Skip to main content

A Chosen Plaintext Linear Attack on Block Cipher CIKS-1

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2513))

Included in the following conference series:

Abstract

In this paper, we firstly evaluate the resistance of the reduced 5-round version of the block cipher CIKS-1 against linear crypt-analysis(LC). A feature of the CIKS-1 is the use of both Data-Dependent permutations(DDP) and internal key scheduing which consist in data-dapendent transformation of the round subkeys. Taking into account the structure of CIKS-1 we investigate linear approximation. That is, we consider 16 linear approximations with p = 3/4 for 16 parallel modulo 22 additions to construct one-round linear approximation and derive one-round linear approximation with the probability of P = 1/2 + 2-17 by Piling-Up lemma. Also we estimate that the P is a valid probability of one-round approximation and achieve that the probability P for one-round approximation is better than 1/2 + 2-17 through experiments. Then we construct 3-round linear approximation with P = 1/2 +2-17 using this one-round approximation and can attack the reduced 5-round CIKS-1 with 64-bit block by LC. In conclusion, we present that our attack requires about 236 chosen plaintexts with a probability of success of 78.5% and 1/5 × 232 × 236 ≈ 265.7 encryption times to recover last round(5-round) key. In addition, we discuss a few improvements of the cipher CIKS-1.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. K. Aoki and K. Ohta, Strict Evaluation of the Maximum Average of Differential Probability and the Maximem Average of Linear Probability, IEICE Transcations fundamentals of Elections, Communications and Computer Sciences, No. 1, 1997, pp 2–8.

    Google Scholar 

  2. C. Burwick, D. Coppersmith, E. D’Avingnon, R. Gennaro et al. MARS, Proceedings of the 1st Advanced Encryption Standard Candidate Conference, Venture,California, Aug.20–22, 1998.

    Google Scholar 

  3. E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993.

    MATH  Google Scholar 

  4. E. Biham, On Matsui’s Linear Cryptanalysis, Advanced in cryptology, Eurocrypt’94, Springer-Verlag, 1994.

    Google Scholar 

  5. W. Becker, Method and system for machine enciphering and deciphering, U.S. patent number 4157454, 1979.

    Google Scholar 

  6. J. Borst, B. Preneel, J. Vandewalle, Linear Cryptanalysis of RC5 and RC6, FSE’99, Springer-Verlag, 1994.

    Google Scholar 

  7. B. Kaliski, Y.L. Yin, On differential linear Cyptanalysis of RC5 encryption algorithm, Advanced in cryptology, CRYPTO’95, 1995.

    Google Scholar 

  8. L.R. Knudsen and J.E. Mathiassen, A Chosen-Plaintext Linear Attack on DES, FSE’2000, 2000.

    Google Scholar 

  9. M. Matsui, A new method for known plaintext attack of FEAL cipher, Advanced in cryptology, Eurocrypt’92, Springer-Verlag, 1992.

    Google Scholar 

  10. M. Matsui, Linear cryptanalysis method for DES cipher, Advanced in cryptology, Eurocrypt’93, Springer-Verlag, 1993.

    Google Scholar 

  11. A.A. Moldovyan, N.A. Moldovyan, A method of the cryptographical transformation of binary data blocks, Russian patent number 2141729 Bull.no.32, 1999.

    Google Scholar 

  12. A.A. Mahara Jr, B. Preneel, J. Vandewalle, Linear cryptanalysis of reduced-round versions of the SAFER, Fast Software Encryption’96, Springer-Verlag, 1996.

    Google Scholar 

  13. R.L. Rivest, The RC5 encryption algorithm, Fast Software Encryption’94, Springer-Verlag, 1995.

    Google Scholar 

  14. R.L. Rivest, M. Robshow, R. Sidney, and Y.L. Yin The RC6 Block cipher, Proceedings of the 1st Advanced Encryption Standard Candidate Conference, Venture, California, Aug.20–22, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, C., Hong, D., Lee, S., Lee, S., Yang, H., Lim, J. (2002). A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. In: Deng, R., Bao, F., Zhou, J., Qing, S. (eds) Information and Communications Security. ICICS 2002. Lecture Notes in Computer Science, vol 2513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36159-6_39

Download citation

  • DOI: https://doi.org/10.1007/3-540-36159-6_39

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00164-5

  • Online ISBN: 978-3-540-36159-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics