The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis

被引:0
|
作者
Cao, Wenqin [1 ,2 ,3 ]
Zhang, Wentao [1 ,2 ]
Zhao, Xuefeng [1 ,2 ]
机构
[1] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
[2] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing 100093, Peoples R China
[3] Shandong Univ Technol, Sch Math & Stat, Zibo 100093, Peoples R China
来源
COMPUTER JOURNAL | 2023年 / 66卷 / 02期
基金
中国国家自然科学基金;
关键词
multidimensional linear attack; capacity; expected linear probability; data complexity; PROBABILITY;
D O I
10.1093/comjnl/bxab159
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The capacity is an important parameter in multidimensional linear attack. In this paper, we firstly explore the distribution of the key-dependent capacity. Based on the magnitude of the correlation contributions, we divide the linear approximations subspace into two sets: one set consists of the strong linear approximations, and the other set consists of the weak linear approximations. We construct two statistics using the linear approximations in the two sets, respectively. Under reasonable assumptions, both of the two statistics follow Gamma distribution. Thus, the capacity is the sum of two statistics that follow Gamma distribution. Secondly, the accuracy of the model is verified by experiments on SMALLPRESENT[4]. Our experimental results show that this model can estimate the variance of the key-dependent capacity more accurately. Thus, we obtain more precise knowledge of the data complexity of the multidimensional linear attack. We derive the upper bound of the data complexity for multidimensional linear attack. Finally, based on our theoretical results, we explore the data complexity of Cho's multidimensional linear attack on PRESENT. Our results are the smallest data complexity for the same round attack so far.
引用
收藏
页码:269 / 279
页数:11
相关论文
共 50 条
  • [41] Construction of high quality key-dependent S-boxes
    Ao, Tianyong
    Rao, Jinli
    Dai, Kui
    Zou, Xuecheng
    IAENG International Journal of Computer Science, 2017, 44 (03): : 337 - 344
  • [42] Key-dependent side-channel cube attack on CRAFT
    Pang, Kok-An
    Abdul-Latip, Shekh Faisal
    ETRI JOURNAL, 2021, 43 (02) : 344 - 356
  • [43] Geometric-Invariant Image Watermarking by Key-Dependent Triangulation
    Hu, Shiyan
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2008, 32 (02): : 169 - 181
  • [44] Key-dependent pyramidal wavelet domains for secure watermark embedding
    Dietl, WM
    Meerwald, P
    Uhl, A
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS V, 2003, 5020 : 728 - 739
  • [45] Key-Dependent Nonlinear Component for Block Cipher Encryption Algorithm
    Khan, Waqar Ahmad
    Gondal, Muhammad Asif
    3D RESEARCH, 2014, 5 (04):
  • [46] New method of key-dependent message security for asymmetric encryption
    Lai, Qiqi
    Hu, Yupu
    Chen, Yuan
    Wang, Baocang
    Wang, Fenghe
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (13) : 2157 - 2170
  • [47] Authenticated and Misuse-Resistant Encryption of Key-Dependent Data
    Bellare, Mihir
    Keelveedhi, Sriram
    ADVANCES IN CRYPTOLOGY - CRYPTO 2011, 2011, 6841 : 610 - 629
  • [48] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Tao Xu
    Feng Liu
    Chuankun Wu
    Multimedia Tools and Applications, 2018, 77 : 18117 - 18137
  • [49] A white-box AES-like implementation based on key-dependent substitution-linear transformations
    Xu, Tao
    Liu, Feng
    Wu, Chuankun
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (14) : 18117 - 18137
  • [50] Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks
    Boehl, Florian
    Davies, Gareth T.
    Hofheinz, Dennis
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 483 - 500