1 2 3

3 2 1 0

1 0 3 2

2 3 0 1

L1 =

L2 =

Page 17: THE ARX STRUCTURE OF π CIPHER

17

The ARX structure of π-Cipher LAP ’15

Algorithmic view of *

Two orthogonal Latin squares

0 1 2 3

1 0 3 2

2 3 0 1

3 2 1 0

0 1 2 3

3 2 1 0

1 0 3 2

2 3 0 1

L1 = L2 =

Page 18: THE ARX STRUCTURE OF π CIPHER

18

The ARX structure of π-Cipher LAP ’15

Algorithmic view of *

Two orthogonal Latin squares

0 1 2 3

1 0 3 2

2 3 0 1

3 2 1 0

0 1 2 3

3 2 1 0

1 0 3 2

2 3 0 1

L1 =

L2 =

Page 19: THE ARX STRUCTURE OF π CIPHER

19

The ARX structure of π-Cipher LAP ’15

Algorithmic view of *

Two orthogonal Latin squares

0 1 2 3

1 0 3 2

2 3 0 1

3 2 1 0

0 1 2 3

3 2 1 0

1 0 3 2

2 3 0 1

L1 = L2 =

Page 20: THE ARX STRUCTURE OF π CIPHER

20

The ARX structure of π-Cipher LAP ’15

Security of π-Cipher

Page 21: THE ARX STRUCTURE OF π CIPHER

21

The ARX structure of π-Cipher LAP ’15

Security of π-Cipher

Assumingπ is drawn uniformly at random from the set of permutations on 16ω

elements

Idea

l pe

rmut

atio

n

Idea

l pe

rmut

atio

n

Idea

l pe

rmut

atio

n

Idea

l pe

rmut

atio

n

Page 22: THE ARX STRUCTURE OF π CIPHER

22

The ARX structure of π-Cipher LAP ’15

Security of π-Cipher

Assumingπ is drawn uniformly at random from the set of permutations on 16ω

elements

Idea

l pe

rmut

atio

n

Idea

l pe

rmut

atio

n

Idea

l pe

rmut

atio

n

Idea

l pe

rmut

atio

n

π – cipher is provably secure:

- Data privacy- Ciphertext integrity

Page 23: THE ARX STRUCTURE OF π CIPHER

23

The ARX structure of π-Cipher LAP ’15

Security of π-Cipher

The security relies on the π – function

Page 24: THE ARX STRUCTURE OF π CIPHER

24

The ARX structure of π-Cipher LAP ’15

The structure of π – function

ARX designAddition ⊞ modulo 2ω

Rotation to the left ROTLr(X) XOR ⊕ on ω–bit words

Advantages- Excellent performance- Easy algorithm and

implementation- Functionally complete

(with constant included)

Disadvantages- Extremely hard to analyze:

- Security against linear and differential cryptanalysis

- Security estimate

Page 25: THE ARX STRUCTURE OF π CIPHER

25

The ARX structure of π-Cipher LAP ’15

Block ciphers • FEAL, Threefish

Stream ciphers • Salsa20, ChaCha, HC-128

Hash functions• SHA-3 Finalists: BLAKE, Skein

• SHA-3 Second Round: Blue Midnight Wish, Cubehash

• SHA-3 First Round: EDON-R

Authenticated ciphers

• π –cipher, NORX (LRX), MORUS (LRX)

ARX designs

Page 26: THE ARX STRUCTURE OF π CIPHER

26

The ARX structure of π-Cipher LAP ’15

ARX designs – Differential cryptanalysis

1. Observe the difference between two ciphertexts as a function of the difference between the plaintexts

2. Find the highest probability differential input (characteristic) which can be traced through several rounds

Page 27: THE ARX STRUCTURE OF π CIPHER

27

The ARX structure of π-Cipher LAP ’15

S-box • Typical size up to 8 × 8 bit

• Difference distribution table:

up to 216 = 65536 elements

• Easy to calculate: differential probability, number of output differences, output difference with highest probability,...

ARX designs – Differential cryptanalysis

1. Observe the difference between two ciphertexts as a function of the difference between the plaintexts

2. Find the highest probability differential input (characteristic) which can be traced through several rounds

ARX operations • Typically, n = 32 or n = 64 • Difference distribution table:

264 or 2128 elements, too large!In π – cipher:• Quasigroup operation 28ω*4ω

Page 28: THE ARX STRUCTURE OF π CIPHER

28

The ARX structure of π-Cipher LAP ’15

• Bit diffusion of the used ARX permutation

π-Cipher Security

Page 29: THE ARX STRUCTURE OF π CIPHER

29

The ARX structure of π-Cipher LAP ’15

XAn example

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

Page 30: THE ARX STRUCTURE OF π CIPHER

30

The ARX structure of π-Cipher LAP ’15

X’An example

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

Page 31: THE ARX STRUCTURE OF π CIPHER

31

The ARX structure of π-Cipher LAP ’15

YAn example

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

Page 32: THE ARX STRUCTURE OF π CIPHER

32

The ARX structure of π-Cipher LAP ’15

Y’An example

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

Page 33: THE ARX STRUCTURE OF π CIPHER

33

The ARX structure of π-Cipher LAP ’15

An example

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

20 changes in total!

Page 34: THE ARX STRUCTURE OF π CIPHER

34

The ARX structure of π-Cipher LAP ’15

An example

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

24 changes in total!

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

Page 35: THE ARX STRUCTURE OF π CIPHER

35

The ARX structure of π-Cipher LAP ’15

An example

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

24 changes in total!

𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏 𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏𝟏

But we can’t measure

all possible differences!!!

Page 36: THE ARX STRUCTURE OF π CIPHER

36

The ARX structure of π-Cipher LAP ’15

• Bit diffusion of the one round of the permutation

π-Cipher Security

Even after ONLY one round

one bit difference

propagates in 1/2 of the bits

Page 37: THE ARX STRUCTURE OF π CIPHER

37

The ARX structure of π-Cipher LAP ’15

• Bit diffusion of the one round of the permutation

π-Cipher Security

Even after ONLY one round

one bit difference

propagates in 1/2 of the bits

After 3 roundsMean value 127.281

Page 38: THE ARX STRUCTURE OF π CIPHER

38

The ARX structure of π-Cipher LAP ’15

• Similar construction as SHA-3 candidate Edon-R [Gligoroski et al. ’09] indicates solid differential properties

• New popular approach for ARX designs

– Automated tools[Mouha et al. ’10], [Laurent ’12]

• Ongoing work

– create a dedicated automated engine for π-Cipher for search of differential characteristics of a predefined weight

π-Cipher Security

Page 39: THE ARX STRUCTURE OF π CIPHER

39

The ARX structure of π-Cipher LAP ’15

A taste of ARX automated tools (credit to N. Mouha)

Analysis of S-functions

Input:

Output:

Page 40: THE ARX STRUCTURE OF π CIPHER

40

The ARX structure of π-Cipher LAP ’15

XOR Differential probability of modular addition

S-function:

(credit to N. Mouha)

Page 41: THE ARX STRUCTURE OF π CIPHER

41

The ARX structure of π-Cipher LAP ’15

XOR Differential probability of modular addition

Represent as graphs:

(credit to N. Mouha)

Page 42: THE ARX STRUCTURE OF π CIPHER

42

The ARX structure of π-Cipher LAP ’15

XOR Differential probability of modular addition

Represent as graphs:

Valid paths with desired differential

Count the paths using adjacency matrices!

(credit to N. Mouha)

Page 43: THE ARX STRUCTURE OF π CIPHER

43

The ARX structure of π-Cipher LAP ’15

XOR Differential probability of modular addition

Probability:

(credit to N. Mouha)

Page 44: THE ARX STRUCTURE OF π CIPHER

44

The ARX structure of π-Cipher LAP ’15

Thank you for listening!