Skip to content

This is a library that tries to break SPN ciphers in an fully automatic manner.

Notifications You must be signed in to change notification settings

physics-sec/Linear-Cryptanalysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Linear-Cryptanalysis

What is this?

This repository presents a linear cryptanalysis library that tries to break SPN ciphers in a fully automatic way.

Right now it only supports SPNs with just one type of sbox, but extending it to support multiple types of sbox should be relatively easy.

How does it work?

Glad you asked, the algorithm is very simple.

First

We compute the bias table. There is nothing fancy about this.
All the biases over 0 are kept and sorted in descending order.

Second

In an SPN, we have C sboxes in R rows (one per round).

For each sbox in the first row, we calculate all possible 'moves' (based on the bias table).
This will give us C*len(bias table) possible first steps, each asociated with a bias.
Each step will reach different 'input bits' in some of the sboxs in the second row.

For each possible first step, we do the following:
We now position ourselves at the sboxs of the second row, the ones that were reached by our first sbox.
For each one of these, we calculate all the possible steps, keeping in mind that we must choose the biases with the same 'input bits'.
For example, if the sbox of the first step reached into the second and fourth bit of an sbox in the second layer, then we can only choose biases that have 2 and 4 as input for that particular sbox.

Once we calculated all the possible moves for all the sboxs in the second layer, we combine all this moves in all possible ways.
For example, if in the second layer, 3 sboxs were reached, and each can move in 4 different ways, there are 64 (4x4x4) combinations.
For each possible combination, we do the same as in the first step, we calculate which sboxes in the third layer were reached and in which bits.
Now we position ourselves at the sboxes in the third row and continue the process until the last row.

At the end, we return all possible paths (or linear approximations) to the last row, each associated with a bias, calculated according to the Piling-Up Lemma.

Third

We choose one linear approximation from the previous step (normally the one with the highest bias).

Now, we generate multiple plaintext/ciphertext pairs and use the chosen linear approximation to obtain bits of the last round key. (again, nothing fancy here, just normal linear cryptanalysis.)

How to use

Example

There is a Python3 and a C implementation.
Python3:

  • There are two examples. The break-basic_SPN.py and the break-easy1.py file.

C:

  • There is just one example (break-basic_SPN). To compile it, run make inside the C/ directory.

The C implementation is, of course, much faster.

Functions you may want to use

initialize()
Initializes the library with the SPN's properties. (In C you have to change the constants in the linear_cryptanalysis_lib.h file.

create_bias_table
Creates the bias table for the sbox.

get_linear_aproximations
Returns all possible linear approximations (that respect the MAX_BLOCKS_TO_BF filter).

analize_cipher
Creates the bias table (calling create_bias_table) and sorts it (if it is longer than 1000 rows, keeps the best 1000).
Then, calls get_linear_aproximations and sorts the results (deleting the approximations that have a bias lower than MIN_BIAS) and returns the sorted list of approximations.

get_biases
Returns a list of of biases. The index of the bias is the key used to obtain such bias.

Considerations

Keep in mind that you might use multiple linear approximations to recover different bits of the last round key.

If you want to addapt the C implementation to breake another cipher, don't forget to update constants in the linear_cryptanalysis_lib.h file.

More information

To learn about linear cryptanalysis, read this awesome paper by Howard M. Heys and read Modern Cryptanalysis: Techniques for Advanced Code Breaking by Christopher Swenson.

Credit

Thanks to hkscy for the great Basic SPN implementation in Python3.

About

This is a library that tries to break SPN ciphers in an fully automatic manner.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published