From: Peter Fairbrother on
Paul Rubin wrote:
> Peter Fairbrother <zenadsl6186(a)zen.co.uk> writes:
>> Let me rephrase - can anyone remember the formula for calculating the
>> Shannon entropy of a "random" permutation?
>
> Basically you use Stirling's approximation of n! for that:
>
> n! (approx) = (n/e)^n sqrt(2 pi n)
>
> So log2 (n!) (approx) = n log2 (n/e) + 0.5 log2 (2 pi n)
>
> That is equal to the Shannon entropy of the uniform probability
> distribution on the space of permutations on n objects, which I
> think is what you are asking.

Thanks, I hadn't thought of doing it that way - I've been approaching it
from two different angles, which give sightly different results.

Some heavy math ahead, methinks!

Will let you know any interesting results.

-- Peter Fairbrother
From: Simon Johnson on
> Well since you can't perform or store either 2^256 time nor space it's
> largely academic.  My point was if you assume that you can't store
> 2^256 data [or even compute that] then double-AES isn't actually more
> secure.

There's this folk law that states that ciphers degrade in quality over
time, therefore you need more rounds or more key space to resist these
future attacks.

However, this isn't really true. Consider DESX. The underlying DES
transform was published in the middle of the 70s and DES itself was
only broken because of its short key size. DESX is still secure today.

The only reasons we moved to AES, rather than adopting DESX as the
improved standard, was that it was slow and that a 64-bit block is not
enough in an era where you can easily encrypt a terrabyte of data
under counter mode.

DESX would still be a sensible choice of cipher for encrypting your
SSL traffic, even today.

Cheers,

Simon
From: Tom St Denis on
On Jan 26, 4:36 am, Simon Johnson <simon.john...(a)gmail.com> wrote:
> > Well since you can't perform or store either 2^256 time nor space it's
> > largely academic.  My point was if you assume that you can't store
> > 2^256 data [or even compute that] then double-AES isn't actually more
> > secure.
>
> There's this folk law that states that ciphers degrade in quality over
> time, therefore you need more rounds or more key space to resist these
> future attacks.
>
> However, this isn't really true. Consider DESX. The underlying DES
> transform was published in the middle of the 70s and DES itself was
> only broken because of its short key size. DESX is still secure today.
>
> The only reasons we moved to AES, rather than adopting DESX as the
> improved standard, was that it was slow and that a 64-bit block is not
> enough in an era where you can easily encrypt a terrabyte of data
> under counter mode.
>
> DESX would still be a sensible choice of cipher for encrypting your
> SSL traffic, even today.

It's been shown that DES with a new key schedule would also resist DC
and LC much more effectively. Re-using key bits is part of why the
attacks work so well at establishing key bits from the signal [that is
sampled LC and DC queries]. IIRC the official reason for the AES
contest was that triple-DES was too slow [and 64-bit too small], not
single DES. DESX runs in basically the same time as DES since all the
difference is is an additional XOR of key material.

I disagree with the notion that "ciphers degrade over time so 3-cipher
is better" since there are counterproofs to that argument in history.
Look at FEAL. It was originally proposed with all seriousness to have
4 rounds. It was later shown to be vulnerable up to [iirc] 31
rounds. 3 * 4 is 12. Therefore "triple-FEAL" isn't actually any
usefully more secure than single FEAL.

There has largely been a tapering off of cryptanalysis published
reports [from what I can tell] with focus being shifted to related key
attacks and forced collision attacks on PRFs and hashes. I think
ciphers have been resisting cryptanalysis better now than say in the
80s and early 90s because there has been a large focus on ensuring
provable qualities [like branch]. In the 80s and 90s most designs
reached for notions like SAC with complicated permutations which
ultimately were not sufficient. Key schedules have long been ignored
[hence the related key attacks] since most designs look to preserve
entropy [AES for example is fairly simple] with minimal computational
effort. PRFs [like hashes] aren't much different. With the exception
of Whirlpool no modern hash has ANY proof of branch, nor efficacy
(possible exception being VSH but who uses a public key hash
anyways??? hehehehe). Heck the SHA-2 series were designed after wide
input UFNs even after such structures were known to be vulnerable to
DC.

I would not be surprised to see SHA-2 hashes being eroded over the
next 10 years. Probably not to the point where they're useless, but
to the point where there are academic inklings that they're not
exactly what is promised. Much like SHA-1 today. Even if the
Qualcomm results hold true, 2^52 work is too much work for most people
to attempt, and whether that can turn into a pre-image attack is
another story altogether (much like the results on MD5).

Tom
From: Thomas Pornin on
According to Tom St Denis <tom(a)iahu.ca>:
> IIRC the official reason for the AES contest was that triple-DES was
> too slow [and 64-bit too small], not single DES.

Speed was a secondary issue; the main "official" problem was the 64-bit
block size. The contest rules included a clause that the candidates
shall be "as fast as 3DES, or faster, at least for 128-bit keys". The
NIST was quite pleasantly surprised that most of the candidates were
substantially faster than 3DES, but this was not an absolute
requirement.

One of the candidates was DEAL, which, when used with a 128-bit key,
mostly consisted in a 6-round Feistel network with DES as the inner
confusion function. This yielded the same performance than 3DES (6 DES
invocations for a 128-bit block).


> DESX runs in basically the same time as DES since all the difference
> is is an additional XOR of key material.

There is a result somewhere (I think it was published in Eurocrypt some
time between 1999 and 2001) which shows that "academic strength" of
FooX, for whatever block cipher 'Foo', is not as high as expected. I.e.,
for a n-bit block cipher, then the 'X' part adds only about n/2 bits of
security. This is "academic strength", i.e. we are not talking about a
simple 2^(n/2) time factor with no increase in memory requirements or
plaintext/ciphertext pairs; but academic strength is what the NIST uses
to state that 3DES offers 112 bits of security, not 168 bits.

According to that result, DESX has 56+32 = 88 bits of security, which is
still a bit too high to be in the realm of the economically feasible,
but still not high enough for comfort.


> I would not be surprised to see SHA-2 hashes being eroded over the
> next 10 years. Probably not to the point where they're useless, but
> to the point where there are academic inklings that they're not
> exactly what is promised.

It can be expected that the SHA-3 contest will act similarly to the AES
contest. The pre-contest designs (SHA-2 / 3DES) will gradually lose
popularity, perceived strength, or both, and the new designs will be
there to last.

Bets are open on what subjects will the symmetric-cryptologists
massively investigate when the SHA-3 competition closes.


--Thomas Pornin
From: Tom St Denis on
On Jan 26, 9:35 am, Thomas Pornin <por...(a)bolet.org> wrote:
> According to Tom St Denis  <t...(a)iahu.ca>:
>
> > IIRC the official reason for the AES contest was that triple-DES was
> > too slow [and 64-bit too small], not single DES.
>
> Speed was a secondary issue; the main "official" problem was the 64-bit
> block size. The contest rules included a clause that the candidates
> shall be "as fast as 3DES, or faster, at least for 128-bit keys". The
> NIST was quite pleasantly surprised that most of the candidates were
> substantially faster than 3DES, but this was not an absolute
> requirement.
>
> One of the candidates was DEAL, which, when used with a 128-bit key,
> mostly consisted in a 6-round Feistel network with DES as the inner
> confusion function. This yielded the same performance than 3DES (6 DES
> invocations for a 128-bit block).

Stand corrected. Though I don't see how DEAL stood a realistic
chance, it was an academic proposal at best.

> There is a result somewhere (I think it was published in Eurocrypt some
> time between 1999 and 2001) which shows that "academic strength" of
> FooX, for whatever block cipher 'Foo', is not as high as expected. I.e.,
> for a n-bit block cipher, then the 'X' part adds only about n/2 bits of
> security. This is "academic strength", i.e. we are not talking about a
> simple 2^(n/2) time factor with no increase in memory requirements or
> plaintext/ciphertext pairs; but academic strength is what the NIST uses
> to state that 3DES offers 112 bits of security, not 168 bits.

I think a standard MITM applies does it not?

> According to that result, DESX has 56+32 = 88 bits of security, which is
> still a bit too high to be in the realm of the economically feasible,
> but still not high enough for comfort.

I don't know about you but I don't see 2^88 effort of even simply
incrementing an 88-bit counter being feasible in the near future. The
fastest AES runs in around 12 cycles per byte [192 cycles per block]
on a Core 2 Duo processor. To achieve 2^88 clockings would require
2^95 machine cycles. Even if you had a billion processors running
each running at 3GHz it'd still take 2^34 years to complete. Even
with a dedicated ASIC you're still in the realm of 2^30+ years.

The truth of the matter is 80-bit symmetric keys are plenty secure
today. 128-bit was chosen as a minimum because of paranoid fears,
it's a round power of 2, and generally bits are cheap.

> It can be expected that the SHA-3 contest will act similarly to the AES
> contest. The pre-contest designs (SHA-2 / 3DES) will gradually lose
> popularity, perceived strength, or both, and the new designs will be
> there to last.

Sadly, there isn't a lot of theory in the SHA-3 designs.

Tom