Towards the Reverse-Engineering of the CaveTable

Abstract : This report focuses on the S-Box used in CMEA . The purpose is to find the generation process of this S-Box. Such knowledge is important since a weak design process usually results in vulnerability against attacks. Many of them have already been published against CMEA. The attackers used the statistical bias in the S-Box to develop their attack. We want to know what caused such a statistical bias, so that this method may be avoided later on. In order to find a structure in this S-Box, we first recall the high level structure that has already been found before. We then look at several properties, such as the linear and differential properties and the hardware related properties, and finally, the relations with other cryptographic algorithms. Our results show that the TU structure is likely just a consequence of the S-Box being generated from thirty-two 4×4 permutations being concatenated. The properties of the tables components involved in the structure are all consistent with those of pseudo-random permutations. Hence, the S-Box might just be constructed using thirty-two pseudo- randomly generated4×4 permutations.
Document type :
Master thesis
Complete list of metadatas

Cited literature [25 references]  Display  Hide  Download

https://hal.inria.fr/hal-02275389
Contributor : Léo Perrin <>
Submitted on : Monday, September 2, 2019 - 11:24:11 AM
Last modification on : Wednesday, September 4, 2019 - 9:43:45 AM

File

sohaib.pdf
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives 4.0 International License

Identifiers

  • HAL Id : hal-02275389, version 1

Collections

Citation

Sohaïb Ouzineb. Towards the Reverse-Engineering of the CaveTable. Cryptography and Security [cs.CR]. 2019. ⟨hal-02275389⟩

Share

Metrics

Record views

198

Files downloads

195