Abstract
We study on the security against higher order differential attack on block ciphers with two-block structure which have provable security against differential and linear cryptanalysis. The two-block structures are classied three types according to the location of round function such as C(Center)-type, R(Right)-type, and L(Left)-type. We prove that in the case of 4 rounds encryption function, these three types provide an equal strength against higher order differential attack and that in the case of 5 or more rounds, R-type is weaker than C-type and L-type. Moreover, we show that these facts also hold similarly for probabilistic higher order differential attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
K. Aoki and K. Ohta, “Strict evaluation of the maximum average of differential probability and the maximum average of linear probability”, IEICE TRANS. FUNDAMENTALS, No. 1, 1997, pp. 2–8.
E. Biham and A. Shamir, “Differential cryptanalysis of DES-like Cryptosystems”, Advances in Cryptology-CRYPTO’90, LNCS 537, Springer-Verlag, 1990, pp. 2–21.
E. Biham and A. Shamir, “DDifferential cryptanalysis of DES-like Cryptosystems”, Journal of Cryptology, 1991, No. 4, (1), pp. 3–72.
T. Iwata and K. Kurosawa, “Probabilistic higher order differential attack and higher order bent functions”, Advances in Cryptology-ASIACRYPT’99, LNCS 1716, Springer-Verlag, 1999, pp. 62–74.
T. Jacobsen, “Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree”, Advances in Cryptology-CRYPTO’98, LNCS 1462, Springer-Verlag, 1998, pp. 212–222.
T. Jakobsen and L. R. Knudsen, “The interpolation attack on block ciphers”, Fast Software Encryption’97, LNCS 1267, Springer-Verlag, 1997, pp. 28–40.
Y. Kaneko, F. Sano, and K. Sakurai, “On provable security against differential and linear cryptanalysis in generalized Feistel ciphers with multiple random functions”, Proceedings of SAC’97, 1997, pp. 185–199.
L. R. Knudsen, “Truncated and higher order differentials”, Fast Software Encryption’95, LNCS 1008, Springer-Verlag, 1995, pp. 196–211.
X. Lai, “Higher order derivatives and differential cryptanalysis”, Communications and Cryptography, Kluwer Academic Press, 1994, pp. 227–233.
X. Lai, J. Massey, and S. Murphy, “Markov Ciphers and Differential Cryptanalysis”, Advances in Cryptology-Eurocrypt’91, LNCS 547, Springer-Verlag, 1991, pp. 17–38.
M. Matsui, “Linear cryptanalysis method for DES cipher”, Advances in Cryptology-Eurocrypt’93, LNCS 765, Springer-Verlag, 1993, pp. 386–397.
M. Matsui, “New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptalaysis”, Fast Software Encryption, LNCS 1039, Springer-Verlag, 1996, pp. 205–218.
M. Matsui, “New Block Encryption Algorithm MISTY”, Fast Software Encryption’97, LNCS 1267, Springer-Verlag, 1997, pp. 54–68.
National Institute of Standards and Technology, “Skipjack and KEA Algorithm Specifications”, http://csrc.nist.gov/encryption/skipjack-jea.htm, 1998.
K. Nyberg, “Linear Approximation of Block Ciphers”, Advances in Cryptology-Eurocrypt’94, LNCS 950, Springer-Verlag, 1994, pp. 439–444.
K. Nyberg and L. R. Knudsen, “Provable Security against Differential Cryptanalysis”, Journal of Cryptology, 1995, No. 8, (1), pp. 27–37.
T. Shimoyama, S. Moriai, and T. Kaneko, “Improving the higher order differential attack and cryptanalysis of the KN Cipher”, Information Security Workshop, Proceedings, 1997, pp. 1–8.
M. Sugita, “Higher order differential attack of block ciphers MISTY1,2”, Technical Report of IEICE, ISEC 98-4, 1998, pp. 31–40.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kang, JS., Chee, S., Park, C. (2001). A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. In: Won, D. (eds) Information Security and Cryptology — ICISC 2000. ICISC 2000. Lecture Notes in Computer Science, vol 2015. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45247-8_1
Download citation
DOI: https://doi.org/10.1007/3-540-45247-8_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41782-8
Online ISBN: 978-3-540-45247-8
eBook Packages: Springer Book Archive