Affiliation:
1. The University of Adelaide , Australia
2. Tel Aviv University , Israel
3. Deckard Technologies Inc. , USA
Abstract
Abstract
The Pilsung cipher is part of the North Korean Red Star operating system, which was leaked to the West in 2014. Initial analysis by Kryptos Logic reported a possibility of a class of weak keys due to the use of pseudo-random diffusion. Following this lead, we analyzed the cipher and identified a small class of such weak keys. We developed techniques for searching for a key that belongs to the class. After spending thousands of CPU hours, we found a supposedly weak key for a slightly weaker version of Pilsung, but the key did not behave as we expected. On further investigation we found out a crucial misunderstanding in a critical part of the cipher and that no such class of weak keys exists in Pilsung. Thus, this paper makes two main contributions to the art of cryptanalysis. First, it identifies and shows how to investigate a potential weakness in randomizing diffusion, which although does not exist in Pilsung, may affect future designs. Second, it highlights the need for early verification of results in order to identify errors before expending significant resources.
Publisher
Oxford University Press (OUP)
Reference28 articles.
1. The Design of Rijndael
2. Generation of random permutations of given number of elements using random sampling numbers;Rao;Sankhya: Indian J. Stat., Ser. A,1961
3. A simple randomization procedure;Sandelius;J. R. Stat. Soc. Ser. B,1962
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献