On multidimensional linear cryptanalysis

Matsui’s Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO’04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP’08, a different approach was taken by studying m-dimensional co...

Full description

Saved in:
Bibliographic Details
Main Authors: Nguyen, Phuong Ha, Wei, Lei, Wang, Huaxiong, Ling, San
Other Authors: School of Physical and Mathematical Sciences
Format: Article
Language:English
Published: 2012
Subjects:
Online Access:https://hdl.handle.net/10356/94603
http://hdl.handle.net/10220/7711
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-94603
record_format dspace
spelling sg-ntu-dr.10356-946032023-02-28T19:31:09Z On multidimensional linear cryptanalysis Nguyen, Phuong Ha Wei, Lei Wang, Huaxiong Ling, San School of Physical and Mathematical Sciences DRNTU::Science::Mathematics Matsui’s Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO’04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP’08, a different approach was taken by studying m-dimensional combined approximations from m base approximations. Known as multidimensional linear cryptanalysis, the requirement for statistical independence is relaxed. In this paper we study the multidimensional Alg. 1 of Hermelin et al.. We derive the formula for N, the number of samples required for the attack and we improve the algorithm by reducing time complexity of the distillation phase from 2m N to 2m2m  + mN, and that of the analysis phase from 22m to 3m2m . We apply the results on 4- and 9-round Serpent and show that Hermelin et al. actually provided a formal model for the hypothesis of Biryukov et al. in practice, and this model is now much more practical with our improvements. Accepted version 2012-04-11T01:11:58Z 2019-12-06T18:59:04Z 2012-04-11T01:11:58Z 2019-12-06T18:59:04Z 2010 2010 Journal Article Nguyen, P. H., Wei, L., Wang, H., & Ling, S. (2010). On multidimensional linear cryptanalysis. Lecture Notes in Computer Science, 6168, 37-52. https://hdl.handle.net/10356/94603 http://hdl.handle.net/10220/7711 10.1007/978-3-642-14081-5_3 en Lecture notes in computer science © 2010 Springer-Verlag Berlin Heidelberg. This is the author created version of a work that has been peer reviewed and accepted for publication by Lecture Notes in Computer Science, Springer-Verlag Berlin Heidelberg. It incorporates referee’s comments but changes resulting from the publishing process, such as copyediting, structural formatting, may not be reflected in this document. The published version is available at: http://dx.doi.org/10.1007/978-3-642-14081-5_3 16 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Science::Mathematics
spellingShingle DRNTU::Science::Mathematics
Nguyen, Phuong Ha
Wei, Lei
Wang, Huaxiong
Ling, San
On multidimensional linear cryptanalysis
description Matsui’s Algorithms 1 and 2 with multiple approximations have been studied over 16 years. In CRYPTO’04, Biryukov et al. proposed a formal framework based on m statistically independent approximations. Started by Hermelin et al. in ACISP’08, a different approach was taken by studying m-dimensional combined approximations from m base approximations. Known as multidimensional linear cryptanalysis, the requirement for statistical independence is relaxed. In this paper we study the multidimensional Alg. 1 of Hermelin et al.. We derive the formula for N, the number of samples required for the attack and we improve the algorithm by reducing time complexity of the distillation phase from 2m N to 2m2m  + mN, and that of the analysis phase from 22m to 3m2m . We apply the results on 4- and 9-round Serpent and show that Hermelin et al. actually provided a formal model for the hypothesis of Biryukov et al. in practice, and this model is now much more practical with our improvements.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Nguyen, Phuong Ha
Wei, Lei
Wang, Huaxiong
Ling, San
format Article
author Nguyen, Phuong Ha
Wei, Lei
Wang, Huaxiong
Ling, San
author_sort Nguyen, Phuong Ha
title On multidimensional linear cryptanalysis
title_short On multidimensional linear cryptanalysis
title_full On multidimensional linear cryptanalysis
title_fullStr On multidimensional linear cryptanalysis
title_full_unstemmed On multidimensional linear cryptanalysis
title_sort on multidimensional linear cryptanalysis
publishDate 2012
url https://hdl.handle.net/10356/94603
http://hdl.handle.net/10220/7711
_version_ 1759857228765986816