Table 5: 4-round impossible differential path.
00 00 00 ** 00 00 00 00 00 00 00 00 00 00 00 00
↓
S-box Layer
↓
00 00 00 ** 00 00 00 00 00 00 00 00 00 00 00 00
↓
L-box Layer
↓
** 00 00 00 00 00 ** ** 00 ** ** 00 ** 00 00 **
↓
S-box Layer
↓
** 00 00 00 00 00 ** ** 00 ** ** 00 ** 00 00 **
↓
L-box Layer
↓
?? ?? ?? ?? ?? ?? ** ?? ?? ?? ?? ?? ?? ?? ?? ??
Contradiction
?? ?? ?? 00 00 ?? 00 00 00 00 ?? 00 00 00 00 ??
↑
S-box Layer
↑
** ** ** 00 00 ** 00 00 00 00 ** 00 00 00 00 **
↑
L-box Layer
↑
00 00 ** 00 00 ** 00 00 00 00 00 00 00 00 00 00
↑
S-box Layer
↑
00 00 80 00 00 80 00 00 00 00 00 00 00 00 00 00
↑
L-box Layer
↑
80 80 00 00 80 00 80 00 80 00 00 00 00 00 80 00
Extracting Key Bits. Here we encrypt many plain-
texts to get the required ciphertext which satisfy our
characteristic. The number of plaintexts required to
encrypt, to get at least one pair of plaintext-ciphertext
is 2
n/2
= 2
128/2
= 2
64
(where n is the size of state)by
using birthday paradox. For all the pairs of plaintext-
ciphertext which satisfy the above differential char-
acteristic, we decrypt the ciphertext for 1 round by
guessing all possible values of key in 4
th
round and by
applying the inverse L-box followed by the inverse S-
box. Here we interchanged the L-Box position with
key addition. In case of Scream the L-box is work-
ing with row bits and S-box is working with column
bits. Therefore for L-box we need 2
16
combination of
target subkeys and again for S-box we need 2
8
combi-
nation of target subkeys, hence we need all the keys to
decrypt. To avoid this condition of guessing all keys,
we interchange the L-Box position with key addition.
We are interested in those pairs where differences
at 3
rd
and 6
th
byte after applying inverse S-box in
round 4 are same and non-zero, while other differ-
ences are zero. This is only possible when S-box in-
verse in round 4 gives two identical differences. If
this is the case, 7
th
byte before round 3 will be inac-
tive. Therefore, guessed key will lead to a contradic-
tion and we can discard that key. Each time we will
halve the remaining candidates for key while always
retaining the correct one. The complexity to guess
keys and decrypt 2 rounds is 2
16
. We have calculated
from the difference distribution table for S-box and
found probability that the transition through the S-box
in the 4
th
round gives two identical differences is ap-
proximately 2
−7
. Therefore the total complexity is
2
14
× 2
64
= 2
78
.
6 CONCLUSION
We have analysed Scream with the techniques, which
previously have not been applied to this algorithm,
that is differential-linear and impossible differential
cryptanalysis. This is work in progress towards a
comprehensive evaluation of Scream. We think it is
essential to analyse these new, promising algorithms
with a possibly wide range of cryptanalytic tools and
techniques. Our work helps to realize this goal.
REFERENCES
Biham, E. and Shamir, A. (1990). Differential cryptanalysis
of des-like cryptosystems. In Advances in Cryptology
- CRYPTO ’90, 10th Annual International Cryptology
Conference, Santa Barbara, California, USA, August
11-15, 1990, Proceedings, pages 2–21.
Dobraunig, C., Eichlseder, M., and Mendel, F. (2015).
Heuristic tool for linear cryptanalysis with applica-
tions to CAESAR candidates. In Advances in Cryp-
tology - ASIACRYPT 2015 - 21st International Con-
ference on the Theory and Application of Cryptology
and Information Security, Auckland, New Zealand,
November 29 - December 3, 2015, Proceedings, Part
II, pages 490–509.
Gandolfi, K., Mourtel, C., and Olivier, F. (2001). Elec-
tromagnetic analysis: Concrete results. In Crypto-
graphic Hardware and Embedded Systems - CHES
2001, Third International Workshop, Paris, France,
May 14-16, 2001, Proceedings, number Generators,
pages 251–261.
Grosso, V., Leurent, G., Standaert, F., and Varici, K. (2014).
Ls-designs: Bitslice encryption for efficient masked
Differential-linear and Impossible Differential Cryptanalysis of Round-reduced Scream
505