This preview shows page 1. Sign up to view the full content.
Unformatted text preview: against Differential and Linear Cryptanalysis
The study of differential and linear cryptanalysis has shed significant light on the theory of good block cipher design. The inventors of IDEA introduced the concept of differentials, a generalization of the basic idea of characteristics . They argued that block ciphers can be designed to resist this attack; IDEA is the result of that work . This concept was further formalized in [1181,1182], when Kaisa Nyberg and Lars Knudsen showed how to make block ciphers provably secure against differential cryptanalysis. This theory has extensions to higher-order differentials [702,161,927,858,860] and partial differentials . Higher-order differentials seem to apply only to ciphers with a small number of rounds, but partial differentials combine nicely with differentials. Linear cryptanalysis is newer, and is still being improved. Notions of key ranking  and multiple approximations [811,812] have been defined. other work that extends the idea of linear cryptanalysis can be found in ;  tries to combine linear and differential cryptanalysis into one attack. It is unclear what design techniques will protect against these sorts of attacks. Knudsen has made some progress, considering some necessary (but not perhaps sufficient) criteria for what he calls practically secure Feistel networks: ciphers that resist both linear and differential cryptanalysis . Nyberg introduced in linear cryptanalysis an analogy to the concept of differentials from differential cryptanalysis . Interestingly enough, there seems to be a duality between differential and linear cryptanalysis. This duality becomes apparent both in the design of techniques to construct good differential characteristics and linear approximations [164,1018], and also in the design criteria for making algorithms that are secure against both attacks . Exactly where this line of research will lead is still unknown. As a start, Daemen has developed an algorithm-design strategy based on linear and differential cryptanalysis ....
View Full Document
This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.
- Fall '10