ŠVENDA, Petr and Václav MATYÁŠ. On the Origin of Yet another Channel. In B. Christianson, J. Malcolm, F. Stajano, J. Anderson, J. Bonneau. Proceedings of Security Protocols XXI. Berlin: Springer, 2013, p. 223-237. ISBN 978-3-642-41716-0. Available from: https://dx.doi.org/10.1007/978-3-642-41717-7_26.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name On the Origin of Yet another Channel
Authors ŠVENDA, Petr (203 Czech Republic, guarantor, belonging to the institution) and Václav MATYÁŠ (203 Czech Republic, belonging to the institution).
Edition Berlin, Proceedings of Security Protocols XXI, p. 223-237, 15 pp. 2013.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Germany
Confidentiality degree is not subject to a state or trade secret
Publication form printed version "print"
WWW Paper supplementary data
Impact factor Impact factor: 0.402 in 2005
RIV identification code RIV/00216224:14330/13:00066603
Organization unit Faculty of Informatics
ISBN 978-3-642-41716-0
ISSN 0302-9743
Doi http://dx.doi.org/10.1007/978-3-642-41717-7_26
Keywords in English eStream; genetic programming; random distinguisher; randomness statistical testing; software circuit
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 24/4/2014 19:05.
Abstract
Cryptanalysis of a cryptographic function like stream, block or hash function usually requires human cryptanalytical skills and labour. However, some automation is possible -- e.g., by randomness testing suites like NIST/Diehard that can be applied to test statistical properties of cryptographic function outputs. Yet such testing suites are limited only to predefined statistical functions. We propose more open approach based on combination of software circuits and evolutionary algorithms to search for unwanted statistical properties like next bit predictability or random data non-distinguishability. Design of a software circuit acting as a testing function is automatically evolved by a stochastic optimization algorithm and uses the potentially unknown ``other channel'' leaking information during cryptographic function evaluation. We tested this approach on candidate algorithms for SHA-3 and eStream competitions with comparable (but slightly worse) results as STS NIST and Diehard tests w.r.t. the number of rounds of the inspected algorithm, where tests are still able to detect unwanted statistical properties in output. Additionally, the proposed approach is not limited only to assess randomness-like properties in function output, but can be also used for other tests like whether a function is invertible or how does its avalanche effect degrade.
Links
GAP202/11/0422, research and development projectName: Bezpečnostní protokoly podporující soukromí a detekce průniku v bezdrátových senzorových sítích (Acronym: P202/11/0422)
Investor: Czech Science Foundation
PrintDisplayed: 25/4/2024 12:50