Linear Approximations Representation of Moamagar Block Cipher
نویسندگان
چکیده
The security of block ciphers is assessed through their resistance to known attacks. One of the most important attacks is linear cryptanalysis. In this paper, we describe a model for presenting linear approximations for Moamagar block cipher. This graph shows the whole space of linear approximations for the block cipher algorithm is presented through its obtained multi-level weighted directed graph, such that the problem of searching for the best linear characteristic is equivalent to searching for the minimum weight path in the directed graph. We first show how to present linear approximations for different components used in this block cipher through graphs. Then we present split and merge graphs which are used to define the sequential and parallel combination operations. These operations join the obtained graphs of components to construct the graph for one round of the cipher. At last the graph for the cipher with both SPN and DES-like structure will be obtained. At the end, we use the ant colony optimization to search for efficient linear characteristics of Moamagar block cipher and we show the obtained results.
منابع مشابه
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck
In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the significant results for some ciphers such as SIMON (a family of lightweight and hardware-optimized block ciphers designed by NSA) etc. However, in the literature, the MILP-based automatic search algor...
متن کاملNon-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
Non-linear cryptanalysis is a natural extension to Matsui’s linear cryptanalitic techniques in which linear approximations are replaced by nonlinear expressions. Non-linear approximations often exhibit greater absolute biases than linear ones, so it would appear that more powerful attacks may be mounted. However, their use presents two main drawbacks. The first is that in the general case no jo...
متن کاملHow Biased Are Linear Biases ∗
In this paper we re-visit the Matsui’s linear cryptanalysis. The linear attack on the full round DES was the first attack that has been verified experimentally. Matsui extended one-round linear approximations to a linear mask of plaintext-ciphertext pairs by means of his piling-up lemma. The assumption of the lemma, the independence of the random variables in the round approximations, is hopefu...
متن کاملMultidimensional Linear Cryptanalysis of Reduced Round Serpent
Various authors have previously presented di erent approaches how to exploit multiple linear approximations to enhance linear cryptanalysis. In this paper we present a new truly multidimensional approach to generalise Matsui’s Algorithm 1. We derive the statistical framework for it and show how to calculate multidimensional probability distributions based on correlations of onedimensional linea...
متن کاملTotal break of Zorro using linear and differential attacks
An AES-like lightweight block cipher, namely Zorro, was proposed in CHES 2013. While it has a 16-byte state, it uses only 4 S-Boxes per round. This weak nonlinearity was widely criticized, insofar as it has been directly exploited in all the attacks on Zorro reported by now, including the weak key, reduced round, and even full round attacks. In this paper, using some properties discovered by Wa...
متن کامل