Javascript must be enabled to continue!
Generalized differential-linear cryptanalysis of block cipher
View through CrossRef
Differential-linear cryptanalysis of block ciphers was proposed in 1994. It turns out to be more efficient in comparison with (separately) differential and linear cryptanalytic methods, but its scientific substantiation remains the subject of further research. There are several publications devoted to formalization of differential-linear cryptanalysis and clarification of the conditions under which its complexity can be mathematically accurately assessed. However, the problem of the differential-linear cryptanalytic method substantiation remains completely unresolved.
This paper presents first results obtained by the author in the direction of solving this problem. The class of differential-linear attacks on block ciphers is expanded. Namely, both distinguishing attacks and attacks aimed at recovering one bit of information about a key are considered. In this case, no assumptions are made (as in well-known publications) about the possibility of representing the cipher in the form of some two components. Lower bounds of information complexity of these attacks are obtained. The expressions of these bounds depend on the averaged (by keys) values of the elements’ squares of the generalized autocorrelation table of the encryption transformation. In contrast to the known ones, the obtained bounds are not based on any heuristic assumptions about the investigated block ciphers and are valid for a wider class of attacks as compared to the traditional differential-linear attack. Relations between, respectively, differential, linear and differential-linear properties of bijective Boolean mappings are given. In contrast to the well-known works, the matrix form of the relations is used that makes it possible to clarify better their essence and simplify the proofs. A new relation is derived for the elements of the generalized autocorrelation table of the encryption transformation of the product of two block ciphers, which may be useful in further research.
Title: Generalized differential-linear cryptanalysis of block cipher
Description:
Differential-linear cryptanalysis of block ciphers was proposed in 1994.
It turns out to be more efficient in comparison with (separately) differential and linear cryptanalytic methods, but its scientific substantiation remains the subject of further research.
There are several publications devoted to formalization of differential-linear cryptanalysis and clarification of the conditions under which its complexity can be mathematically accurately assessed.
However, the problem of the differential-linear cryptanalytic method substantiation remains completely unresolved.
This paper presents first results obtained by the author in the direction of solving this problem.
The class of differential-linear attacks on block ciphers is expanded.
Namely, both distinguishing attacks and attacks aimed at recovering one bit of information about a key are considered.
In this case, no assumptions are made (as in well-known publications) about the possibility of representing the cipher in the form of some two components.
Lower bounds of information complexity of these attacks are obtained.
The expressions of these bounds depend on the averaged (by keys) values of the elements’ squares of the generalized autocorrelation table of the encryption transformation.
In contrast to the known ones, the obtained bounds are not based on any heuristic assumptions about the investigated block ciphers and are valid for a wider class of attacks as compared to the traditional differential-linear attack.
Relations between, respectively, differential, linear and differential-linear properties of bijective Boolean mappings are given.
In contrast to the well-known works, the matrix form of the relations is used that makes it possible to clarify better their essence and simplify the proofs.
A new relation is derived for the elements of the generalized autocorrelation table of the encryption transformation of the product of two block ciphers, which may be useful in further research.
Related Results
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Differential, Linear, and Meet‐in‐the‐Middle Attacks on the Lightweight Block Cipher RBFK
Randomized butterfly architecture of fast Fourier transform for key cipher (RBFK) is the lightweight block cipher for Internet of things devices in an edge computing environment. A...
Attacks on the Random Gamming Code
Attacks on the Random Gamming Code
In 1917, Hilbert Vernam patented a top-secret encryption scheme, which at first was called a one-time notepad and later a Vernam cipher. At the time that Vernam proposed this schem...
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
Encryption Efficiency Analysis and Security Evaluation of RC6 Block Cipher for Digital Images
This paper investigates the encryption efficiency of RC6 block cipher application to digital
images, providing a new mathematical measure for encryption efficiency, which we ...
On the Security of Qalqan Cipher Against Differential Cryptanalysis
On the Security of Qalqan Cipher Against Differential Cryptanalysis
In 2021, the first version of block cipher Qalqan was presented. It is positioned as a candidate to the future national encryption standard of the Republic of ...
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Perancangan Kriptografi Block Cipher berbasis Pola Dribbling Practice
Block cipher merupakan salah satu teknik dalam kriptografi modern yang digunakan untuk melakukan enkripsi/dekripsi pada data digital dengan membagi pesan menjadi blok-blok data dan...
Selecting Rotation Constants on SIMON-Type Ciphers
Selecting Rotation Constants on SIMON-Type Ciphers
In 2013, a lightweight block cipher SIMON is proposed by NSA. This paper tries to investigate this design criterion in terms of resisting against impossible differential cryptanaly...
An optimized novel lightweight block cipher for image encryption
An optimized novel lightweight block cipher for image encryption
Abstract
In the era of pervasive multimedia communication, image data has become a dominant form of information exchange across embedded, mobile, and IoT platforms. This ...
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
IMPLEMENTASI DOUBLE CAESAR CIPHER MENGGUNAKAN ASCII
In this paper, it will discuss about the merger between caesar cipher with caesar cipher or called double caesar cipher. In this study will show the design of the double caesar cip...

