Generating graphs packed with paths: Estimation of linear approximations and differentials

Research output: Contribution to journalJournal articlepeer-review

Documents

  • Mathias Hall-Andersen
  • Philip Søgaard Vejre

When designing a new symmetric-key primitive, the designer must show resistance to known attacks. Perhaps most prominent amongst these are linear and differential cryptanalysis. However, it is notoriously difficult to accurately demonstrate e.g. a block cipher’s resistance to these attacks, and thus most designers resort to deriving bounds on the linear correlations and differential probabilities of their design. On the other side of the spectrum, the cryptanalyst is interested in accurately assessing the strength of a linear or differential attack. While several tools have been developed to search for optimal linear and differential trails, e.g. MILP and SAT based methods, only few approaches specifically try to find as many trails of a single approximation or differential as possible. This can result in an overestimate of a cipher’s resistance to linear and differential attacks, as was for example the case for present. In this work, we present a new algorithm for linear and differential trail search. The algorithm represents the problem of estimating approximations and differentials as the problem of finding many long paths through a multistage graph. We demonstrate that this approach allows us to find a very large number of good trails for each approximation or differential. Moreover, we show how the algorithm can be used to efficiently estimate the key dependent correlation distribution of a linear approximation, facilitating advanced linear attacks. We apply the algorithm to 17 different ciphers, and present new and improved results on several of these.

Original languageEnglish
JournalIACR Transactions on Symmetric Cryptology
Volume2018
Issue number3
Pages (from-to)265-289
Number of pages25
DOIs
Publication statusPublished - 2018

    Research areas

  • Correlation distributions, Differential cryptanalysis, Differentials, Graph theory, Linear approximations, Linear cryptanalysis, Trail search

Number of downloads are based on statistics from Google Scholar and www.ku.dk


No data available

ID: 222161029