0% found this document useful (0 votes)
7 views

Cryptanalysis On AES

Uploaded by

202251013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Cryptanalysis On AES

Uploaded by

202251013
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

CRYPTANALYSIS ON AES

 New techniques for analyzing AES encryption, which is a method used to secure data.
 These techniques help identify patterns in how the encryption works by using very few data
samples and almost no computation.
 The authors introduce "yoyo-distinguishers," which can detect differences in encrypted data for 3
to 5 rounds of AES. They also propose a method for 6-round AES, but it needs a huge amount of
data to work.
 Additionally, they describe a new way to recover the encryption key for 5-round AES that is
more efficient than previous methods.

Amisha Lalwani(202251013),
Dhwani Saliya(202251041),
Niyati Pansuriya(2022510xx)
Lakshya xxxxx(2022510xx)
P R E S E N TAT I O N T I T L E

Research Paper-1
Research Paper-2
AGENDA C implementation-1
C implementation-2
Summary

2
P R E S E N TAT I O N T I T L E

Block ciphers, like AES, are designed to


be secure by repeating a round function
multiple times to make it look random and
unpredictable. However, to balance
INTRODUCTION efficiency and security, designers may
introduce some patterns or structures in
the round functions. To counter these
patterns, the round function is repeated
enough times to make them disappear.

3
RESEARCH
PAPER-1
P R E S E N TAT I O N T I T L E

CP (Chosen Plain Text Attack)

ACC (Adaptive Chosen Cipher Text)

MitM (Meet in the middle attack)

Imp. Polyt. (Improved Polynomial


Attack)

Imp. Diff. (Improved Differential


Attack)

5
P R E S E N TAT I O N T I T L E

The table compares different attack


techniques based on rounds
targeted, data requirements,
computational cost, and whether
they are key-independent. The
values indicate the efficiency and
feasibility of each attack method for
a given number of rounds in terms of
data and computational cost.

6
P R E S E N TAT I O N T I T L E

 Trun. Diff. (Truncated Differential Attack): A


differential attack where only some bits of the
difference are considered.
 Integral Attack: Uses patterns of plaintext
differences to deduce key information.
 Yoyo Attack: A specific attack technique based
on modifying ciphertexts to create predictable
differences.
 Imp. Diff. (Improved Differential Attack): An
enhanced form of differential attack with
optimizations.
 Struct. Diff. (Structural Differential Attack):
Focuses on exploiting specific structural
properties of the cipher.

7
P R E S E N TAT I O N T I T L E

YOYO ANALYSI S OF GENERI C SPNS


Overview of the Permutation Structure:-

•We analyse permutations of the form: F(x)=S∘L∘S∘L∘S


•Components:
• S: Large S-box formed by concatenating smaller S-boxes over
• L: Linear transformation acting on elements of ​.
•The approach also applies to "SASAS" permutations (affine transformations), but we focus on linear L
for simplicity.

8
Cryptanalysis on AES

Key Definitions
•Word and State:
• A word is an element of ​, where q = .
• A state is a vector of words
•Zero Difference Pattern:
• where if ​is zero, and ​is 0 otherwise.
•Activity Pattern:
• The complement of the zero difference pattern, indicating which components are active (non-
zero).

Properties of the Zero Difference Pattern


•Lemma 1: The zero difference pattern is preserved through the permutation S, i.e., ν(α−β)=ν(S(α)
−S(β))

•Explanation: S is a permutation, ensuring that differences are maintained.

9
Cryptanalysis on AES

Definition and Properties of

•Define (α, β):

•swaps individual components between α and β based on the binary vector

10
Cryptanalysis of AES

Main Results and Theorems

• Lemma 2: The operation commutes with the S-box layer:

• Lemma 3: The linear transformation L preserves differences under ​: L(​( β,α))=L(α)−L(β)


• Theorem 1: The zero difference pattern remains invariant under the composed permutation
structure S ∘ L ∘ S ∘ L ∘ S:
ν(S ∘ L ∘ S( α)−S ∘ L ∘ S( β))=ν(S ∘ L ∘ S(( α,β))−S ∘ L ∘ S(( β,α)))

Implications for the Yoyo Attack

•These results form the foundation of the Yoyo attack, leveraging invariants like the zero difference
pattern to analyze block cipher structures.
•The properties allow predicting behavior through multiple rounds of permutations.

11
Cryptanalysis on AES

Codes:
https://github.com/Lalwaniamisha789/Cryptanalysi
s-Of-AES

12

You might also like