The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis

被引:0
|
作者
Cao, Wenqin [1 ,2 ,3 ]
Zhang, Wentao [1 ,2 ]
Zhao, Xuefeng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[3] Shandong Univ Technol, Sch Math & Stat, Zibo 100093, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 66卷 / 02期
基金
中国国家自然科学基金;
关键词
multidimensional linear attack; capacity; expected linear probability; data complexity; PROBABILITY;
D O I
10.1093/comjnl/bxab159
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The capacity is an important parameter in multidimensional linear attack. In this paper, we firstly explore the distribution of the key-dependent capacity. Based on the magnitude of the correlation contributions, we divide the linear approximations subspace into two sets: one set consists of the strong linear approximations, and the other set consists of the weak linear approximations. We construct two statistics using the linear approximations in the two sets, respectively. Under reasonable assumptions, both of the two statistics follow Gamma distribution. Thus, the capacity is the sum of two statistics that follow Gamma distribution. Secondly, the accuracy of the model is verified by experiments on SMALLPRESENT[4]. Our experimental results show that this model can estimate the variance of the key-dependent capacity more accurately. Thus, we obtain more precise knowledge of the data complexity of the multidimensional linear attack. We derive the upper bound of the data complexity for multidimensional linear attack. Finally, based on our theoretical results, we explore the data complexity of Cho's multidimensional linear attack on PRESENT. Our results are the smallest data complexity for the same round attack so far.
引用
收藏
页码:269 / 279
页数:11
相关论文
共 50 条
  • [31] SECURITY OF SIGNATURE SCHEMES IN THE PRESENCE OF KEY-DEPENDENT MESSAGES
    Muniz, Madeline Gonzalez
    Steinwandt, Rainer
    CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 15 - +
  • [32] POSTER: Generic Multidimensional Linear Cryptanalysis of Feistel Ciphers
    Ozdemir, Betul Askin
    Beyne, Tim
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3621 - 3623
  • [33] Designing key-dependent chaotic S-box with larger key space
    Yin, Ruming
    Yuan, Jian
    Wang, Jian
    Shan, Xiuming
    Wang, Xiqin
    CHAOS SOLITONS & FRACTALS, 2009, 42 (04) : 2582 - 2589
  • [34] Multidimensional Zero-Correlation Linear Cryptanalysis on PRINCE
    Cheng, Lu
    Pan, Xiaozhong
    Wei, Yuechuan
    Lv, Liqun
    ADVANCES IN INTERNETWORKING, DATA & WEB TECHNOLOGIES, EIDWT-2017, 2018, 6 : 222 - 232
  • [35] Robust digital watermarking based on key-dependent basis functions
    Fridrich, J
    Baldoza, AC
    Simard, RJ
    INFORMATION HIDING, 1998, 1525 : 143 - 157
  • [36] Key-dependent random image transforms and their applications in image watermarking
    Fridrich, J
    INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS, AND TECHNOLOGY, PROCEEDINGS, 1999, : 237 - 243
  • [37] P-recursive Sequence and key-dependent Multimedia Scrambling
    Zhou, Yicong
    Panetta, Karen
    Agaian, Sos
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2008, 2008, 6982
  • [38] Encryption-scheme security in the presence of key-dependent messages
    Black, J
    Rogaway, P
    Shrimpton, T
    SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 62 - 75
  • [39] Security of message authentication codes in the presence of key-dependent messages
    Madeline González Muñiz
    Rainer Steinwandt
    Designs, Codes and Cryptography, 2012, 64 : 161 - 169
  • [40] Security of message authentication codes in the presence of key-dependent messages
    Muniz, Madeline Gonzalez
    Steinwandt, Rainer
    DESIGNS CODES AND CRYPTOGRAPHY, 2012, 64 (1-2) : 161 - 169