In
cryptography, the ''eXtended Sparse Linearization'' (XSL) attack is a method of
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic sec ...
for
block cipher
In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called ''blocks''. Block ciphers are specified cryptographic primitive, elementary components in the design of many cryptographic protocols and ...
s. The attack was first published in 2002 by researchers
Nicolas Courtois and
Josef Pieprzyk. It has caused some controversy as it was claimed to have the potential to break the
Advanced Encryption Standard (AES)
cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
, also known as
Rijndael, faster than an
exhaustive search. Since AES is already widely used in commerce and government for the transmission of secret information, finding a technique that can shorten the amount of time it takes to retrieve the secret message without having the key could have wide implications.
The method has a high work-factor, which unless lessened, means the technique does not reduce the effort to break AES in comparison to an exhaustive search. Therefore, it does not affect the real-world security of block ciphers in the near future. Nonetheless, the attack has caused some experts to express greater unease at the algebraic simplicity of the current AES.
In overview, the XSL attack relies on first analyzing the internals of a cipher and deriving a system of
quadratic simultaneous equations. These systems of equations are typically very large, for example 8,000 equations with 1,600
variables for the 128-bit AES. Several methods for solving such systems are known. In the XSL attack, a specialized algorithm, termed ''eXtended Sparse Linearization'', is then applied to solve these equations and recover the
key.
The attack is notable for requiring only a handful of
known plaintexts to perform; previous methods of cryptanalysis, such as
linear and
differential cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. In the broadest sense, it is the study of how differences in information input can aff ...
, often require unrealistically large numbers of known or
chosen plaintext
A chosen-plaintext attack (CPA) is an attack model for cryptanalysis which presumes that the attacker can obtain the ciphertexts for arbitrary plaintexts.Ross Anderson, ''Security Engineering: A Guide to Building Dependable Distributed Systems'' ...
s.
Solving multivariate quadratic equations
Solving
multivariate quadratic equations (MQ) over a finite set of numbers is an
NP-hard
In computational complexity theory, NP-hardness ( non-deterministic polynomial-time hardness) is the defining property of a class of problems that are informally "at least as hard as the hardest problems in NP". A simple example of an NP-hard pr ...
problem (in the general case) with several applications in cryptography. The XSL attack requires an efficient algorithm for tackling MQ. In 1999, Kipnis and
Shamir showed that a particular
public key algorithm, known as the
Hidden Field Equations scheme (HFE), could be reduced to an
overdetermined system of quadratic equations (more equations than unknowns). One technique for solving such systems is
linearization, which involves replacing each quadratic term with an independent variable and solving the resultant linear system using an algorithm such as
Gaussian elimination
In mathematics, Gaussian elimination, also known as row reduction, is an algorithm for solving systems of linear equations. It consists of a sequence of operations performed on the corresponding matrix of coefficients. This method can also be used ...
. To succeed, linearization requires enough
linearly independent equations (approximately as many as the number of terms). However, for the cryptanalysis of HFE there were too few equations, so Kipnis and Shamir proposed ''re-linearization'', a technique where extra non-linear equations are added after linearization, and the resultant system is solved by a second application of linearization. Re-linearization proved general enough to be applicable to other schemes.
In 2000, Courtois et al. proposed an improved algorithm for MQ known as ''XL'' (for ''eXtended Linearization''), which increases the number of equations by multiplying them with all
monomials of a certain
degree. Complexity estimates showed that the XL attack would not work against the equations derived from block ciphers such as AES. However, the systems of equations produced had a special structure, and the XSL algorithm was developed as a refinement of XL which could take advantage of this structure. In XSL, the equations are multiplied only by carefully selected monomials, and several variants have been proposed.
Research into the efficiency of XL and its derivative algorithms remains ongoing (Yang and Chen, 2004).
Application to block ciphers
Courtois and Pieprzyk (2002) observed that
AES
AES may refer to:
Businesses and organizations Companies
* AES Corporation, an American electricity company
* AES Data, former owner of Daisy Systems Holland
* AES Eletropaulo, a former Brazilian electricity company
* AES Andes, formerly AES Gener ...
(Rijndael) and partially also
Serpent could be expressed as a system of quadratic equations. The variables represent not just the
plaintext,
ciphertext and key bits, but also various intermediate values within the algorithm. The
S-box of AES appears to be especially vulnerable to this type of analysis, as it is based on the algebraically simple
inverse function. Subsequently, other ciphers have been studied to see what systems of equations can be produced (
Biryukov and De Cannière, 2003), including
Camellia,
KHAZAD
In cryptography, KHAZAD is a block cipher designed by Paulo S. L. M. Barreto together with Vincent Rijmen, one of the designers of the Advanced Encryption Standard ( Rijndael). KHAZAD is named after Khazad-dûm, the fictional dwarven realm in t ...
,
MISTY1 and
KASUMI. Unlike other forms of cryptanalysis, such as
differential and
linear cryptanalysis, only one or two
known plaintexts are required.
The XSL algorithm is tailored to solve the type of equation systems that are produced. Courtois and Pieprzyk estimate that an "optimistic evaluation shows that the XSL attack might be able to break Rijndael
ith256 bits and Serpent for key lengths
f192 and 256 bits." Their analysis, however, is not universally accepted. For example:
In AES 4 Conference, Bonn 2004, one of the inventors of Rijndael,
Vincent Rijmen, commented, "The XSL attack is not an attack. It is a dream." Promptly Courtois answered, "XSL may be a dream. It may also be a very bad dream and turn into a nightmare."
However neither any later paper or any actions by the
NSA or
NIST
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical sci ...
give any support to this remark by Courtois.
In 2003,
Murphy
Murphy () ( ga, Ua Murchadha) is an Irish surname and the most common surname in the Republic of Ireland.
Origins and variants
The surname is a variant of two Irish surnames: "Ó Murchadha"/"Ó Murchadh" (descendant of "Murchadh"), and "Mac ...
and
Robshaw discovered an alternative description of AES, embedding it in a larger cipher called "BES", which can be described using very simple operations over a single
field, GF(2
8). An XSL attack mounted on this system yields a simpler set of equations which would break AES with complexity of around 2
100, if the Courtois and Pieprzyk analysis is correct. In 2005 Cid and Leurent gave evidence that, in its proposed form, the XSL algorithm does not provide an efficient method for solving the AES system of equations; however Courtois disputed their findings. At FSE 2007, Chu-Wee Lim and Khoongming Khoo showed that it cannot possibly work as presented.
Even if XSL works against some modern algorithms, the attack currently poses little danger in terms of practical security. Like many modern cryptanalytic results, it would be a so-called "certificational weakness": while faster than a
brute force attack, the resources required are still huge, and it is very unlikely that real-world systems could be compromised by using it. Future improvements could increase the practicality of an attack, however. Because this type of attack is new and unexpected, some
cryptographers have expressed unease at the algebraic simplicity of ciphers like Rijndael.
Bruce Schneier and
Niels Ferguson
Niels T. Ferguson (born 10 December 1965, Eindhoven) is a Dutch cryptographer and consultant who currently works for Microsoft. He has worked with others, including Bruce Schneier, designing cryptographic algorithms, testing algorithms and protoco ...
write, "We have one criticism of AES: we don't quite trust the security… What concerns us the most about AES is its simple algebraic structure… No other block cipher we know of has such a simple algebraic representation. We have no idea whether this leads to an attack or not, but not knowing is reason enough to be skeptical about the use of AES." (''Practical Cryptography'', 2003, pp. 56–57)
References
*
*
*
*
*
*
*
* S. Murphy, M. Robsha
Comments on the Security of the AES and the XSL Technique
*
*
*
External links
Courtois' page on AES*
ttps://web.archive.org/web/20100305200432/http://www.usdsi.com/aes.html "AES is NOT broken" by T. MohCourtois and Pieprzyk paper on ePrint* Commentary in the ''Crypto-gram'' newsletter
An overview of AES and XSL
{{Cryptography navbox , block
Cryptographic attacks