SlideShare a Scribd company logo
Cryptanalytic Timing Attacks against IDEA Product block cipher 
(Ref: "Side Channel Cryptanalysis of Product Ciphers" by John Kelsey , Bruce Schneier , David Wagner , and Chris Hall in September 1998 ) 
Srilal Buddika
Outline 
1.Motivation 
2.About IDEA 
3.IDEA Block Cipher Design 
4.Cryptanalytic History on IDEA 
5.Timing Attack against IDEA 
6.Conclusion 
7.Discussion 
2
3About IDEA 
IDEAstands for International Data Encryption Algorithm (1991) 
IDEA is Block Cipher 
Block Size : 64 bits 
Key Size : 128 bits 
8Rounds + Output Transformation (half-round) 
WhyIDEA ? 
The algorithm was designed to achieve high data throughput for use in real-time communications system, especially for wireless communication
4IDEA Block Cipher Design (1) 
RoundStructure 
Additionmodulo216 
BitwiseexclusiveOR 
Multiplicationmodulo216+1
IDEA Block Cipher Design (2) 
5 
Stage–1ofaRound
6IDEA Block Cipher Design (3) 
SecondStageoftheround
7IDEA Block Cipher Design (4) 
OutputTransformation(half-round)
8IDEA Block Cipher Design (5) 
KeyGeneration 
KeySize=128bit 
Sub-keySize=16bit 
i.e.SimplyKeydividedintoeightpieces 
Algorithm: 
1.Take1steightsub-keys 
2.Thenrotatethekey25bitstotheleft 
3.Repeatthestep-1
9 
Cryptanalytic History on IDEA 
Consideredasreallysecure 
BestattackcanbreakIDEAreducedto6rounds(FullIDEA=8.5rounds) 
WeakKeyproblemwithtoomany0-bits(ExposedtoSide-ChannelAttacks)
10 
IDEAcanbecryptanalyzedwithapieceofside-channelinformation 
E.g.Whetheroneoftheinputsintooneofthemultiplicationsiszero 
Timingscanbeacquiredintwosimpleways: 
1.The cryptanalyst makes extremely precise timings of each encryption (A Ciphertext-Only Timing Attack) 
2.The cryptanalyst measures total time to encrypt many similar plaintext blocks at a time (An Adaptive Chosen Plaintext Timing Attack) Timing Attack against IDEA (1)
11Timing Attacks against IDEA (2) Attacking Scenario 
1.Recordprecisetimingsfornencryptions.AlsostoretheresultingciphertextblocksandletT0..n-1bethetimings,andC0..n-1betheciphertextblocks. 
2.Grouptheciphertextblocksandtimingsinto216subsets,basedonthelow- order16bitsoftheoutput. 
3.Testtheaveragetimesofeachgroupagainsttheaveragetimesofallthegroupsstatistically,tofindwhetheroneofthesetshas(withsomeacceptablyhighprobability)aloweraveragethantheothersets. 
4.Ifso,thentheinputstothelastmultiplyoftheoutputtransformationmusthavebeen0forallinputsinthatset.Hencesolveforthelastmultiplicativesub-key.
12Timing Attacks against IDEA (3) 
5.Ifthereisnodifference,theneitherwe'vechosensomeparameters(i.e.,n) wrong,orthesub-keyisa0. 
6.Repeatsteps2-3,above,forthehigh-order16bitsandsolvethefirstmultiplicativesub-keyoftheoutputtransformation.Wenowhave32bitsofexpandedkey. 
7.Wenowattackthesecondadditivesub-keyintheoutputtransformation. Foreachpossiblevalueofthissub-key,welookatwhichciphertextblocksleadustoazerovaluegoingintothefirstmultiplicationofthelastround'sMAbox. 
8.Foroneofthesesub-keyguesses,theaveragetimingshouldbelessthanforalltheothersub-keyguesses.Thisrevealstherightsub-key. 
9.Ifthereisnodifference,theneitherwe'vechosensomeparameterswrong, orthefirstsub-keyintheMA-boxiszero.Wehavenowrecovered48bitsofexpandedkey.
13Timing Attacks against IDEA (4) 
10.Wenowattackthefirstadditivesub-keyintheoutputtransformation,andthefirstsub-keyintheMA-box.Wedothisasfollows: 
Breaktheciphertextblocksandtimingsupinto216subsetsbasedonthevalueoftheleftmost(first)inputtotheMA-box 
Foreachpossiblesub-keyvalueforthefirstadditivesub-keyoftheoutputtransformation,breakeachsubsetupinto216sub-subsets,basedonwhatthevalueofthesecondMA-boxinputwouldbeifthisweretherightsub-key 
Fortherightsub-key,eachsubsetwillhaveonesub-subsetwhichhasasmallertimingvaluethanalltheothersub-subsetsinthatsubset.Wehavenowfound64bitsofsub-key 
Wenowchooseanythreeofthesesub-subsets,andusethemtosolveforthefirstmultiplicativesub-keyoftheMA-box.Wehavenowfound80bitsofsub- key 
Finally,wecanbrute-force/exhaustivesearchtheremaining48bits.(Therearealsootherwaystocontinuethisattack)
Conclusion14 
ThiskindofattackmightalsobepracticalforrecoveringthekeyfromaCipherswhichalwaysencryptsunderthesameIDEAkey.Thecryptanalystortheattackerdoesnotneedtoknowanythingabouttheplaintextforthisattack,butmustalwaysknowpreciselywhentheencryptionstartedandwhenitendedwiththecollectedciphertextblocks. 
There'ssomethingimportanttoknowthat,thisisnottheonlysidechannelthatcandiscoverthiskindofinformationbutthingslikeradiationandpowerconsumptioncanalsoleakthismultiply-by-zerocondition.
Thank You ! 15

More Related Content

PDF
ReWArDS: Reconfigurable hardWare for Artificial intelligence and Data Science
PPTX
Cryptanalytic timing attacks 1
PDF
Overview of the Intel® Internet of Things Developer Kit
PPT
OHM CAD SYSTEM Capabilities
PPTX
Integrated Circuits introduction and fpga
PDF
VEGA Processors.pdf
PPTX
More Mad Science for the Commodore 64 (ECCC 2015)
PDF
The Ring programming language version 1.4 book - Part 30 of 30
ReWArDS: Reconfigurable hardWare for Artificial intelligence and Data Science
Cryptanalytic timing attacks 1
Overview of the Intel® Internet of Things Developer Kit
OHM CAD SYSTEM Capabilities
Integrated Circuits introduction and fpga
VEGA Processors.pdf
More Mad Science for the Commodore 64 (ECCC 2015)
The Ring programming language version 1.4 book - Part 30 of 30

Similar to Cryptanalytic timing attacks 2 (20)

PDF
ScilabTEC 2015 - Embedded Solutions
PDF
International Journal of Computational Engineering Research(IJCER)
PPT
OS_Chapter-12 simple concepts and design
PDF
Detailed Cv
PDF
Blockchain solutions leading to better security practices
PPTX
Developing a NodeBot using Intel XDK IoT Edition
PDF
CHIPS Alliance_Object Automation Inc_workshop
PDF
Resume_DigitalIC_1
PPTX
Innovative Solutions for Cloud Gaming, Media, Transcoding, & AI Inferencing
PDF
PDF
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
PDF
日本発のオープンソース・データベース GridDB
PDF
Scalable AI Solution cross AI platforms
 
PDF
ODSA Design Tools for Chiplet-Based Design
PDF
ODSA Design Tools for Chiplet-Based Design
PPTX
FPGA based mini Project.pptx
PDF
Intels presentation at blue line industrial computer seminar
PPT
CFD and FPGAs
PDF
Hari Krishna Vetsa Resume
PDF
The Ring programming language version 1.5.2 book - Part 179 of 181
ScilabTEC 2015 - Embedded Solutions
International Journal of Computational Engineering Research(IJCER)
OS_Chapter-12 simple concepts and design
Detailed Cv
Blockchain solutions leading to better security practices
Developing a NodeBot using Intel XDK IoT Edition
CHIPS Alliance_Object Automation Inc_workshop
Resume_DigitalIC_1
Innovative Solutions for Cloud Gaming, Media, Transcoding, & AI Inferencing
IRJET- Design and Implementation of 256-Bits Cryptography Algorithm used in t...
日本発のオープンソース・データベース GridDB
Scalable AI Solution cross AI platforms
 
ODSA Design Tools for Chiplet-Based Design
ODSA Design Tools for Chiplet-Based Design
FPGA based mini Project.pptx
Intels presentation at blue line industrial computer seminar
CFD and FPGAs
Hari Krishna Vetsa Resume
The Ring programming language version 1.5.2 book - Part 179 of 181
Ad

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Mushroom cultivation and it's methods.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Hybrid model detection and classification of lung cancer
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
August Patch Tuesday
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
A novel scalable deep ensemble learning framework for big data classification...
Digital-Transformation-Roadmap-for-Companies.pptx
1 - Historical Antecedents, Social Consideration.pdf
TLE Review Electricity (Electricity).pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A Presentation on Artificial Intelligence
Heart disease approach using modified random forest and particle swarm optimi...
Mushroom cultivation and it's methods.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Programs and apps: productivity, graphics, security and other tools
Hybrid model detection and classification of lung cancer
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
August Patch Tuesday
Building Integrated photovoltaic BIPV_UPV.pdf
WOOl fibre morphology and structure.pdf for textiles
cloud_computing_Infrastucture_as_cloud_p
Univ-Connecticut-ChatGPT-Presentaion.pdf
A comparative study of natural language inference in Swahili using monolingua...
Ad

Cryptanalytic timing attacks 2

  • 1. Cryptanalytic Timing Attacks against IDEA Product block cipher (Ref: "Side Channel Cryptanalysis of Product Ciphers" by John Kelsey , Bruce Schneier , David Wagner , and Chris Hall in September 1998 ) Srilal Buddika
  • 2. Outline 1.Motivation 2.About IDEA 3.IDEA Block Cipher Design 4.Cryptanalytic History on IDEA 5.Timing Attack against IDEA 6.Conclusion 7.Discussion 2
  • 3. 3About IDEA IDEAstands for International Data Encryption Algorithm (1991) IDEA is Block Cipher Block Size : 64 bits Key Size : 128 bits 8Rounds + Output Transformation (half-round) WhyIDEA ? The algorithm was designed to achieve high data throughput for use in real-time communications system, especially for wireless communication
  • 4. 4IDEA Block Cipher Design (1) RoundStructure Additionmodulo216 BitwiseexclusiveOR Multiplicationmodulo216+1
  • 5. IDEA Block Cipher Design (2) 5 Stage–1ofaRound
  • 6. 6IDEA Block Cipher Design (3) SecondStageoftheround
  • 7. 7IDEA Block Cipher Design (4) OutputTransformation(half-round)
  • 8. 8IDEA Block Cipher Design (5) KeyGeneration KeySize=128bit Sub-keySize=16bit i.e.SimplyKeydividedintoeightpieces Algorithm: 1.Take1steightsub-keys 2.Thenrotatethekey25bitstotheleft 3.Repeatthestep-1
  • 9. 9 Cryptanalytic History on IDEA Consideredasreallysecure BestattackcanbreakIDEAreducedto6rounds(FullIDEA=8.5rounds) WeakKeyproblemwithtoomany0-bits(ExposedtoSide-ChannelAttacks)
  • 10. 10 IDEAcanbecryptanalyzedwithapieceofside-channelinformation E.g.Whetheroneoftheinputsintooneofthemultiplicationsiszero Timingscanbeacquiredintwosimpleways: 1.The cryptanalyst makes extremely precise timings of each encryption (A Ciphertext-Only Timing Attack) 2.The cryptanalyst measures total time to encrypt many similar plaintext blocks at a time (An Adaptive Chosen Plaintext Timing Attack) Timing Attack against IDEA (1)
  • 11. 11Timing Attacks against IDEA (2) Attacking Scenario 1.Recordprecisetimingsfornencryptions.AlsostoretheresultingciphertextblocksandletT0..n-1bethetimings,andC0..n-1betheciphertextblocks. 2.Grouptheciphertextblocksandtimingsinto216subsets,basedonthelow- order16bitsoftheoutput. 3.Testtheaveragetimesofeachgroupagainsttheaveragetimesofallthegroupsstatistically,tofindwhetheroneofthesetshas(withsomeacceptablyhighprobability)aloweraveragethantheothersets. 4.Ifso,thentheinputstothelastmultiplyoftheoutputtransformationmusthavebeen0forallinputsinthatset.Hencesolveforthelastmultiplicativesub-key.
  • 12. 12Timing Attacks against IDEA (3) 5.Ifthereisnodifference,theneitherwe'vechosensomeparameters(i.e.,n) wrong,orthesub-keyisa0. 6.Repeatsteps2-3,above,forthehigh-order16bitsandsolvethefirstmultiplicativesub-keyoftheoutputtransformation.Wenowhave32bitsofexpandedkey. 7.Wenowattackthesecondadditivesub-keyintheoutputtransformation. Foreachpossiblevalueofthissub-key,welookatwhichciphertextblocksleadustoazerovaluegoingintothefirstmultiplicationofthelastround'sMAbox. 8.Foroneofthesesub-keyguesses,theaveragetimingshouldbelessthanforalltheothersub-keyguesses.Thisrevealstherightsub-key. 9.Ifthereisnodifference,theneitherwe'vechosensomeparameterswrong, orthefirstsub-keyintheMA-boxiszero.Wehavenowrecovered48bitsofexpandedkey.
  • 13. 13Timing Attacks against IDEA (4) 10.Wenowattackthefirstadditivesub-keyintheoutputtransformation,andthefirstsub-keyintheMA-box.Wedothisasfollows: Breaktheciphertextblocksandtimingsupinto216subsetsbasedonthevalueoftheleftmost(first)inputtotheMA-box Foreachpossiblesub-keyvalueforthefirstadditivesub-keyoftheoutputtransformation,breakeachsubsetupinto216sub-subsets,basedonwhatthevalueofthesecondMA-boxinputwouldbeifthisweretherightsub-key Fortherightsub-key,eachsubsetwillhaveonesub-subsetwhichhasasmallertimingvaluethanalltheothersub-subsetsinthatsubset.Wehavenowfound64bitsofsub-key Wenowchooseanythreeofthesesub-subsets,andusethemtosolveforthefirstmultiplicativesub-keyoftheMA-box.Wehavenowfound80bitsofsub- key Finally,wecanbrute-force/exhaustivesearchtheremaining48bits.(Therearealsootherwaystocontinuethisattack)