Abstract
Despite their widespread usage in block cipher analysis, the success probability estimation of differential and linear cryptanalytic attacks has traditionally been carried out in a rather ad hoc fashion. In this paper, we present an analytical calculation of the success probability of these attacks. Besides providing a sound formulation of the success probabilities, the analysis reveals some previously unnoticed factors affecting the success of an attack, such as the attacked key length in differential cryptanalysis. The results apply to an extended sense of the term “success” where the correct key is found not necessarily as the highest-ranking candidate but within a set of highest-ranking candidates.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer-Verlag, 1993.
Burgess Davis. Personal communication.
Pascal Junod. On the complexity of Matsui’s attack. In Selected Areas in Cryptography’ 01, pages 199–211. Springer-Verlag, 2001.
F. C. Leone, N. L. Nelson, and R. B. Nottingham. The folded normal distribution. Technometrics, 3:543–550, 1961.
Mitsuru Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology-Eurocrypt’93, pages 386–397. Springer-Verlag, 1993.
Mitsuru Matsui. The first experimental cryptanalysis of the Data Encryption Standard. InY. G. Desmedt, editor, Advances in Cryptology-Crypto’94, pages 1–11. Springer-Verlag, 1994.
A. Rényi. Probability Theory. American Elsevier Publishing Company, Inc., 1970.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Aydin Selçuk, A., Biçak, A. (2003). On Probability of Success in Linear and Differential Cryptanalysis. In: Cimato, S., Persiano, G., Galdi, C. (eds) Security in Communication Networks. SCN 2002. Lecture Notes in Computer Science, vol 2576. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36413-7_13
Download citation
DOI: https://doi.org/10.1007/3-540-36413-7_13
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00420-2
Online ISBN: 978-3-540-36413-9
eBook Packages: Springer Book Archive