Security Against Generalized Linear Cryptanalysis and Partitioning Cryptanalysis
نویسندگان
چکیده
In this work we give some bounds which can be used to determine if a block cipher is secure against generalized linear cryptanalysis and partitioning cryptanalysis. For this purpose, we give a new de nition of imbalance which has some nice properties, and we show that an equivalent of Matsui's piling-up lemma holds for this de nition. The bounds are illustrated with examples. We prove that it su ces to consider only homomorphic I/O sums when looking for upper bounds on the imbalance. Based on work of Harpes, Kramer, and Massey, we therefore conclude that very likely the cipher IDEA is secure against generalized linear cryptanalysis. Later, we demonstrate how to apply an upper bound for partitioning cryptanalysis to IDEA. We also show that the use of nearly bent functions in the round function most likely thwarts attacks based on the generalization of linear cryptanalysis and on partitioning cryptanalysis. Hopefully this work will bring us towards a setting which can be used to design ciphers that are secure against the two attacks.
منابع مشابه
A new method for accelerating impossible differential cryptanalysis and its application on LBlock
Impossible differential cryptanalysis, the extension of differential cryptanalysis, is one of the most efficient attacks against block ciphers. This cryptanalysis method has been applied to most of the block ciphers and has shown significant results. Using structures, key schedule considerations, early abort, and pre-computation are some common methods to reduce complexities of this attack. In ...
متن کاملBounds on Non-uniformity Measures for Generalized Linear Cryptanalysis and Partitioning Cryptanalysis
The paper presents a general setting which is used to describe generalized linear and partitioning cryptanalysis. A measure of non-uniformity called imbalance similar to Matsui's bias is deened. Some upper bounds for this measure are presented and used to estimate a cipher's resistance to each of the two attacks. The bounds reveal that there exists a uniied measure which reeects the resistance ...
متن کاملImproved Differential-Linear Cryptanalysis of 7-Round Chaskey with Partitioning
In this work we study the security of Chaskey, a recent lightweight MAC designed by Mouha et al., currently being considered for standardization by ISO/IEC and ITU-T. Chaskey uses an ARX structure very similar to SipHash. We present the first cryptanalysis of Chaskey in the single user setting, with a differential-linear attack against 6 and 7 rounds, hinting that the full version of Chaskey wi...
متن کاملImpossible Differential Cryptanalysis on Deoxys-BC-256
Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round...
متن کاملTime and Space Complexity Reduction of a Cryptanalysis Algorithm
Binary Decision Diagram (in short BDD) is an efficient data structure which has been used widely in computer science and engineering. BDD-based attack in key stream cryptanalysis is one of the best forms of attack in its category. In this paper, we propose a new key stream attack which is based on ZDD(Zero-suppressed BDD). We show how a ZDD-based key stream attack is more efficient in time and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1995