Advertisement

Cybernetics and Systems Analysis

, Volume 48, Issue 5, pp 701–710 | Cite as

Upper-bound estimates for the average probabilities of integer differentials of round functions of certain block ciphers

  • L. V. Kovalchuk
  • N. V. Kuchinska
Article
  • 34 Downloads

Abstract

The upper bounds for the average probabilities of integer round differentials are obtained for the composition of key adder, substitution block, and shift operator of special structure. The parameters on which these estimates depend and the conditions that minimize these estimates are determined. The statistical distribution of these parameters is obtained.

Keywords

block cipher difference cryptanalysis integer differentials 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    L. Kovalchuk and A. Alekseyshuk, “Upper bounds of maximum value of average differential and linear characteristic probabilities of Feistel cipher with adder modulo 2n,” Theory Stoch. Processes, 12 (28), No. 1, 2, 20–32 (2006).Google Scholar
  2. 2.
    L. V. Kovalchuk, “Upper bounds of the average probabilities of differential approximations of Boolean mappings,” in: Proc. 4th All-Russian Sci. Conf. “Mathematics and security of information technologies” (MaBIT-05), Nov. 2–3, 2005 (2005), pp. 163–167.Google Scholar
  3. 3.
    L. V. Kovalchuk, “Generalized Markov ciphers: Estimating the practical security against the method of differential cryptanalysis,” in: Tr. 5th All-Russian Sci. Conf. “Mathematics and security of information technologies” (MaBIT-06), Oct. 25–27, 2006 (2006), pp 595–599.Google Scholar
  4. 4.
    A. M. Oleksiichuk, L. V. Kovalchuk, and S. V. Palchenko, “Cryptographic parameters of replacement nodes that characterize the security of GOST-like block ciphers against methods of linear and difference cryptanalysis,” Zakhyst Informatsii, No. 2, 12–23 (2007).Google Scholar
  5. 5.
    A. N. Alekseichuk, L. V. Kovalchuk, A. S. Shevtsov, and L. V. Skrypnik, “Estimating the practical security of the block cipher “Kalina” against the difference, linear bilinear cryptanalysis methods,” in: Tr. 7th All-Russian Sci. Conf. “Mathematics and security of information technologies” (MaBIT-08), Oct. 30 – Nov. 2, 2008 (2008), pp. 15–20.Google Scholar
  6. 6.
    A. N. Alekseichuk, L.V. Kovalchuk, E. N. Skrynnik, and A. S. Shevtsov, “Estimating the practical security of the block cipher “Kalina” against methods of difference, linear cryptanalysis, and algebraic attacks based on homomorphisms,” Prikl. Radioelektronika, No. 1, 203–210 (2008).Google Scholar
  7. 7.
    National Institute of Standards and Technology: The Advanced Encryption Standard (AES), http://csrc.nist.gov/aes/.
  8. 8.
    GOST 28147-89, Information Processing Systems. Cryptographic Security. Cryptographic Transformation Algorithm [in Russian], Gosstandart SSSR, Moscow (1989).Google Scholar
  9. 9.
    I. D. Gorbenko, O. S. Tots’kyi, and S. V. Kaz’mina, “A promising block cipher “Kalina”: Main provisions and specifications,” Prikl. Radioelektronika, 6, No. 2, 195–208 (2007).Google Scholar
  10. 10.
    I. D. Gorbenko, M. F. Bondarenko, V. I. Dolgov, et al., “A promising block cipher “Mukhomor”: Main provisions and specifications,” Prikl. Radioelektronika, 6, No. 2, 147–157 (2007).Google Scholar
  11. 11.
    X. Wang and H. Yu, “How to break MD5 and other hash functions,” Adv. Cryptology, EUROCRYPT’05; Lect. Notes in Computer Sci., 3494, 19–35 (2005).Google Scholar
  12. 12.
    S. Cotini, R. L. Riverst, M. J. B. Robshaw, and Y. L. Yin, “Security of the RC6TM block cipher,” http://www.rsasecurity.com/rsalabs/rc6/.
  13. 13.
    T. A. Berson, “Differential cryptanalysis mod 232 with applications to MD5,” Adv. Cryptology, CRYPTO’98 (LNCS), 372, 95–103 (1999).Google Scholar
  14. 14.
    L. V. Kovalchuk, “Upper-bound estimation of the average probabilities of integer-valued differentials in the composition of key adder, substitution block, and shift operator,” Cybern. Syst. Analysis, 46, No. 6, 936–944 (2010).CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Institute of Special Communication and Information ProtectionNational Technical University of Ukraine “Kyiv Polytechnic Institute”KyivUkraine

Personalised recommendations