Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Generalized differential-linear cryptanalysis of block cipher

View through CrossRef
Differential-linear cryptanalysis of block ciphers was proposed in 1994. It turns out to be more efficient in comparison with (separately) differential and linear cryptanalytic methods, but its scientific substantiation remains the subject of further research. There are several publications devoted to formalization of differential-linear cryptanalysis and clarification of the conditions under which its complexity can be mathematically accurately assessed. However, the problem of the differential-linear cryptanalytic method substantiation remains completely unresolved. This paper  presents first results obtained by the author in the direction of solving this problem. The class of differential-linear attacks on block ciphers is expanded. Namely, both distinguishing attacks and attacks aimed at recovering one bit of information about a key are considered. In this case, no assumptions are made (as in well-known publications) about the possibility of representing the cipher in the form of some two components. Lower bounds of information complexity of these attacks are obtained. The expressions of these bounds depend on the averaged (by keys) values of the elements’ squares of the generalized autocorrelation table of the encryption transformation. In contrast to the known ones, the obtained bounds are not based on any heuristic assumptions about the investigated block ciphers and are valid for a wider class of attacks as compared to the traditional differential-linear attack. Relations between, respectively, differential, linear and differential-linear properties of bijective Boolean mappings are given. In contrast to the well-known works, the matrix form of the relations is used that makes it possible to clarify better their essence and simplify the proofs. A new relation is derived for the elements of the generalized autocorrelation table of the encryption transformation of the product of two block ciphers, which may be useful in further research.
Kharkiv National University of Radioelectronics
Title: Generalized differential-linear cryptanalysis of block cipher
Description:
Differential-linear cryptanalysis of block ciphers was proposed in 1994.
It turns out to be more efficient in comparison with (separately) differential and linear cryptanalytic methods, but its scientific substantiation remains the subject of further research.
There are several publications devoted to formalization of differential-linear cryptanalysis and clarification of the conditions under which its complexity can be mathematically accurately assessed.
However, the problem of the differential-linear cryptanalytic method substantiation remains completely unresolved.
This paper  presents first results obtained by the author in the direction of solving this problem.
The class of differential-linear attacks on block ciphers is expanded.
Namely, both distinguishing attacks and attacks aimed at recovering one bit of information about a key are considered.
In this case, no assumptions are made (as in well-known publications) about the possibility of representing the cipher in the form of some two components.
Lower bounds of information complexity of these attacks are obtained.
The expressions of these bounds depend on the averaged (by keys) values of the elements’ squares of the generalized autocorrelation table of the encryption transformation.
In contrast to the known ones, the obtained bounds are not based on any heuristic assumptions about the investigated block ciphers and are valid for a wider class of attacks as compared to the traditional differential-linear attack.
Relations between, respectively, differential, linear and differential-linear properties of bijective Boolean mappings are given.
In contrast to the well-known works, the matrix form of the relations is used that makes it possible to clarify better their essence and simplify the proofs.
A new relation is derived for the elements of the generalized autocorrelation table of the encryption transformation of the product of two block ciphers, which may be useful in further research.

Related Results

Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
Deep Learning-Based Cryptanalysis of a Simplified AES Cipher
Recently, Deep Neural Networks have shown great deal of reliability and applicability as its applications spread in different areas. This paper proposes a cryptanalysis model based...
On the Security of Qalqan Cipher Against Differential Cryptanalysis
On the Security of Qalqan Cipher Against Differential Cryptanalysis
In 2021, the first version of block cipher Qalqan was presented. It is positioned as a candidate to the future national encryption standard of the Republic of ...
Modified Playfair cryptosystem for improved data security
Modified Playfair cryptosystem for improved data security
Playfair is the earliest known classical block cipher which is capable of taking two characters as a unit in the process of encryption and decryption. However, the cipher is suffer...
Template attack based on uBlock cipher algorithm
Template attack based on uBlock cipher algorithm
The uBlock cipher algorithm is a family of lightweight block cipher algorithms, which was proposed by Wu Wenling, Zhang Lei and others in 2019. Its block length and key length supp...
Symmetric Encryption Algorithm using ASCII Values
Symmetric Encryption Algorithm using ASCII Values
Cryptography at its very core is nothing but math - pure, simple, undiluted math. Math created algorithms that are basics for various encryption algorithm. Encryption is a method i...
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Implementasi Algoritma Kriptografi Vigenère Cipher untuk Pengamanan Teks Digital
Penelitian ini bertujuan untuk mengatasi kebutuhan pengamanan informasi teks digital melalui kriptografi, dengan fokus pada implementasi Vigenère Cipher. Dibandingkan dengan Caesar...
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Secure Access Control using Ciphertext Policy Attribute-based Encryption with Performance Optimization in Cloud Computing
Cipher text-Policy Attribute-Based Encryption is an access control technique widely used in cloud computing for enforcing data access policies based on attributes. However, existin...
Impossible Differential Cryptanalysis of Lightweight Block Cipher WARP
Impossible Differential Cryptanalysis of Lightweight Block Cipher WARP
Abstract WARP is a lightweight block cipher with 128-bit key size and block size, which can be used as a lightweight replacement of AES-128 without changing the mode of ope...

Back to Top