Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(<Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
One of Kaliski and Robshaw's algorithms, which is used for the linear attack on block ciphers with multiple linear approximations and introduced as Algorithm 2M in this paper, looks efficient but lacks any theoretical and mathematical description. It means there exists no way to estimate the data complexity required for the attack by the algorithm except experiments of the reduced variants. In this paper we propose a new algorithm using multiple linear approximation. We achieve the theoretical and mathematical analysis of its success probability. The new algorithm needs about 2^<40.6> plaintexts to find 12 bits of secret key of 16-round DES with a success probability of about 86%.
- 社団法人電子情報通信学会の論文
- 2005-01-01
著者
-
Lee S
Center For Information Security Technologies (cist) Korea University
-
Lee Sangjin
Center For Information Security Technologies (cist) Korea University
-
Hong Seokhie
Center For Information Security Technologies (cist) Korea University
-
Choi J
Center For Information Security Technologies (cist) Korea University
-
Hong Deukjo
Center For Information Security Technologies (cist) Korea University
-
CHOI Jun
Center for Information Security Technologies (CIST), Korea University
関連論文
- DRBAC Model Using a WSNM for Services in i-Home(New Technologies and their Applications of the Internet IV)
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- Construction of UOWHF : Two New Parallel Methods(Symmetric Key Cryptography)(Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- A Genetic Optimization Approach to Operation of a Multi-head Surface Mounting Machine
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function