Results of Linear Cryptanalysis Using Linear Sieve Methods
スポンサーリンク
概要
- 論文の詳細を見る
Linear cryptanalysis using sieve methods is a technique proposed by Takeda et al. in 1998 as an attack capable of breaking ciphers with smaller amounts of data than linear cryptanalysis (LC) by using data that satisfies linear sieve conditions. This paper shows that when considering the amount of data required for cryptanalysis in Takeda et al.s proposed sieved linear cryptanalysis (S-LC), it is necessary to take into account the independence of keys relating to the linear mask (Linear key) and keys relating to the linear sieve mask (Sieve key) in rounds that are affected by these keys. If p is the probability that the linear approximate expression holds and p* is the probability after applying the linear sieve, then it has been shown that when the Linear keys are independent of the Sieve keys, then it is necessary to select the linear mask and linear sieve mask so that a larger value of p* - p is obtained. It is also shown that the amount of data needed for S-LC cannot be reduced below the amount of data needed for LC when the Linear key and Sieve key are not independent. In fixed sieve linear cryptanalysis, it is shown that the amount of data needed for cryptanalysis cannot be reduced regardless of the independence of the Linear key and Sieve key.
- (社)電子情報通信学会の論文
- 2009-05-01
著者
-
TSUNOO Yukiyasu
NEC Corporation
-
SAITO Teruo
NEC Software Hokuriku, Ltd.
-
KAWABATA Takeshi
NEC Software Hokuriku, Ltd.
-
KUBO Hiroyasu
NEC Software Hokuriku, Ltd.
-
Saito Teruo
Nec Software Hokuriku Ltd.
-
Kubo Hiroyasu
Nec Software Hokuriku Ltd.
-
Kawabata Takeshi
Nec Software Hokuriku Ltd.
-
NAKASHIMA Hiroki
NEC Software Hokuriku, Ltd.
-
Nakashima Hiroki
Nec Software Hokuriku Ltd.
関連論文
- Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
- Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
- A low-cost LSI design of AES against DPA attack by hiding power information (第21回 回路とシステム軽井沢ワークショップ論文集) -- (実現技術)
- An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
- Access-Driven Cache Attack on the Stream Cipher DICING Using the Chosen IV
- Results of Linear Cryptanalysis Using Linear Sieve Methods
- Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
- Higher Order Differential Attack on 6-Round MISTY1
- Finding Higher Order Differentials of MISTY1
- Finding Higher Order Differentials of MISTY1