On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2

被引:23
|
作者
Bogdanov, Andrey [1 ]
Tischhauser, Elmar [2 ,3 ]
机构
[1] Tech Univ Denmark, Lyngby, Denmark
[2] Katholieke Univ Leuven, Leuven, Belgium
[3] iMinds, Leuven, Belgium
来源
关键词
Block ciphers; Linear cryptanalysis; Data complexity; Wrong key randomisation hypothesis; Key equivalence; Linear hull effect; DISTRIBUTIONS;
D O I
10.1007/978-3-662-43933-3_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper aims to improve the understanding of the complexities for Matsui's Algorithm 2 - one of the most well-studied and powerful cryptanalytic techniques available for block ciphers today. We start with the observation that the standard interpretation of the wrong key randomisation hypothesis needs adjustment. We show that it systematically neglects the varying bias for wrong keys. Based on that, we propose an adjusted statistical model and derive more accurate estimates for the success probability and data complexity of linear attacks which are demonstrated to deviate from all known estimates. Our study suggests that the efficiency of Matsui's Algorithm 2 has been previously somewhat overestimated in the cases where the adversary attempts to use a linear approximation with a low bias, to attain a high computational advantage over brute force, or both. These cases are typical since cryptanalysts always try to break as many rounds of the cipher as possible by pushing the attack to its limit. Surprisingly, our approach also reveals the fact that the success probability is not a monotonously increasing function of the data complexity, and can decrease if more data is used. Using less data can therefore result in a more powerful attack. A second assumption usually made in linear cryptanalysis is the key equivalence hypothesis, even though due to the linear hull effect, the bias can heavily depend on the key. As a further contribution of this paper, we propose a practical technique that aims to take this into account. All theoretical observations and techniques are accompanied by experiments with small-scale ciphers.
引用
收藏
页码:19 / 38
页数:20
相关论文
共 50 条
  • [1] Another look at key randomisation hypotheses
    Subhabrata Samajder
    Palash Sarkar
    [J]. Designs, Codes and Cryptography, 2023, 91 : 3837 - 3855
  • [2] Another look at key randomisation hypotheses
    Samajder, Subhabrata
    Sarkar, Palash
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2023, 91 (12) : 3837 - 3855
  • [3] Generalization of Matsui’s Algorithm 1 to linear hull for key-alternating block ciphers
    Andrea Röck
    Kaisa Nyberg
    [J]. Designs, Codes and Cryptography, 2013, 66 : 175 - 193
  • [4] Generalization of Matsui's Algorithm 1 to linear hull for key-alternating block ciphers
    Rock, Andrea
    Nyberg, Kaisa
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2013, 66 (1-3) : 175 - 193
  • [5] Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
    Subhabrata Samajder
    Palash Sarkar
    [J]. Cryptography and Communications, 2018, 10 : 835 - 879
  • [6] Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
    Samajder, Subhabrata
    Sarkar, Palash
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 835 - 879
  • [7] Wrong key .2. Reply
    不详
    [J]. BYTE, 1997, 22 (07): : 16 - 16
  • [8] Multidimensional Extension of Matsui's Algorithm 2
    Hermelin, Miia
    Cho, Joo Yeon
    Nyberg, Kaisa
    [J]. FAST SOFTWARE ENCRYPTION, 2009, 5665 : 209 - 227
  • [9] Webern's wrong key-signature
    Puffett, D
    [J]. TEMPO, 1997, 199 : 21 - 26
  • [10] What's key for key? The Krumhansl-Schmuckler key-finding algorithm reconsidered
    Temperley, D
    [J]. MUSIC PERCEPTION, 1999, 17 (01): : 65 - 100