Section: New Results
Symmetric cryptology
Participants : Xavier Bonnetain, Anne Canteaut, Pascale Charpin, Sébastien Duval, Virginie Lallemand, Gaëtan Leurent, Nicky Mouha, María Naya Plasencia, Yann Rotella.
Block ciphers
Our recent results mainly concern either the analysis and design of lightweight block ciphers.
Recent results:

Design and study of a new construction for lowlatency block ciphers, named reflection ciphers, which generalizes the socalled $\alpha $reflection property exploited in PRINCE. This construction aims at reducing the implementation overhead of decryption on top of encryption [13].

Design of a new permutation for wideblock block ciphers: N. Mouha and S. Gueron have proposed a family of cryptographic permutations, named Simpira, that supports inputs of $128b$ bits, where $b$ is a positive integer [50]. This wideblock permutation is mainly based on the AES roundfunction. It then achieves a very high throughput on virtually all modern 64bit processors that have native instructions for AES.

Analysis of the division property against block ciphers [42], [26]: A. Canteaut, together with C. Boura, gave a new approach to the division property, which has been recently introduced as a distinguishing property on block ciphers. This work provides a simpler and more general view of the division property which allows the attacker to take into account the characteristics of the buildingblocks of the cipher. As an illustration, this new approach provides lowdata distinguishers against reducedround Present, which reach a much higher number of rounds than previously known distinguishers of the same type.

Modes of operation for full disk encryption [52]: L. Khati, N. Mouha and D. Vergnaud have classified various FDE modes of operation according to their security in a setting where there is no space to store additional data, like an IV or a MAC value. They also introduce the notion of a diversifier, which does not require additional storage, but allows the plaintext of a particular sector to be encrypted into different ciphertexts.
Authenticated encryption and MACs
A limitation of all classical block ciphers is that they aim at protecting confidentiality only, while most applications need both encryption and authentication. These two functionalities are provided by using a block cipher like the AES together with an appropriate mode of operation. However, it appears that the most widelyused mode of operation for authenticated encryption, AESGCM, is not very efficient for highspeed networks. Also, the security of the GCM mode completely collapses when an IV is reused. These severe drawbacks have then motivated an international competition named CAESAR, partly supported by the NIST, which has been recently launched in order to define some new authenticated encryption schemes (http://competitions.cr.yp.to/caesar.html). The projectteam is involved in a national cryptanalytic effort in this area led by the BRUTUS project funded by the ANR.
Recent results:

Attack against $\pi $Cipher : G. Leurent and his coauthors have presented a guessanddetermine attack against some variants of the $\pi $Cipher family, which is a secondround candidate to the Caesar competition. More precisely, they showed a key recovery attack with time complexity little higher than ${2}^{4\omega}$, and low data complexity, against variants of the cipher with $\omega $bit words, when the internal permutation is reduced to 2.5 rounds out of 3.

Improved generic attacks against hashbased MAC [20]

Cryptanalysis of 7 (out of 8) rounds of the Chaskey MAC [54]. This work has led the designers of Chaskey to increase the number of rounds.
Stream ciphers
Stream ciphers provide an alternative to blockcipherbased encryption schemes. They are especially wellsuited in applications which require either extremely fast encryption or a very lowcost hardware implementation.
Recent results:

Design of encryption schemes for efficient homomorphicciphertext compression (see Section 5.1.3): A. Canteaut, M. NayaPlasencia together with their coauthors have investigated the constraints on the symmetric cipher imposed by this application and they have proposed some solutions based on additive IVbased stream ciphers [44], [30].

Cryptanalysis of the FLIP family of stream ciphers: S. Duval, V. Lallemand and Y. Rotella have exhibited an attack against a new family of stream ciphers intended for use in Fully Homomorphic Encryption systems, and proposed by Méaux et al. at Eurocrypt 2016 [48], [32]. More precisely, their attack applies to the early version of FLIP. It exploits the structure of the filter function and the constant internal state of the cipher. The proposed algorithm then recovers the secret key for the two instantiations originally proposed by Méaux et al.

New types of correlation attacks against filter generators: A. Canteaut and Y. Rotella presented a new family of attacks against filter generators, which exploit a change of the primitive root defining the LFSR [45]. Most notably, an attack can often be mounted by considering nonbijective monomial mappings. In this setting, a divideandconquer strategy applies, based on a search within a multiplicative subgroup of ${\mathbb{F}}_{{2}^{n}}$ where $n$ is the LFSR length. If the LFSR length is not a prime, a fast correlation involving a shorter LFSR can then be performed.
Cryptographic properties and construction of appropriate building blocks
The construction of building blocks which guarantee a high resistance against the known attacks is a major topic within our projectteam, for stream ciphers, block ciphers and hash functions. The use of such optimal objects actually leads to some mathematical structures which may be at the origin of new attacks. This work involves fundamental aspects related to discrete mathematics, cryptanalysis and implementation aspects. Actually, characterizing the structures of the building blocks which are optimal regarding to some attacks is very important for finding appropriate constructions and also for determining whether the underlying structure induces some weaknesses or not. For these reasons, we have investigated several families of filtering functions and of Sboxes which are wellsuited for their cryptographic properties or for their implementation characteristics.
Recent results:

Cryptographic properties of involutions: P. Charpin, together with S. Mesnager and S. Sarkar, has provided a rigorous study of involutions over the finite field of order ${2}^{n}$ which are relevant primitives for cryptographic designs [19]. Most notably, they have focused on the class of involutions defined by Dickson polynomials [61].

Construction of a new family of permutations over binary fields of dimension $(4k+2)$ with good cryptographic properties. An interesting property is that this family includes as a specific case the only known APN permutation of an even number of variables [64].

Construction of cryptographic permutations over finite fields with a sparse representation: P. Charpin, together with N. Cepak and E. Pasalic, exhibited permutations which are derived from sparse functions via linear translators [14].

New methods for determining the differential spectrum of an Sbox: P. Charpin and G. Kyureghyan have proved that the whole differential spectrum of an Sbox can be determined without examining all derivatives of the mapping, but only the derivatives with respect to an element within a hyperplane [18]. Also, they have proved that, for mappings of a special shape, it is enough to consider the derivatives with respect to all elements within a suitable multiplicative subgroup of ${\mathbb{F}}_{{2}^{n}}$.
Sidechannel attacks
Physical attacks must be taken into account in the evaluation of the security of lightweight primitives. Indeed, these primitives are often dedicated to IoT devices in pervasive environments, where an attacker has an easy access to the devices where the primitive is implemented.
Recent results:

Differential fault attack against the block cipher PRIDE [53]: the efficiency of this attack mainly originate from the design of the linear layer of the cipher which relies on the interleaved construction.

Study of the criteria to quantify the resistance offered by an Sbox to differential power analysis [17]. This work by K. Chakraborty and his coauthors shows that the classical criterion, called transparency order, has many limitations; an alternative definition is then proposed.
Security of Internet protocols
Cryptographic primitives are used to in keyexchange protocols such as TLS, IKE and SSH, to verify the integrity of the exchange. The recent works by K. Bhargavan and G. Leurent show the realword impact of some recent theoretical cryptanalytic works.
Recent results:

Impact of hash function collisions on the security of TLS: most practitioners believe that the hash function only need to resist preimage attacks for this use. However, K. Bhargavan and G. Leurent have shown that collisions in the hash function are sufficient to break the integrity of these protocols, and to impersonate some of the parties [41], [34]. Since many protocols still allow the use of MD5 or SHA1 (for which collision attacks are known), this results in some practical attacks, and extends the realworld impact of the collision attacks against MD5 and SHA1. This work has already influenced the latest TLS 1.3 draft, and the main TLS libraries are removing support of MD5 signatures.

Use of block ciphers operating on small blocks: It is wellknown that most modes of operation, like CBC, are not secure if the same key is used for encrypting ${2}^{n/2}$ blocks of plaintext, where $n$ is the block size. But this threat has traditionally been dismissed as impractical, even for 64bit blocks, since it requires some prior knowledge of the plaintext and even then, it only leaks a few secret bits per gigabyte. In this context, K. Bhargavan and G. Leurent demonstrated two concrete attacks that exploit such short block ciphers [40]. First, they presented an attack on the use of 3DES in HTTPS that can be used to recover a secret session cookie. Second, they showed how a similar attack on Blowfish can be used to recover HTTP BasicAuth credentials sent over OpenVPN connections.