Skip to main content

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures

  • Conference paper
  • First Online:
Information Security and Cryptology — ICISC 2000 (ICISC 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2015))

Included in the following conference series:

  • 397 Accesses

Abstract

We study on the security against higher order differential attack on block ciphers with two-block structure which have provable security against differential and linear cryptanalysis. The two-block structures are classied three types according to the location of round function such as C(Center)-type, R(Right)-type, and L(Left)-type. We prove that in the case of 4 rounds encryption function, these three types provide an equal strength against higher order differential attack and that in the case of 5 or more rounds, R-type is weaker than C-type and L-type. Moreover, we show that these facts also hold similarly for probabilistic higher order differential attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Aoki and K. Ohta, “Strict evaluation of the maximum average of differential probability and the maximum average of linear probability”, IEICE TRANS. FUNDAMENTALS, No. 1, 1997, pp. 2–8.

    Google Scholar 

  2. E. Biham and A. Shamir, “Differential cryptanalysis of DES-like Cryptosystems”, Advances in Cryptology-CRYPTO’90, LNCS 537, Springer-Verlag, 1990, pp. 2–21.

    Google Scholar 

  3. E. Biham and A. Shamir, “DDifferential cryptanalysis of DES-like Cryptosystems”, Journal of Cryptology, 1991, No. 4, (1), pp. 3–72.

    Article  MathSciNet  Google Scholar 

  4. T. Iwata and K. Kurosawa, “Probabilistic higher order differential attack and higher order bent functions”, Advances in Cryptology-ASIACRYPT’99, LNCS 1716, Springer-Verlag, 1999, pp. 62–74.

    Google Scholar 

  5. T. Jacobsen, “Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree”, Advances in Cryptology-CRYPTO’98, LNCS 1462, Springer-Verlag, 1998, pp. 212–222.

    Chapter  Google Scholar 

  6. T. Jakobsen and L. R. Knudsen, “The interpolation attack on block ciphers”, Fast Software Encryption’97, LNCS 1267, Springer-Verlag, 1997, pp. 28–40.

    Chapter  Google Scholar 

  7. Y. Kaneko, F. Sano, and K. Sakurai, “On provable security against differential and linear cryptanalysis in generalized Feistel ciphers with multiple random functions”, Proceedings of SAC’97, 1997, pp. 185–199.

    Google Scholar 

  8. L. R. Knudsen, “Truncated and higher order differentials”, Fast Software Encryption’95, LNCS 1008, Springer-Verlag, 1995, pp. 196–211.

    Google Scholar 

  9. X. Lai, “Higher order derivatives and differential cryptanalysis”, Communications and Cryptography, Kluwer Academic Press, 1994, pp. 227–233.

    Google Scholar 

  10. X. Lai, J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis”, Advances in Cryptology-Eurocrypt’91, LNCS 547, Springer-Verlag, 1991, pp. 17–38.

    Google Scholar 

  11. M. Matsui, “Linear cryptanalysis method for DES cipher”, Advances in Cryptology-Eurocrypt’93, LNCS 765, Springer-Verlag, 1993, pp. 386–397.

    Google Scholar 

  12. M. Matsui, “New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptalaysis”, Fast Software Encryption, LNCS 1039, Springer-Verlag, 1996, pp. 205–218.

    Google Scholar 

  13. M. Matsui, “New Block Encryption Algorithm MISTY”, Fast Software Encryption’97, LNCS 1267, Springer-Verlag, 1997, pp. 54–68.

    Chapter  Google Scholar 

  14. National Institute of Standards and Technology, “Skipjack and KEA Algorithm Specifications”, http://csrc.nist.gov/encryption/skipjack-jea.htm, 1998.

  15. K. Nyberg, “Linear Approximation of Block Ciphers”, Advances in Cryptology-Eurocrypt’94, LNCS 950, Springer-Verlag, 1994, pp. 439–444.

    Chapter  Google Scholar 

  16. K. Nyberg and L. R. Knudsen, “Provable Security against Differential Cryptanalysis”, Journal of Cryptology, 1995, No. 8, (1), pp. 27–37.

    MathSciNet  Google Scholar 

  17. T. Shimoyama, S. Moriai, and T. Kaneko, “Improving the higher order differential attack and cryptanalysis of the KN Cipher”, Information Security Workshop, Proceedings, 1997, pp. 1–8.

    Google Scholar 

  18. M. Sugita, “Higher order differential attack of block ciphers MISTY1,2”, Technical Report of IEICE, ISEC 98-4, 1998, pp. 31–40.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kang, JS., Chee, S., Park, C. (2001). A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_1

Download citation

  • DOI: https://doi.org/10.1007/3-540-45247-8_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41782-8

  • Online ISBN: 978-3-540-45247-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics