Quadratic relation of S-box and its application to the linear attack of full round DES

被引:0
|
作者
Shimoyama, T
Kaneko, T
机构
[1] TAO, Kanagawa Ku, Yokohama, Kanagawa 221, Japan
[2] Sci Univ Tokyo, Noda, Chiba 278, Japan
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this paper, we derive 7 quadratic relations over GF(2) from the input and output bits of the S-boxes of DES. We apply one of those to an improved linear attack of full round DES. We describe an improved algorithm by combining the non-linear approximation method proposed by Knudsen and Robshaw, and the multiple approximation method proposed by Kaliski and Robshaw. This improvement can reduce the number of required plaintexts and ciphertexts pairs to 25/34 (73.5 %) of those number of pairs 2(43) required in the linear attack by Matsui.
引用
收藏
页码:200 / 211
页数:12
相关论文
共 50 条
  • [1] DES S-box generator
    De Meyer, Lauren
    Vaudenay, Serge
    [J]. CRYPTOLOGIA, 2017, 41 (02) : 153 - 171
  • [2] Modeling Large S-box in MILP and a (Related-Key) Differential Attack on Full Round PIPO-64/128
    Yadav, Tarun
    Kumar, Manoj
    [J]. SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2022, 2022, 13783 : 3 - 27
  • [3] On differential and linear approximation of S-box functions
    Chmiel, Krzysztof
    [J]. BIOMETRICS, COMPUTER SECURITY SYSTEMS AND ARTIFICIAL INTELLIGENCE APPLICATIONS, 2006, : 111 - 120
  • [4] A Chaotic System with Infinite Equilibria and Its S-Box Constructing Application
    Wang, Xiong
    Akgul, Akif
    Cavusoglu, Unal
    Viet-Thanh Pham
    Duy Vo Hoang
    Xuan Quynh Nguyen
    [J]. APPLIED SCIENCES-BASEL, 2018, 8 (11):
  • [5] PATTERNS OF ENTROPY DROP OF THE KEY IN AN S-BOX OF THE DES
    ZENG, KC
    YANG, JH
    DAI, ZT
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1988, 293 : 438 - 444
  • [6] A Correlation Fault Attack on Rotating S-Box Masking AES
    Wang, Xingxin
    Zheng, Jian
    Wu, Lingjuan
    Zhu, Jiacheng
    Hu, Wei
    [J]. PROCEEDINGS OF THE 2021 ASIAN HARDWARE ORIENTED SECURITY AND TRUST SYMPOSIUM (ASIANHOST), 2021,
  • [7] A High-Efficient Fault Attack on AES S-box
    Liao, Nan
    Cui, Xiaoxin
    Wang, Tian
    Liao, Kai
    Yu, Dunshan
    Cui, Xiaole
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY (ICIST), 2016, : 210 - 215
  • [8] A new S-box three-layer optimization method and its application
    Su, Yuyue
    Tong, Xiaojun
    Zhang, Miao
    Wang, Zhu
    [J]. NONLINEAR DYNAMICS, 2023, 111 (03) : 2841 - 2867
  • [9] A new S-box three-layer optimization method and its application
    Yuyue Su
    Xiaojun Tong
    Miao Zhang
    Zhu Wang
    [J]. Nonlinear Dynamics, 2023, 111 : 2841 - 2867
  • [10] THE MATRIX POWER FUNCTION AND ITS APPLICATION TO BLOCK CIPHER S-BOX CONSTRUCTION
    Sakalauskas, Eligijus
    Luksys, Kestutis
    [J]. INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (04): : 2655 - 2664