The Independence of Linear Approximations in Symmetric Cryptanalysis
نویسندگان
چکیده
منابع مشابه
Non-Linear Approximations in Linear Cryptanalysis
By considering the role of non-linear approximations in linear cryptanalysis we obtain a generalization of Matsui’s linear cryptanalytic techniques. This approach allows the cryptanalyst greater flexibility in mounting a linear cryptanalytic attack and we demonstrate the effectiveness of our non-linear techniques with some simple attacks on LOKI91. These attacks potentially allow for the recove...
متن کاملLinear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limits of this extension when applied to DES, but illustrate that it is generally applicable and might be exceptionally successful when applied to other block ciphers. This forces us to reconsider some of the initial attem...
متن کاملOn Linear Cryptanalysis with Many Linear Approximations
In this paper we present a theoretical framework to quantify the information brought by several linear approximations of a blockcipher without putting any restriction on these approximations. We quantify here the entropy of the key given the plaintext-ciphertext pairs statistics which is a much more accurate measure than the ones studied earlier. The techniques which are developed here apply to...
متن کاملLinear Cryptanalysis Using Multiple Linear Approximations
In this article, the theory of multidimensional linear attacks on block ciphers is developed and the basic attack algorithms and their complexity estimates are presented. As an application the multidimensional linear distinguisher derived by Cho for the block cipher PRESENT is discussed in detail.
متن کاملLinear Cryptanalysis Using Low-bias Linear Approximations
This paper deals with linear approximations having absolute bias smaller than 2− n 2 which were previously believed to be unusable for a linear attack. We show how a series of observations which are individually not statistically significant can be used to create a χ distinguisher. This is different from previous works which combined a series of significant observations to reduce the data compl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2006
ISSN: 0018-9448
DOI: 10.1109/tit.2006.885528