This article primarily introduces how to perform differential cryptanalysis on the traditional block cipher algorithm FEAL-4, and demonstrates the attack process and key implementation details. The text also includes some experimental data and attack results for interested readers to reference or reproduce.
Two Important Images
Before delving into the analysis, here are two images closely related to FEAL-4 to provide an intuitive understanding of differential propagation and the overall encryption process.
Differential Propagation Diagram The figure below shows how plaintext differences (in XOR form) propagate through the encryption rounds in FEAL-4 and ultimately reflect in the ciphertext.
FEAL-4 Workflow Diagram The following figure illustrates the overall encryption framework of FEAL-4, including the left and right blocks of the plaintext, the injection of round subkeys, and the usage flow of the F function.
Characteristics of the F Function
The round function of FEAL-4 (i.e., the F function) can be viewed as some form of random permutation on a 32-bit input. In differential analysis, we do not need the specific implementation of F, but rather focus on its two key differential properties:
If , then .
If , then .
With these two conclusions, we can infer the output behavior under specific differential inputs in subsequent analyses, thereby aiding in locating the subkeys.
Detailed Analysis of Differential Paths
Suppose we choose a pair of special plaintexts and such that: This specific differential vector helps simplify the differential computations in several rounds of FEAL-4 outputs.
1. Derivation of Initial Round Differences
Let denote the left and right blocks of (similarly, denotes those of ).
After the XOR operation in the first round: Similarly, the differential of the right half can be derived.
Furthermore, due to the “additional XOR round” during encryption, we obtain: This implies that in subsequent computations, the differences can be merged in a simpler form.
2. Backward Differential Calculation
After obtaining the plaintext pair and the corresponding ciphertext pair , further backward derivations can be made. Let the ciphertext be denoted as , then:
Compute , obtaining .
Based on the known differential properties, gradually restore intermediate variables such as , , , etc., in the last round.
Using these results, attacks or verifications on the subkeys can be performed.
Attacking K3
In differential analysis, one often starts with attacking an intermediate round subkey, such as . The specific steps are as follows:
Select Plaintext Pairs: I generated 12 pairs of random plaintexts satisfying
Encrypt and Extract Differences: Encrypt the above plaintext pairs to obtain the corresponding ciphertext pairs; combine with the differential path to derive intermediate values , , , etc.
Traverse : Any candidate that satisfies the differential equation is retained.
Using this method, I successfully obtained four candidate subkeys:
1
cfa38976, cfa309f6, 4f238976, 4f2309f6
An example command to execute the above process is:
1
./main -mode=attackk3 -file=K3.txt
This implementation is consistent with the method I introduced on www.theamazingking.com.
Attacking K2
After obtaining several candidates for , we can proceed to deduce . The core equation is: where comes from the previous round operations (including further computations on , , etc.). Similarly:
Generate plaintext pairs that satisfy the differential condition
Capture ciphertext differences after encryption, and by traversing all possible values, check if the differential constraint is satisfied.
Similarly, attacking can be done following the previous process. To ensure the differential path consistently presents the expected results, I generated 12 plaintext pairs satisfying and verified their encryption outputs.
This allows you to input all previously obtained candidate combinations of and at once, and finally find the corresponding candidates.
Attacking K0, K4, K5
Once , , and are all obtained, , , and required for the last round can be deduced. Let the final encrypted left and right parts be , . The corresponding plaintext blocks are , . Then:
By enumerating all possible , the corresponding and can be solved through the above equations. Then, use other plaintext-ciphertext pairs to cross-validate correctness. If all are satisfied, the correct final key set is obtained.
Automatically Generate Random Plaintext Pairs: Control the XOR differences in the code in advance to batch output plaintext files that meet the requirements (e.g., K3_p.txt, K2_p.txt, K1_p.txt).
Parallelized Search: Use Go’s Goroutines to start 10 parallel tasks, maximizing CPU resource utilization on a 10-core Mac.
Progress Bars and Visualization: Use the progressbar library to display search progress in real-time, making the experimental process more intuitive.
2. Verification Methods
Local Custom Key Testing First, select a set of known – (e.g., 0x00000001, 0x00000002, 0x00000004, 0x00000008, 0x00000010, 0x00000020), encrypt the previously generated plaintext pairs, and repeat the differential analysis process to see if this set of keys can be matched among the results. Experiments confirmed the ability to correctly restore this set of test keys, thereby verifying the accuracy of the code logic.
Specific Plaintext-Ciphertext Pair Testing Select a plaintext 1234567890abcdef and the ciphertext f43ae3eeb56e2bbf generated in the Einstein Zone, and verify that each of the 256 candidate – sets can reproduce this encryption mapping, further confirming the attack process is correct.
Final Results
All deduced – are stored in final_result.txt. After deduplication, they include the following ranges:
With the aid of differential analysis, we ultimately obtained a set of candidate subkeys. Compared to modern block ciphers (such as AES), FEAL-4 has fewer rounds and a simpler structure, making it very suitable for demonstrating the concept of differential analysis in teaching and research.
Conclusion
This article detailed the complete process of performing a differential attack on FEAL-4, including designing differential paths, generating plaintext pairs, attacking intermediate subkeys (, , ), and finally reverse-solving for , , . It also introduced several optimizations and verification methods during the code implementation process. The FEAL-4 algorithm, due to its fewer rounds and simpler structure, provides convenience for differential analysis. However, for more secure and complex modern block algorithms, the same analytical approach remains crucial. This case study aims to inspire learners and researchers in cryptography. If you have any questions or improvement suggestions, feel free to discuss and exchange ideas in the comments section!
For DCU’s Secure Programming course, the disassembly problems have a certain pattern. Using a fixed approach to solving them can help achieve quick results.
The position of ebp is the saved frame pointer, and ebp+4 is the return address. Since the problems typically assume all parameters are of type int or int*, ebp+8, ebp+c, and ebp+10 correspond to the first, second, and third parameters, respectively.
By quickly scanning the code for occurrences of 0x__(%ebp) and identifying the largest offset, the number of parameters can be determined as (offset - 4) // 4.
Here, 0x10(%ebp) exists, so the parameter count is (16 - 4) / 4 = 3.
We can construct the framework of the code as:
1 2 3
intfoo(int a, int b, int c) {
}
a, b, and c correspond to ebp+8, ebp+c, and ebp+10, respectively. Note that parameters are pushed onto the stack in reverse order, so the closer to ebp, the earlier the parameter appears in the list.
For now, assume all are int types. Adjust later if inconsistencies are found.
Identify the Number of Local Variables
The number of local variables is determined by the third line of the code: sub $0x4, %esp. The amount subtracted corresponds to the length of the allocated local variables.
In this example, sub $0x4, %esp indicates 4 bytes, so there is one local variable. Assume it is an int and name it i.
The code expands to:
1 2 3
intfoo(int a, int b, int c) { int i; }
Recognize the Loop Body
Loops are typically while or for loops. To identify:
Judgment Entry:
Look for a comparison instruction (e.g., cmp) followed by a jump instruction (e.g., jge or jle).
These indicate the start of a condition check.
Loop Body:
Unconditional jmp instructions signify loops. The jump target is the beginning of the condition check.
Condition:
The judgment condition combines the comparison and preceding instructions into a complete condition.
The combination of cmp and jge indicates a judgment entry.
Loop:
The jmp command jumps to <foo+12>, signifying the loop condition check.
Condition:
mov -0x4(%ebp), %eax: Assigns the value of i to eax.
cmp 0x10(%ebp), %eax: Compares eax (value of i) with c.
This calculates i - c and checks the condition with jge. In assembly, conditions are reversed compared to C: jge skips the loop if the condition is met. Thus, the C condition is i - c < 0.
The code updates to:
1 2 3 4 5 6
intfoo(int a, int b, int c) { int i; while (i - c < 0) {
In a previous article, I used Obsidian’s QuickAdd to create a script that automatically converts text copied from ChatGPT and fixes the LaTeX formatting. However, there is no suitable plugin available for the Craft app.
We can use Raycast to achieve this functionality uniformly.
Create a Raycast Script
First, we need to create a script.
Next, select the Bash template.
Then, we edit the Bash script and enter the following code:
# Documentation: # @raycast.description Copy From ChatGPT # @raycast.author Nansen Li # @raycast.authorURL nansenli.com
# Get clipboard content clipboard_content=$(pbpaste)
# Check if content was successfully retrieved if [ -z "$clipboard_content" ]; then echo"Clipboard is empty or inaccessible." exit 1 fi
# Process clipboard content modified_content=$(echo"$clipboard_content" | \ sed 's/\\\[/$$/g; s/\\\]/$$/g; s/\\( /$/g; s/ \\\)/$/g')
# Write the modified content back to the clipboard echo"$modified_content" | pbcopy
After creating the script, we need to add the directory containing the script to Raycast.
In this step, select the directory where the script was just created. At this point, we can see the newly created script in Script Commands.
How to Use
After copying a formula from ChatGPT, open the Raycast panel, find the newly created script, and run it. The clipboard content will be automatically fixed. Then, simply paste it into Obsidian or Craft.
I’m Nansen, and I participated in the 2024 Huawei Ireland Research Center Server Cluster Management Optimization Competition. Here, I’d like to share my experience in this competition and summarize some key takeaways.
We achieved first place in the algorithm section, scoring approximately 4%-5% higher than the second to fourth places, giving us a significant advantage. However, we faced considerable challenges in the presentation segment. First, we recognized that there is room for improvement in our English fluency. Second, we found that our presentation slides could be more polished and visually appealing. Lastly, we encountered some challenges with time management. Nevertheless, despite these obstacles, we still managed to secure third place overall.
Competition Process
The competition was divided into two stages. The first stage allowed ample preparation time. Once we settled on using the simulated annealing algorithm, we began developing it. The main difficulty in this stage was optimizing and understanding the requirements of the task. During development, we encountered numerous bugs, but after fixing them, our score improved significantly.
In the second stage, as the problem was released on the day of the competition, I continued optimizing the algorithm from the first stage, successfully increasing the evaluation speed by 1000 times. This significantly boosted our performance in the second stage, providing us with enough strength to vie for first place.
In the final round, our algorithm performed very consistently, and after some adjustments, we took a considerable lead over our competitors. However, because we didn’t put enough emphasis on making an effective presentation, we mistakenly believed that high algorithm performance alone would guarantee a top score, which proved to be wrong.
Lessons Learned
Algorithm Choice
Fortunately, I chose the right algorithm from the outset, and shortly after the problem was released, I devised a framework that suited the entire competition. However, I did take some wrong turns, such as attempting impractical algorithms like PPO. After initial trials failed, I should have moved on instead of wasting further effort. Given the limited time, we should focus on achievable optimal results within the shortest period rather than pursuing ideal but unrealistic solutions. It’s also crucial to recognize one’s limitations and concentrate on goals that are achievable in the available time.
Team Collaboration
Luckily, our team division was reasonable this time, and I did my best to ensure every member could contribute their value. One area for improvement is communicating more with team members to understand their ideas and preferences. Since I mainly handled the algorithm part, I had relatively little interaction with teammates, which I will work to improve next time.
Presentation Design
We didn’t anticipate that the level of presentation skills from other teams would be so high. My teammates speculated that some competitors might have a business background, giving them an advantage in crafting presentations. Moreover, they had five members in their team while we only had three, which put us at a disadvantage regarding manpower. These were objective challenges, but if we had paid more attention to creating our presentation, the first prize could have been within our reach.
Over-committing Leading to Imbalance
In the final round, our algorithm was already quite excellent, and our score surpassed the previously top-ranked team. However, I continued spending considerable time on further optimizations. Even though we were significantly ahead, this focus caused us to neglect the preparation of our presentation. In hindsight, I should have known when to stop and fully recognized the importance of balancing different aspects of the scoring criteria.
Conclusion
Participating in the Huawei Tech Arena 2024 competition provided me with invaluable experience. The competition highlighted our strengths, but also revealed areas where we need to improve in terms of showcasing skills and team collaboration. Looking ahead, I will keep these lessons in mind and strive to continuously improve myself in future competitions. If you have any questions, feel free to leave them in the comments section.