Information Technology Reference
In-Depth Information
Table 1. Extended key
I T
R
1
2
3
4
5
6
7
8
9
1 0
1 1
1 2
F T
A 1 K 1 K 8 K 5 K 4 K 1 K 6 K 7 K 4 K 2 K 6 K 5 K 3
A 2 K 2 K 6 K 7 K 3 K 2 K 8 K 5 K 3 K 1 K 8 K 7 K 4
A 3 K 6 K 1 K 2 K 5 K 7 K 3 K 4 K 8 K 6 K 1 K 2 K 5
A 4 K 7 K 4 K 3 K 8 K 6 K 1 K 2 K 5 K 7 K 4 K 3 K 8
A 5 K 3 K 5 K 6 K 2 K 4 K 7 K 6 K 1 K 4 K 5 K 8 K 1
K 1
K 2
A 6 K 4 K 7 K 8 K 1 K 3 K 5 K 8 K 2 K 3 K 7 K 6 K 2
output of CP -box, respectively. Then we know that x 1 ⊕···⊕
x 32 = y 1 ⊕···⊕
y 32
with probability 1. We denote a 1 ⊕ ··· ⊕
a 32 by A [ all ] for convenience where
A =( a 1 , ..., a 32 ) is any 32-bit value. To begin with, let L i and R i be the left and
right inputs of i th-round and G i be the output of G in the i th-round.
We will explain the linear equations which always hold for full round
SPECTR-H64. Given plaintext P =( P L ,P R ), we obtain the following equa-
tion since IT ( P )=( L 1 ,R 1 ), i.e. L 1 and R 1 are the arrangement of P L and P R
xored with 0 x 55555555, respectively.
P L [ all ]= L 1 [ all ] ,P R [ all ]= R 1 [ all ]
Let C =( C L ,C R ) be the ciphertext corresponding to the plaintext P =( P L ,P R ).
Since FT is the inverse of the procedure of IT , we also obtain
C L [ all ]= R 13 [ all ] ,C R [ all ]= L 13 [ all ] .
In encryption procedures, we can know the following linear property of
SPECTR-H64 with probability 1 in each round (Fig. 5).
L i +1 [ all ]= R i [ all ]
A 4 [ all ]
G i [ all ]
If the above equation is xored only for every odd round, then we can find the
following linear equation with probability 1.
C L [ all ]
G 1 [ all ]
G 3 [ all ]
G 5 [ all ]
G 7 [ all ]
G 9 [ all ]
G 11 [ all ]
P R [ all ]
K 2 [ all ]
Similarly, for even round, we can also find the following linear equation with
probability 1.
C R [ all ]
= K 6 [ all ]
G 2 [ all ]
G 4 [ all ]
G 6 [ all ]
G 8 [ all ]
G 10 [ all ]
G 12 [ all ]
P L [ all ]
= K 1 [ all ]
K 5 [ all ],
4
Higher Order Differential Property
We introduce some notion of degree of a Boolean function and the higher order
differential attack [4] is based on the Proposition 2 shown by Lai [6]. We also
describe the differential property of CP -box and construct the fourth-order dif-
ferential structure using the property of function G , with a view to apply higher
order differential attack of SPECTR-H64.
Search WWH ::




Custom Search