- Cryptomeria cipher
The Feistel function of the Cryptomeria cipher.
General Designers 4C Entity First published 2003 Derived from DES Related to CSS Cipher detail Key sizes 56 bits Block sizes 64 bits Structure Feistel network Rounds 10 Best public cryptanalysis A boomerang attack breaks all 10 rounds in 248 time with known S-box, or 253.5 with an unknown S-box, using 244 adaptively chosen plaintexts/ciphertexts.
The Cryptomeria cipher, also called C2, is a proprietary block cipher defined and licensed by the 4C Entity. It is the successor to CSS algorithm (used for DVD-Video) and was designed for the CPRM/CPPM digital rights management scheme which are used by DRM-restricted Secure Digital cards and DVD-Audio discs.
The C2 symmetric key algorithm is a 10-round Feistel cipher. Like DES, it has a key size of 56 bits and a block size of 64 bits. The encryption and decryption algorithms are available for peer review, but implementations require the so-called "secret constant", the values of the substitution box (S-box), which are only available under a license from the 4C Entity.
In 2008, an attack was published against a reduced 8-round version of Cryptomeria to discover the S-box in a chosen-key scenario. In a practical experiment, the attack succeeded in recovering parts of the S-box in 15 hours of CPU time, using 2 plaintext-ciphertext pairs.
A paper by Julia Borghoff, Lars Knudsen, Gregor Leander and Krystian Matusiewicz in 2009 breaks the full-round cipher in three different scenarios; it presents a 224 time complexity attack to recover the S-box in a chosen-key scenario, a 248 boomerang attack to recover the key with a known S-box using 244 adaptively chosen plaintexts/ciphertexts, and a 253.5 attack when both the key and S-box are unknown.
Distributed brute force cracking effort
Following an announcement by Japanese HDTV broadcasters that they would start broadcasting programs with the copy-once broadcast flag starting with 2004-04-05, a distributed Cryptomeria cipher brute force cracking effort was launched on 2003-12-21. To enforce the broadcast flag, digital video recorders employ CPRM-compatible storage devices, which the project aimed to circumvent. However, the project was ended and declared a failure on 2004-03-08 after searching the entire 56-bit keyspace, failing to turn up a valid key for unknown reasons. Because the attack was based on S-box values from DVD-Audio, it was suggested that CPRM may use different S-boxes.
Another brute force attack to recover DVD-Audio CPPM device keys was mounted on 2009-05-06. The attack was intended to find any of 24570 secret device keys by testing MKB file from Queen "The Game" DVD-Audio disc. On 2009-10-20 such key for column 0 and row 24408 was discovered.
The similar brute force attack to recover DVD-VR CPRM device keys was mounted on 2009-10-20. The attack was intended to find any of 3066 secret device keys by testing MKB from Panasonic LM-AF120LE DVD-RAM disc. On 2009-11-27 such key for column 0 and row 2630 was discovered.
By now the CPPM/CPRM protection scheme is deemed unreliable.
- ^ a b Julia Borghoff, Lars Knudsen, Gregor Leander, Krystian Matusiewicz. "Cryptanalysis of C2". Extended Abstract (Technical University of Denmark). http://events.iaik.tugraz.at/weworc09/9aa510c7c7aab1/abstracts/04.pdf.
- ^ a b Ralf-Philipp Weimann (2008-03-01). Algebraic Methods in Block Cipher Cryptanalysis. Darmstadt University of Technology. http://tuprints.ulb.tu-darmstadt.de/1362/1/rpwphd.pdf. (Abstract is in German, rest is in English)
- ^ "Distributed C2 Brute Force Attack: Status Page". http://www.marumo.ne.jp/c2/bf/status.html. Retrieved 2006-08-14.
"C2 Brute Force Crack - team timecop". Archived version of cracking team's English web site. Archived from the original on 2005-03-06. http://web.archive.org/web/20050306065032/http://pbx.mine.nu/ch/c2bf/. Retrieved 2006-10-30.
- ^ "Discussion about the attack (Archived)". Archived from the original on 2005-03-16. http://web.archive.org/web/20050316033144/http://pbx.mine.nu/ch/test/read.cgi/general/1075424427/. Retrieved 2006-10-30.
- (PDF) C2 Block Cipher Specification. 1.0. 4C Entity, LLC. January 17, 2003. http://edipermadi.files.wordpress.com/2008/08/cryptomeria-c2-spec.pdf. Retrieved 2009-02-13.
- "Software Obfuscation from Crackers' Viewpoint" (PDF). Proceedings of the IASTED International Conference. Puerto Vallarta, Mexico. January 23, 2006. http://se.aist-nara.ac.jp/achieve/pdf/118.pdf. Retrieved 2006-08-13.
Block ciphers (security summary) Common
algorithms3-Way · ABC · Akelarre · Anubis · ARIA · BaseKing · BassOmatic · BATON · BEAR and LION · CAST-256 · CIKS-1 · CIPHERUNICORN-A · CIPHERUNICORN-E · CLEFIA · CMEA · Cobra · COCONUT98 · Crab · Cryptomeria/C2 · CRYPTON · CS-Cipher · DEAL · DES-X · DFC · E2 · FEAL · FEA-M · FROG · G-DES · GOST · Grand Cru · Hasty Pudding cipher · Hierocrypt · ICE · IDEA NXT · Intel Cascade Cipher · Iraqi · KASUMI · KeeLoq · KHAZAD · Khufu and Khafre · KN-Cipher · Ladder-DES · Libelle · LOKI97 · LOKI89/91 · Lucifer · M6 · M8 · MacGuffin · Madryga · MAGENTA · MARS · Mercy · MESH · MISTY1 · MMB · MULTI2 · MultiSwap · New Data Seal · NewDES · Nimbus · NOEKEON · NUSH · Q · RC6 · REDOC · Red Pike · S-1 · SAFER · SAVILLE · SC2000 · SHACAL · SHARK · SMS4 · Spectr-H64 · Square · SXAL/MBAL · Threefish · Treyfer · UES · Xenon · xmx · XXTEA · Zodiac
Standardization Misc Cryptography
Wikimedia Foundation. 2010.
Look at other dictionaries:
Cryptomeria — For the computer science cipher, see Cryptomeria cipher. For the Battle Royale character, see Hiroki Sugimura. Cryptomeria Jōmon Sugi (Japanese: 縄文杉), the largest sp … Wikipedia
Cryptomeria — Para la ciencia computada de cifrado, ver Cryptomeria cipher Para el carácter en Battle Royale, ver Hiroki Sugimura Criptomeria japonesa … Wikipedia Español
Cipher security summary — This article summarizes publicly known attacks against ciphers. Note that not all entries may be up to date. Table color key No known successful attacks Theoretical break Attack demonstrated in practice The Best attack column lists the complexity … Wikipedia
Block cipher modes of operation — This article is about cryptography. For method of operating , see modus operandi. In cryptography, modes of operation is the procedure of enabling the repeated and secure use of a block cipher under a single key. A block cipher by itself… … Wikipedia
Block cipher — In cryptography, a block cipher is a symmetric key cipher operating on fixed length groups of bits, called blocks, with an unvarying transformation. A block cipher encryption algorithm might take (for example) a 128 bit block of plaintext as… … Wikipedia
Mercy (cipher) — This article is about the block cipher. For other uses, see Mercy (disambiguation). Mercy General Designers Paul Crowley First published April 2000 Derived from WAKE … Wikipedia
DFC (cipher) — This article is about the block cipher. For other uses, see DFC (disambiguation). DFC General Designers Jacques Stern, Serge Vaudenay, et al. First published 1998 Related to COCONUT98 Cipher detail … Wikipedia
Crab (cipher) — This article is about the block cipher. For other uses, see Crab (disambiguation). Crab General Designers Burt Kaliski, Matt Robshaw First published 1993 Derived from MD5 Related to SHACAL … Wikipedia
Nimbus (cipher) — This article is about the block cipher. For other uses, see Nimbus (disambiguation). Nimbus General Designers Alexis Machado First published 2000 Cipher detail Key sizes 128 bits Block sizes … Wikipedia
C2 — or a derivative may refer to:Biology* C2 domain, a protein structural domain * C2 regulatory sequence for the insulin gene * Apolipoprotein C2, a human apolipoprotein * ATC code C02, a section of the Anatomical Therapeutic Chemical Classification … Wikipedia