首页> 外文会议>Annual international conference on the theory and applications of cryptographic techniques >Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
【24h】

Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities

机译:分组密码的截断微分和多维线性特性与潜在攻击复杂性之间的联系

获取原文

摘要

The mere number of various apparently different statistical attacks on block ciphers has raised the question about their relationships which would allow to classify them and determine those that give essentially complementary information about the security of block ciphers. While mathematical links between some statistical attacks have been derived in the last couple of years, the important link between general truncated differential and multidimensional linear attacks has been missing. In this work we close this gap. The new link is then exploited to relate the complexities of chosen-plaintext and known-plaintext distinguishing attacks of differential and linear types, and further, to explore the relations between the key-recovery attacks. Our analysis shows that a statistical saturation attack is the same as a truncated differential attack, which allows us, for the first time, to provide a justifiable analysis of the complexity of the statistical saturation attack and discuss its validity on 24 rounds of the PRESENT block cipher. By studying the data, time and memory complexities of a multidimensional linear key-recovery attack and its relation with a truncated differential one, we also show that in most cases a known-plaintext attack can be transformed into a less costly chosen-plaintext attack. In particular, we show that there is a differential attack in the chosen-plaintext model on 26 rounds of PRESENT with less memory complexity than the best previous attack, which assumes known plaintext. The links between the statistical attacks discussed in this paper give further examples of attacks where the method used to sample the data required by the statistical test is more differentiating than the method used for finding the distinguishing property.
机译:对分组密码的各种明显不同的统计攻击的仅有数量提出了关于它们之间关系的问题,该关系允许对它们进行分类并确定那些给出关于分组密码安全性的基本补充信息的信息。尽管最近几年已经得出了一些统计攻击之间的数学联系,但一般的截断差分攻击和多维线性攻击之间的重要联系已经缺失。在这项工作中,我们弥合了这一差距。然后利用新的链接来关联选择的明文和已知明文区分不同类型和线性类型的攻击的复杂性,并进一步探索密钥恢复攻击之间的关系。我们的分析表明,统计饱和攻击与截断差分攻击相同,这使我们首次能够对统计饱和攻击的复杂性进行合理的分析,并在24轮PRESENT块中讨论其有效性。密码。通过研究多维线性密钥恢复攻击的数据,时间和内存复杂性及其与被截断的差分攻击的关系,我们还表明,在大多数情况下,已知明文攻击可以转化为成本更低的选择明文攻击。特别是,我们表明,在选择的纯文本模型中,在26轮PRESENT上存在差异攻击,其内存复杂度比假定已知的纯文本的最佳先前攻击要少。本文讨论的统计攻击之间的联系提供了进一步的攻击示例,其中用于统计测试所需数据采样的方法比用于查找区分属性的方法更具区别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号