A methodology for differential-linear cryptanalysis and its applications

被引:0
|
作者
Jiqiang Lu
机构
[1] Agency for Science,Institute for Infocomm Research
[2] Technology and Research,undefined
来源
关键词
Cryptology; Block cipher; CTC2; DES; Serpent; Differential-linear cryptanalysis; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
Differential and linear cryptanalyses are powerful techniques for analysing the security of a block cipher. In 1994 Langford and Hellman published a combination of differential and linear cryptanalysis under two default independence assumptions, known as differential-linear cryptanalysis, which is based on the use of a differential-linear distinguisher constructed by concatenating a linear approximation with a (truncated) differential with probability 1. In 1995 Langford gave a general version of differential-linear cryptanalysis, so that a differential with a probability smaller than 1 can also be used to construct a differential-linear distinguisher; the general version was published in 2002 by Biham, Dunkelman and Keller with an elaborate explanation using an additional assumption. In this paper, we introduce a new methodology for differential-linear cryptanalysis under the original two assumptions, without using the additional assumption of Biham et al. The new methodology is more reasonable and more general than Langford and Biham et al.’s methodology; and apart from this advantage it can lead to some better cryptanalytic results than Langford and Biham et al.’s methodology and Langford and Hellman’s methodology. As examples, we apply it to 13 rounds of the DES block cipher, 10 rounds of the CTC2 block cipher and 12 rounds of the Serpent block cipher. The new methodology can be used to cryptanalyse other block ciphers, and block cipher designers should pay attention to this new methodology when designing a block cipher.
引用
收藏
页码:11 / 48
页数:37
相关论文
共 50 条
  • [1] A methodology for differential-linear cryptanalysis and its applications
    Lu, Jiqiang
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (01) : 11 - 48
  • [2] A Methodology for Differential-Linear Cryptanalysis and Its Applications
    Lu, Jiqiang
    FAST SOFTWARE ENCRYPTION (FSE 2012), 2012, 7549 : 69 - 89
  • [3] Cryptanalysis by Using Differential-Linear Hull: An Extension to Differential-Linear Cryptanalysis
    Liu, Zhiqiang
    Gu, Dawu
    Ge, Shijing
    Li, Wei
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (06): : 879 - 886
  • [4] Differential-Linear Cryptanalysis of ICEPOLE
    Huang, Tao
    Tjuawinata, Ivan
    Wu, Hongjun
    FAST SOFTWARE ENCRYPTION, FSE 2015, 2015, 9054 : 243 - 263
  • [5] Differential-Linear Cryptanalysis Revisited
    Céline Blondeau
    Gregor Leander
    Kaisa Nyberg
    Journal of Cryptology, 2017, 30 : 859 - 888
  • [6] Differential-linear cryptanalysis of serpent
    Biham, E
    Dunkelman, O
    Keller, N
    FAST SOFTWARE ENCRYPTION, 2003, 2887 : 9 - 21
  • [7] Truncated differential-linear cryptanalysis
    He, Ye-Ping
    Wu, Wen-Ling
    Qing, Si-Han
    Ruan Jian Xue Bao/Journal of Software, 2000, 11 (10): : 1294 - 1298
  • [8] Differential-Linear Cryptanalysis Revisited
    Blondeau, Celine
    Leander, Gregor
    Nyberg, Kaisa
    JOURNAL OF CRYPTOLOGY, 2017, 30 (03) : 859 - 888
  • [9] Enhancing differential-linear cryptanalysis
    Biham, E
    Dunkelman, O
    Keller, N
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 254 - 266
  • [10] Differential-Linear Cryptanalysis Revisited
    Blondeau, Celine
    Leander, Gregor
    Nyberg, Kaisa
    FAST SOFTWARE ENCRYPTION, FSE 2014, 2015, 8540 : 411 - 430