Open Access
Open access

Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities

Publication typeBook Chapter
Publication date2014-04-30
scimago Q2
SJR0.352
CiteScore2.4
Impact factor
ISSN03029743, 16113349, 18612075, 18612083
Abstract
The mere number of various apparently different statistical attacks on block ciphers has raised the question about their relationships which would allow to classify them and determine those that give essentially complementary information about the security of block ciphers. While mathematical links between some statistical attacks have been derived in the last couple of years, the important link between general truncated differential and multidimensional linear attacks has been missing. In this work we close this gap. The new link is then exploited to relate the complexities of chosen-plaintext and known-plaintext distinguishing attacks of differential and linear types, and further, to explore the relations between the key-recovery attacks. Our analysis shows that a statistical saturation attack is the same as a truncated differential attack, which allows us, for the first time, to provide a justifiable analysis of the complexity of the statistical saturation attack and discuss its validity on 24 rounds of the PRESENT block cipher. By studying the data, time and memory complexities of a multidimensional linear key-recovery attack and its relation with a truncated differential one, we also show that in most cases a known-plaintext attack can be transformed into a less costly chosen-plaintext attack. In particular, we show that there is a differential attack in the chosen-plaintext model on 26 rounds of PRESENT with less memory complexity than the best previous attack, which assumes known plaintext. The links between the statistical attacks discussed in this paper give further examples of attacks where the method used to sample the data required by the statistical test is more differentiating than the method used for finding the distinguishing property.
Found 
Found 

Top-30

Journals

2
4
6
8
10
12
14
16
Lecture Notes in Computer Science
16 publications, 34.04%
Designs, Codes, and Cryptography
2 publications, 4.26%
Journal of Cryptology
2 publications, 4.26%
Science China Information Sciences
2 publications, 4.26%
Computational Intelligence and Neuroscience
2 publications, 4.26%
Transactions on Embedded Computing Systems
1 publication, 2.13%
Scientific Reports
1 publication, 2.13%
Journal of Cryptographic Engineering
1 publication, 2.13%
Cryptography and Communications
1 publication, 2.13%
Security and Communication Networks
1 publication, 2.13%
Advances in Mathematics of Communications
1 publication, 2.13%
IEEE Transactions on Information Theory
1 publication, 2.13%
IEEE Access
1 publication, 2.13%
Discrete Mathematics and Applications
1 publication, 2.13%
Wireless Communications and Mobile Computing
1 publication, 2.13%
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
1 publication, 2.13%
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering
1 publication, 2.13%
Дискретная математика
1 publication, 2.13%
Transactions on Emerging Telecommunications Technologies
1 publication, 2.13%
Journal of Information Security and Applications
1 publication, 2.13%
IEEE Internet of Things Journal
1 publication, 2.13%
ACM Computing Surveys
1 publication, 2.13%
2
4
6
8
10
12
14
16

Publishers

5
10
15
20
25
Springer Nature
24 publications, 51.06%
Institute of Electrical and Electronics Engineers (IEEE)
8 publications, 17.02%
Hindawi Limited
4 publications, 8.51%
Association for Computing Machinery (ACM)
2 publications, 4.26%
Science in China Press
2 publications, 4.26%
Wiley
2 publications, 4.26%
American Institute of Mathematical Sciences (AIMS)
1 publication, 2.13%
Walter de Gruyter
1 publication, 2.13%
Institute of Electronics, Information and Communications Engineers (IEICE)
1 publication, 2.13%
Steklov Mathematical Institute
1 publication, 2.13%
Elsevier
1 publication, 2.13%
5
10
15
20
25
  • We do not take into account publications without a DOI.
  • Statistics recalculated weekly.

Are you a researcher?

Create a profile to get free access to personal recommendations for colleagues and new articles.
Metrics
47
Share
Cite this
GOST |
Cite this
GOST Copy
Blondeau C., Nyberg K. Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities // Lecture Notes in Computer Science. 2014. pp. 165-182.
GOST all authors (up to 50) Copy
Blondeau C., Nyberg K. Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities // Lecture Notes in Computer Science. 2014. pp. 165-182.
RIS |
Cite this
RIS Copy
TY - GENERIC
DO - 10.1007/978-3-642-55220-5_10
UR - https://doi.org/10.1007/978-3-642-55220-5_10
TI - Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities
T2 - Lecture Notes in Computer Science
AU - Blondeau, Céline
AU - Nyberg, Kaisa
PY - 2014
DA - 2014/04/30
PB - Springer Nature
SP - 165-182
SN - 0302-9743
SN - 1611-3349
SN - 1861-2075
SN - 1861-2083
ER -
BibTex
Cite this
BibTex (up to 50 authors) Copy
@incollection{2014_Blondeau,
author = {Céline Blondeau and Kaisa Nyberg},
title = {Links between Truncated Differential and Multidimensional Linear Properties of Block Ciphers and Underlying Attack Complexities},
publisher = {Springer Nature},
year = {2014},
pages = {165--182},
month = {apr}
}