The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis

被引:0
|
作者
Cao, Wenqin [1 ,2 ,3 ]
Zhang, Wentao [1 ,2 ]
Zhao, Xuefeng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[3] Shandong Univ Technol, Sch Math & Stat, Zibo 100093, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 66卷 / 02期
基金
中国国家自然科学基金;
关键词
multidimensional linear attack; capacity; expected linear probability; data complexity; PROBABILITY;
D O I
10.1093/comjnl/bxab159
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The capacity is an important parameter in multidimensional linear attack. In this paper, we firstly explore the distribution of the key-dependent capacity. Based on the magnitude of the correlation contributions, we divide the linear approximations subspace into two sets: one set consists of the strong linear approximations, and the other set consists of the weak linear approximations. We construct two statistics using the linear approximations in the two sets, respectively. Under reasonable assumptions, both of the two statistics follow Gamma distribution. Thus, the capacity is the sum of two statistics that follow Gamma distribution. Secondly, the accuracy of the model is verified by experiments on SMALLPRESENT[4]. Our experimental results show that this model can estimate the variance of the key-dependent capacity more accurately. Thus, we obtain more precise knowledge of the data complexity of the multidimensional linear attack. We derive the upper bound of the data complexity for multidimensional linear attack. Finally, based on our theoretical results, we explore the data complexity of Cho's multidimensional linear attack on PRESENT. Our results are the smallest data complexity for the same round attack so far.
引用
收藏
页码:269 / 279
页数:11
相关论文
共 50 条
  • [21] Evolutionary cryptography against multidimensional linear cryptanalysis
    HuanGuo Zhang
    ChunLei Li
    Ming Tang
    Science China Information Sciences, 2011, 54 : 2565 - 2577
  • [22] Evolutionary cryptography against multidimensional linear cryptanalysis
    ZHANG HuanGuo 1
    2 Key Laboratory of Aerospace Information Security and Trusted Computing of Ministry of Education of China
    ScienceChina(InformationSciences), 2011, 54 (12) : 2585 - 2597
  • [23] Evolutionary cryptography against multidimensional linear cryptanalysis
    Zhang HuanGuo
    Li ChunLei
    Tang Ming
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (12) : 2565 - 2577
  • [24] Related-key linear cryptanalysis
    Vora, Poorvi L.
    Mir, Darakhshan J.
    2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, : 1609 - +
  • [25] Key-Dependent Message Security: Generic Amplification and Completeness
    Benny Applebaum
    Journal of Cryptology, 2014, 27 : 429 - 451
  • [26] Key-Dependent Message Security: Generic Amplification and Completeness
    Applebaum, Benny
    JOURNAL OF CRYPTOLOGY, 2014, 27 (03) : 429 - 451
  • [27] Towards key-dependent message security in the standard model
    Hofheinz, Dennis
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2008, 2008, 4965 : 108 - +
  • [28] An Improved Video Steganography: Using Random Key-Dependent
    Alia, Mohammad A.
    Abu Maria, Khulood
    Alsarayreh, Maher A.
    Abu Maria, Eman
    Almanasra, Sally
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 234 - 237
  • [29] Key-Dependent Message Security: Generic Amplification and Completeness
    Applebaum, Benny
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 527 - 546
  • [30] DeKaRT: A new paradigm for key-dependent reversible circuits
    Golic, JD
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS CHES 2003, PROCEEDINGS, 2003, 2779 : 98 - 112