On Applicability of Linear Cryptanalysis to DES-like Cryptosystems : LOKI89, LOKI91 and s^2 DES
スポンサーリンク
概要
- 論文の詳細を見る
This paper discusses linear cryptanalysis of LOKI89, LOKI91 and s^2DES. Our computer program based on Matsui's search algorithm has completely determined their best linear approximate equations, which tell us applicability of linear cryptanalysis to each cryptosystem. As a result, LOKI89 and LOKI91 are resistant to linear cryptanalysis from the viewpoint of the best linear approximate probability, whereas s^2 DES is breakable by a known-plaintext attack faster than an exhaustive key search. Moreover, our search program, which is also applicable to differential cryptanalysis, has derived their best differential characteristics as well. These values give a complete proof that characteristics found by Knudsen are actually best.
- 社団法人電子情報通信学会の論文
- 1995-09-25
著者
-
Matsui Mika
Graduate School Of Science And Engineering Yamaguchi University
-
Matsui M
Graduate School Of Science And Engineering Yamaguchi University
-
Tokita Toshio
Computer & Information Systems Laboratory, Mitsubishi Electric Corporation
-
Sorimachi Tohru
Computer & Information Systems Laboratory, Mitsubishi Electric Corporation
-
Matsui Mitsuru
Computer & Information Systems Laboratory, Mitsubishi Electric Corporation
-
Sorimachi Tohru
Computer & Information Systems Laboratory Mitsubishi Electric Corporation
関連論文
- Biopathways representation and simulation on hybrid functional Petri net
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Modeling and Simulation of Fission Yeast Cell Cycle on Hybrid Functional Petri Net(Hybrid Systems)(Concurrent Systems and Hybrid Systems)
- On Applicability of Linear Cryptanalysis to DES-like Cryptosystems : LOKI89, LOKI91 and s^2 DES
- Message Authentication Codes and Differential Attack (Special Section on Cryptography and Information Security)
- A New Cryptanalytic Method for FEAL Cipher (Special Section on Cryptography and Information Security)