On Matsui's Linear Cryptanalysis

نویسنده

  • Eli Biham
چکیده

to linear cryptanalysis. We also described how to sum up characteristics (which also hold in diierential cryptanalysis). The iteration of this characteristic to seven rounds have probability 1=2 ? 2 ?11. A similar characteristic exist with a reverse order of the bytes in each word. From the tables in 9] we can see that about 4 2 112 = 2 24 known plaintexts are required to attack Feal-8, with success rate about 78% and that 2 25 known plaintexts are required for success rate about 97%. This characteristic can be used to attack Feal-N with up to 20 rounds, with a complexity (and known plaintexts) smaller than of exhaustive search. The attack on Feal-8 was applied successfully on a personal computer. It takes about 10 minutes to encrypt the 2 24 required known plaintexts and to nd the key. 7 Summary In this paper we studied Matsui's linear cryptanalysis. We showed that the formalism of diierential cryptanalysis can be adopted to linear cryptanalysis. In particular, we showed that characteristics can be deened, concatenated, and used in a very similar manner as in diierential cryptanalysis. Constraints on the size of S boxes were described. Matsui's characteristic used to attack DES in his paper is shown to be the best characteristic which has only up to one active S box at each round; on the other hand, we improved his results on Feal. We attack Feal-8 using 2 24 known plaintexts with linear cryptanalysis. Davies' attack on DESS5] was shown to be closely related 15 found two ve-round characteristic with probability 1=2 + 1=32. One of them is:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma

Matsui's linear cryptanalysis for iterated block ciphers is generalized by replacing his linear expressions with I/O sums. For a single round, an I/O sum is the XOR of a balanced binary-valued function of the round input and a balanced binary-valued function of the round output. The basic attack is described and conditions for it to be successful are given. A procedure for nding e ective I/O su...

متن کامل

A Generalization of Linear Cryptanalysis andthe

Matsui's linear cryptanalysis for iterated block ciphers is generalized by replacing his linear expressions with I/O sums. For a single round, an I/O sum is the XOR of a balanced binary-valued function of the round input and a balanced binary-valued function of the round output. The basic attack is described and conditions for it to be successful are given. A procedure for nding eeective I/O su...

متن کامل

Bounds on Non-uniformity Measures for Generalized Linear Cryptanalysis and Partitioning Cryptanalysis

The paper presents a general setting which is used to describe generalized linear and partitioning cryptanalysis. A measure of non-uniformity called imbalance similar to Matsui's bias is deened. Some upper bounds for this measure are presented and used to estimate a cipher's resistance to each of the two attacks. The bounds reveal that there exists a uniied measure which reeects the resistance ...

متن کامل

Security Against Generalized Linear Cryptanalysis and Partitioning Cryptanalysis

In this work we give some bounds which can be used to determine if a block cipher is secure against generalized linear cryptanalysis and partitioning cryptanalysis. For this purpose, we give a new de nition of imbalance which has some nice properties, and we show that an equivalent of Matsui's piling-up lemma holds for this de nition. The bounds are illustrated with examples. We prove that it s...

متن کامل

Decorrelated Fast Cipher: An AES Candidate Well Suited for Low Cost Smart Card Applications

In response to the call for candidates issued by the National Institute for Standards and Technologies (the Advanced Encryp-tion Standard project) the Ecole Normale Sup erieure proposed a candidate called DFC as for \Decorrelated Fast Cipher", based on the decor-relation technique that provides provable security against several classes of attacks (in particular the basic version of Biham and Sh...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994