"Provable" Security against Differential and Linear Cryptanalysis

نویسنده

  • Kaisa Nyberg
چکیده

In this invited talk, a brief survey on the developments of countermeasures against differential and linear cryptanalysis methods is presented. 1 Nonlinearity of S-boxes Throughout the eighties the unpublished design criteria of the DES had inspired various authors to invent formal nonlinearity criteria for S-boxes such as the strict avalanche criterion [30] and the propagation criterion [27]. At the same time, correlation attacks on combination generators inspired definitions of correlation immunity [29] and perfect nonlinearity [21] of Boolean functions. W. Meier and O. Staffelbach realized that perfect nonlinear Boolean functions had been invented before under the name bent functions [28,12]. Then the discovery of the differential cryptanalysis method [4] lead to the notion of perfect nonlinear S-boxes [22], with the property that for any non-zero input difference the output differences are uniformly distributed. In particular, the output difference zero would occur with the same probability as the non-zero output differences and would significantly improve the probability of the two-round iterative characteristic for a Feistel cipher as pointed out to the author by E. Biham at Eurocrypt 1991. It also means that perfect nonlinear S-boxes cannot be bijective, even worse, the number of input bits must be at least twice the number of output bits [22]. It was clear that the requirement of perfect nonlinearity must be relaxed. But it was not sufficient to take care that the output bits were highly nonlinear Boolean functions as in [26], but also all non-zero linear combinations of the output bits should be highly nonlinear as noted in [23], where the definition of nonlinearity of a vector Boolean function was formulated. The importance of nonlinearity as a cryptographic criterion was highlighted even more as the linear cryptanalysis method was presented by M. Matsui in 1993 [20]. The relationship between nonlinearity (resistance against linear cryptanalysis) and differential uniformity (resistance against differential cryptanalysis) was established in [8]. Since then H. Dobbertin and C. Carlet followed by many other authors have contributed with combinatorial designs and constructions that are almost perfect nonlinear (APN) or satisfy other nonlinearity criteria of S-boxes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Toward Provable Security Against Differential and Linear Cryptanalysis for Camellia and Related Ciphers

We present a new algorithm that evaluates provable security against differential and linear cryptanalysis for Feistel ciphers with invertible substitution-diffusion (SD)-based round functions. This algorithm computes an upper bound on the maximum expected differential or linear probability (MEDP or MELP) based on the number of rounds. We then apply our algorithm to Camellia (minus FL/FL). Previ...

متن کامل

Design Principles of the KASUMI Block Cipher

In this paper, we discuss some of theory of provable security against differential and linear cryptanalysis. We also review the design principles of the block cipher KASUMI—especially its resistance against the basic forms of linear and differential cryptanalysis.

متن کامل

Provable Security against Differential and Linear Cryptanalysis for the SPN Structure

In the SPN (Substitution-Permutation Network) structure, it is very important to design a diffusion layer to construct a secure block cipher against differential cryptanalysis and linear cryptanalysis. The purpose of this work is to prove that the SPN structure with a maximal diffusion layer provides a provable security against differential cryptanalysis and linear cryptanalysis in the sense th...

متن کامل

Practical and Provable Security against Differential and Linear Cryptanalysis for Substitution - Permutation Networks

We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in terms of practical security, we show that the minimum number of differentially active S-boxes and that of linearly active S-boxes are generally not identical a...

متن کامل

On a Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis

We introduce a new methodology for designing block ciphers with provable security against differential and linear cryptanalysis. It is based on three new principles: change of the location of round functions, round functions with recursive structure, and substitution boxes of different sizes. The first realizes parallel computation of the round functions without losing provable security, and th...

متن کامل

New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis

Abst rac t . We introduce a methodology for designing block ciphers with provable security against differential and linear cryptanalysis. It is based on three new principles: change of the location of round functions, round functions with recursive structure, and substitution boxes of different sizes. The first realizes parallel computation of the round functions without losing provable securit...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012