Upper-bound estimates for the average probabilities of integer differentials of round functions of certain block ciphers
- 31 Downloads
The upper bounds for the average probabilities of integer round differentials are obtained for the composition of key adder, substitution block, and shift operator of special structure. The parameters on which these estimates depend and the conditions that minimize these estimates are determined. The statistical distribution of these parameters is obtained.
Keywordsblock cipher difference cryptanalysis integer differentials
Unable to display preview. Download preview PDF.
- 1.L. Kovalchuk and A. Alekseyshuk, “Upper bounds of maximum value of average differential and linear characteristic probabilities of Feistel cipher with adder modulo 2n,” Theory Stoch. Processes, 12 (28), No. 1, 2, 20–32 (2006).Google Scholar
- 2.L. V. Kovalchuk, “Upper bounds of the average probabilities of differential approximations of Boolean mappings,” in: Proc. 4th All-Russian Sci. Conf. “Mathematics and security of information technologies” (MaBIT-05), Nov. 2–3, 2005 (2005), pp. 163–167.Google Scholar
- 3.L. V. Kovalchuk, “Generalized Markov ciphers: Estimating the practical security against the method of differential cryptanalysis,” in: Tr. 5th All-Russian Sci. Conf. “Mathematics and security of information technologies” (MaBIT-06), Oct. 25–27, 2006 (2006), pp 595–599.Google Scholar
- 4.A. M. Oleksiichuk, L. V. Kovalchuk, and S. V. Palchenko, “Cryptographic parameters of replacement nodes that characterize the security of GOST-like block ciphers against methods of linear and difference cryptanalysis,” Zakhyst Informatsii, No. 2, 12–23 (2007).Google Scholar
- 5.A. N. Alekseichuk, L. V. Kovalchuk, A. S. Shevtsov, and L. V. Skrypnik, “Estimating the practical security of the block cipher “Kalina” against the difference, linear bilinear cryptanalysis methods,” in: Tr. 7th All-Russian Sci. Conf. “Mathematics and security of information technologies” (MaBIT-08), Oct. 30 – Nov. 2, 2008 (2008), pp. 15–20.Google Scholar
- 6.A. N. Alekseichuk, L.V. Kovalchuk, E. N. Skrynnik, and A. S. Shevtsov, “Estimating the practical security of the block cipher “Kalina” against methods of difference, linear cryptanalysis, and algebraic attacks based on homomorphisms,” Prikl. Radioelektronika, No. 1, 203–210 (2008).Google Scholar
- 7.National Institute of Standards and Technology: The Advanced Encryption Standard (AES), http://csrc.nist.gov/aes/.
- 8.GOST 28147-89, Information Processing Systems. Cryptographic Security. Cryptographic Transformation Algorithm [in Russian], Gosstandart SSSR, Moscow (1989).Google Scholar
- 9.I. D. Gorbenko, O. S. Tots’kyi, and S. V. Kaz’mina, “A promising block cipher “Kalina”: Main provisions and specifications,” Prikl. Radioelektronika, 6, No. 2, 195–208 (2007).Google Scholar
- 10.I. D. Gorbenko, M. F. Bondarenko, V. I. Dolgov, et al., “A promising block cipher “Mukhomor”: Main provisions and specifications,” Prikl. Radioelektronika, 6, No. 2, 147–157 (2007).Google Scholar
- 11.X. Wang and H. Yu, “How to break MD5 and other hash functions,” Adv. Cryptology, EUROCRYPT’05; Lect. Notes in Computer Sci., 3494, 19–35 (2005).Google Scholar
- 12.S. Cotini, R. L. Riverst, M. J. B. Robshaw, and Y. L. Yin, “Security of the RC6TM block cipher,” http://www.rsasecurity.com/rsalabs/rc6/.
- 13.T. A. Berson, “Differential cryptanalysis mod 232 with applications to MD5,” Adv. Cryptology, CRYPTO’98 (LNCS), 372, 95–103 (1999).Google Scholar