Paper 2004/294

Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher

Souradyuti Paul and Bart Preneel

Abstract

Mixing addition modulo 2^n (+) and exclusive-or has a host of applications in symmetric cryptography as the operations are fast and nonlinear over GF(2). We deal with a frequently encountered equation (x+y)XOR((x XOR a)+(y XOR b))=c.Thedifficultyofsolvinganarbitrarysystemofsuchequationsnameddifferentialequationsofaddition(DEA)isanimportantconsiderationintheevaluationofthesecurityofmanyciphersagainstdifferentialattacks.ThispapershowsthatthesatisfiabilityofanarbitrarysetofDEAwhichhassofarbeenassumed\emphhardforlargenisinthecomplexityclassP.WealsodesignanefficientalgorithmtoobtainallsolutionstoanarbitrarysystemofDEAwithrunningtimelinearinthenumberofsolutions.OursecondcontributionissolvingDEAinanadaptivequerymodelwhereanequationisformedbyaquery(a,b)andoracleoutputc.Thechallengeistooptimizethenumberofqueriestosolve(x+y)XOR((xXORa)+(yXORb))=c.Ouralgorithmsolvesthisequationwithonly3queriesintheworstcase.Anotheralgorithmsolvestheequation(x+y)XOR(x+(yXORb))=c with (n-t-1) queries in the worst case (t is the position of the least significant `1' of x), and thus, outperforms the previous best known algorithm by Muller -- presented at FSE~'04 -- which required 3(n-1) queries. Most importantly, we show that the upper bounds, for our algorithms, on the number of queries match worst case lower bounds. This, essentially, closes further research in this direction as our lower bounds are optimal. We used our results to cryptanalyze a recently proposed cipher Helix, which was a candidate for consideration in the 802.11i standard. We are successful in reducing the data complexity of a DC attack on the cipher by a factor of 3 in the worst case (a factor of 46.5 in the best case).

Note: A proper subset of the results of this report under the title "Optimal Lower Bounds on the Number of Queries for Solving Differential Equations of Addition" had resided here till April 20, 2005.

Metadata
Available format(s)
PDF PS
Publication info
Published elsewhere. An Extended Abstract of this Paper will be published in the proceedings of ACISP 2005
Keywords
Differential CryptanalysisHelix cipherPNP
Contact author(s)
Souradyuti Paul @ esat kuleuven ac be
History
2012-11-07: last of 17 revisions
2004-11-12: received
See all versions
Short URL
https://ia.cr/2004/294
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2004/294,
      author = {Souradyuti Paul and Bart Preneel},
      title = {Solving Systems of Differential Equations of Addition and Cryptanalysis of the Helix Cipher},
      howpublished = {Cryptology {ePrint} Archive, Paper 2004/294},
      year = {2004},
      url = {https://eprint.iacr.org/2004/294}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.