The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis

被引:0
|
作者
Cao, Wenqin [1 ,2 ,3 ]
Zhang, Wentao [1 ,2 ]
Zhao, Xuefeng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[3] Shandong Univ Technol, Sch Math & Stat, Zibo 100093, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 66卷 / 02期
基金
中国国家自然科学基金;
关键词
multidimensional linear attack; capacity; expected linear probability; data complexity; PROBABILITY;
D O I
10.1093/comjnl/bxab159
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The capacity is an important parameter in multidimensional linear attack. In this paper, we firstly explore the distribution of the key-dependent capacity. Based on the magnitude of the correlation contributions, we divide the linear approximations subspace into two sets: one set consists of the strong linear approximations, and the other set consists of the weak linear approximations. We construct two statistics using the linear approximations in the two sets, respectively. Under reasonable assumptions, both of the two statistics follow Gamma distribution. Thus, the capacity is the sum of two statistics that follow Gamma distribution. Secondly, the accuracy of the model is verified by experiments on SMALLPRESENT[4]. Our experimental results show that this model can estimate the variance of the key-dependent capacity more accurately. Thus, we obtain more precise knowledge of the data complexity of the multidimensional linear attack. We derive the upper bound of the data complexity for multidimensional linear attack. Finally, based on our theoretical results, we explore the data complexity of Cho's multidimensional linear attack on PRESENT. Our results are the smallest data complexity for the same round attack so far.
引用
收藏
页码:269 / 279
页数:11
相关论文
共 50 条
  • [1] Key-Dependent S-Boxes and Differential Cryptanalysis
    S. Murphy
    M. J. B. Robshaw
    Designs, Codes and Cryptography, 2002, 27 : 229 - 255
  • [2] Key-dependent S-boxes and differential cryptanalysis
    Murphy, S
    Robshaw, MJB
    DESIGNS CODES AND CRYPTOGRAPHY, 2002, 27 (03) : 229 - 255
  • [3] Multidimensional Linear Cryptanalysis
    Hermelin, Miia
    Cho, Joo Yeon
    Nyberg, Kaisa
    JOURNAL OF CRYPTOLOGY, 2019, 32 (01) : 1 - 34
  • [4] Multidimensional Linear Cryptanalysis
    Miia Hermelin
    Joo Yeon Cho
    Kaisa Nyberg
    Journal of Cryptology, 2019, 32 : 1 - 34
  • [5] On Multidimensional Linear Cryptanalysis
    Nguyen, Phuong Ha
    Wei, Lei
    Wang, Huaxiong
    Ling, San
    INFORMATION SECURITY AND PRIVACY, 2010, 6168 : 37 - 52
  • [6] A Key-dependent Cipher DSDP
    Chen, Like
    Zhang, Runtong
    PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 310 - 313
  • [7] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
    Wenqin Cao
    Wentao Zhang
    Cybersecurity, 4
  • [8] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
    Cao, Wenqin
    Zhang, Wentao
    CYBERSECURITY, 2021, 4 (01)
  • [9] Bounded Key-Dependent Message Security
    Barak, Boaz
    Haitner, Iftach
    Hofheinz, Dennis
    Ishai, Yuval
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2010, 2010, 6110 : 423 - +
  • [10] Security Under Key-Dependent Inputs
    Halevi, Shai
    Krawczyk, Hugo
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 466 - 475