Cryptology ePrint Archive: Report 2022/134

Functional Cryptanalysis: Application to reduced-round Xoodoo

Emanuele Bellini and Rusydi H. Makarim

Abstract: This paper proposes functional cryptanalysis, a flexible and versatile approach to analyse symmetric-key primitives with two primary features. Firstly, it is a generalization of multiple attacks including (but not limited to) differential, rotational and rotational-xor cryptanalysis. Secondly, it is a theoretical framework that unifies all of the aforementioned cryptanalysis techniques and at the same time opens up possibilities for the development of new cryptanalytic approaches. The main idea of functional cryptanalysis is the usage of binary relations in the form of functions, hence the name functional, instead of binary operations like in a classical settings of "differential"-like cryptanalysis. We establish the theoretical foundations of functional cryptanalysis from standard terminologies. This work also presents an interpretation of functional cryptanalysis from the point of view of commutative algebra. In particular, we exhibit an algorithm to compute the functional probability (hence differential, rotational, and rotational-xor probability) using Grobner bases. We demonstrate the applicability of functional cryptanalysis against reduced-round Xoodoo and compare it against the best differential. To avoid dealing with invalid differential trails, we propose a method to construct a valid differential trail using Satisfiability Modulo Theory (SMT). To the best of our knowledge, this is the first time the SMT model is used to construct a valid differential while previous approaches rely on Mixed-Integer Linear Programming (MILP) model. Lastly, we remark that the use of non-translation functionals shares analogous advantages and limitations with the use of nonlinear approximations in linear cryptanalysis.

Category / Keywords: secret-key cryptography / Functional Cryptanalysis, Differential Cryptanalysis, Rotational Cryptanalysis, Rotational-XOR Cryptanalysis, Xoodoo, SMT, Grobner bases

Date: received 7 Feb 2022

Contact author: rusydi hasan at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20220209:085743 (All versions of this report)

Short URL: ia.cr/2022/134


[ Cryptology ePrint archive ]