[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1007/978-3-030-17653-2_12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Linear Equivalence of Block Ciphers with Partial Non-Linear Layers: Application to LowMC

Published: 19 May 2019 Publication History

Abstract

LOWMC is a block cipher family designed in 2015 by Albrecht et al. It is optimized for practical instantiations of multi-party computation, fully homomorphic encryption, and zero-knowledge proofs. LOWMC is used in the PICNIC signature scheme, submitted to NIST’s post-quantum standardization project and is a substantial building block in other novel post-quantum cryptosystems. Many LOWMC instances use a relatively recent design strategy (initiated by Gérard et al. at CHES 2013) of applying the non-linear layer to only a part of the state in each round, where the shortage of non-linear operations is partially compensated by heavy linear algebra. Since the high linear algebra complexity has been a bottleneck in several applications, one of the open questions raised by the designers was to reduce it, without introducing additional non-linear operations (or compromising security).
In this paper, we consider LOWMC instances with block size n, partial non-linear layers of size sn and r encryption rounds. We redesign LowMC’s linear components in a way that preserves its specification, yet improves LowMC’s performance in essentially every aspect. Most of our optimizations are applicable to all SP-networks with partial non-linear layers and shed new light on this relatively new design methodology.
Our main result shows that when s<n, each LOWMC instance belongs to a large class of equivalent instances that differ in their linear layers. We then select a representative instance from this class for which encryption (and decryption) can be implemented much more efficiently than for an arbitrary instance. This yields a new encryption algorithm that is equivalent to the standard one, but reduces the evaluation time and storage of the linear layers from r·n2 bits to about r·n2-(r-1)(n-s)2. Additionally, we reduce the size of LowMC’s round keys and constants and optimize its key schedule and instance generation algorithms. All of these optimizations give substantial improvements for small s and a reasonable choice of r. Finally, we formalize the notion of linear equivalence of block ciphers and prove the optimality of some of our results.
Comprehensive benchmarking of our optimizations in various LOWMC applications (such as PICNIC) reveals improvements by factors that typically range between 2x and 40x in runtime and memory consumption.

References

[1]
Albrecht MR, Bard GV, and Hart W Algorithm 898: efficient multiplication of dense matrices over GF(2) ACM Trans. Math. Softw. 2010 37 1 9:1-9:14
[2]
Albrecht MR, Rechberger C, Schneider T, Tiessen T, and Zohner M Oswald E and Fischlin M Ciphers for MPC and FHE Advances in Cryptology – EUROCRYPT 2015 2015 Heidelberg Springer 430-454
[3]
Bar-On A, Dinur I, Dunkelman O, Lallemand V, Keller N, and Tsaban B Oswald E and Fischlin M Cryptanalysis of SP networks with partial non-linear layers Advances in Cryptology – EUROCRYPT 2015 2015 Heidelberg Springer 315-342
[4]
Barkan E and Biham E Zheng Y In how many ways can you write Rijndael? Advances in Cryptology — ASIACRYPT 2002 2002 Heidelberg Springer 160-175
[5]
Biryukov A, De Cannière C, Braeken A, and Preneel B Biham E A toolbox for cryptanalysis: linear and affine equivalence algorithms Advances in Cryptology — EUROCRYPT 2003 2003 Heidelberg Springer 33-50
[6]
Boneh, D., Eskandarian, S., Fisch, B.: Post-quantum group signatures from symmetric primitives. IACR ePrint 2018, 261 (2018)
[7]
Chase, M., et al.: Post-quantum zero-knowledge and signatures from symmetric-key primitives. In: CCS, pp. 1825–1842. ACM (2017)
[8]
Chase, M., et al.: The picnic signature algorithm specification (2017). https://github.com/Microsoft/Picnic/blob/master/spec.pdf
[9]
Derler D, Ramacher S, and Slamanig D Baek J, Susilo W, and Kim J Generic double-authentication preventing signatures and a post-quantum instantiation Provable Security 2018 Cham Springer 258-276
[10]
Derler D, Ramacher S, and Slamanig D Lange T and Steinwandt R Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives Post-Quantum Cryptography 2018 Cham Springer 419-440
[11]
Dobraunig C, Eichlseder M, Grassi L, Lallemand V, Leander G, List E, Mendel F, and Rechberger C Shacham H and Boldyreva A Rasta: a cipher with low ANDdepth and few ANDs per bit Advances in Cryptology – CRYPTO 2018 2018 Cham Springer 662-692
[12]
Gérard B, Grosso V, Naya-Plasencia M, and Standaert F-X Bertoni G and Coron J-S Block ciphers that are easier to mask: how far can we go? Cryptographic Hardware and Embedded Systems - CHES 2013 2013 Heidelberg Springer 383-399
[13]
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218–229. ACM (1987)
[14]
Katz, J., Kolesnikov, V., Wang, X.: Improved non-interactive zero knowledge with applications to post-quantum signatures. In: CCS, pp. 525–537. ACM (2018)
[15]
Kolchin VF Random Graphs 1999 Cambridge Cambridge University Press
[16]
Kolesnikov V and Schneider T Aceto L, Damgård I, Goldberg LA, Halldórsson MM, Ingólfsdóttir A, and Walukiewicz I Improved garbled circuit: free XOR gates and applications Automata, Languages and Programming 2008 Heidelberg Springer 486-498
[17]
Randall D Efficient generation of random nonsingular matrices Random Struct. Algorithms 1993 4 1 111-118
[18]
Rasoolzadeh S, Ahmadian Z, Salmasizadeh M, and Aref MR Total break of Zorro using linear and differential attacks ISeCure ISC Int. J. Inf. Secur. 2014 6 1 23-34
[19]
Wang Y, Wu W, Guo Z, and Yu X Boureanu I, Owesarski P, and Vaudenay S Differential cryptanalysis and linear distinguisher of full-round Zorro Applied Cryptography and Network Security 2014 Cham Springer 308-323
[20]
Yao, A.C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162–167. IEEE Computer Society (1986)

Cited By

View all
  • (2021)Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite FieldsAdvances in Cryptology – EUROCRYPT 202110.1007/978-3-030-77886-6_1(3-34)Online publication date: 17-Oct-2021
  • (2021)SoK: How (not) to Design and Implement Post-quantum CryptographyTopics in Cryptology – CT-RSA 202110.1007/978-3-030-75539-3_19(444-477)Online publication date: 17-May-2021
  • (2020)Efficient FPGA Implementations of LowMC and PicnicTopics in Cryptology – CT-RSA 202010.1007/978-3-030-40186-3_18(417-441)Online publication date: 24-Feb-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Advances in Cryptology – EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I
May 2019
765 pages
ISBN:978-3-030-17652-5
DOI:10.1007/978-3-030-17653-2

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 19 May 2019

Author Tags

  1. Block cipher
  2. LOWMC
  3. PICNIC signature scheme
  4. Linear equivalence

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite FieldsAdvances in Cryptology – EUROCRYPT 202110.1007/978-3-030-77886-6_1(3-34)Online publication date: 17-Oct-2021
  • (2021)SoK: How (not) to Design and Implement Post-quantum CryptographyTopics in Cryptology – CT-RSA 202110.1007/978-3-030-75539-3_19(444-477)Online publication date: 17-May-2021
  • (2020)Efficient FPGA Implementations of LowMC and PicnicTopics in Cryptology – CT-RSA 202010.1007/978-3-030-40186-3_18(417-441)Online publication date: 24-Feb-2020
  • (2019)Feistel Structures for MPC, and MoreComputer Security – ESORICS 201910.1007/978-3-030-29962-0_8(151-171)Online publication date: 23-Sep-2019

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media