Abstract
In the SPN (Substitution-Permutation Network) structure, it is very important to design a diffusion layer to construct a secure block cipher against differential cryptanalysis and linear cryptanalysis. The purpose of this work is to prove that the SPN structure with a maximal diffusion layer provides a provable security against differential cryptanalysis and linear cryptanalysis in the sense that the probability of each differential (respectively linear hull) is bounded by p n (respectively q n), where p (respectively q) is the maximum differential (respectively liner hull) probability of n S-boxes used in the substitution layer.We will also give a provable security for the SPN structure with a semi-maximal diffusion layer against differential cryptanalysis and linear cryptanalysis.
The authors wish to acknowledge the financial support of the Korea Research Foundation made in the program year of 1998.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
E. Biham and A. Shamir, Differential Cryptanalysis of DES-like Cryptosystem, Journal of Cryptoloy, Vol.4, pp. 3–72, 1991.
E. Biham and A. Shamir, Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer, Advanced in cryptology-CRYPTO’91, pp. 156–171, Springer-Verlag, 1991.
E. Biham, On Matsui’s Linear Cryptanalysis, Advanced in cryptology-EUROCRYPT’94, pp. 341–355, Springer-Verlag, 1994.
J. Daemen, R. Govaerts and J. Vandewalle, Correlation Matrices, Proceedings of the first international workshop of the Fast Software Encryption, LNCS 1008, pp. 275–285, Springer-Verlag, 1994.
M. Kanda, Y. Takashima, T. Matsumoto, K. Aoki and K. Ohta, A Strategy for Constructing Fast Functions with Practical Security against Differential and Linear Cryptanalysis, Proceedings of SAC’98, 1998.
M. Matsui, Linear cryptanalysis method for DES cipher, Advanced in cryptology-EUROCRYPT’ 93, pp. 386–397, Springer-Verlag, 1993.
M. Matsui, The first Experimental cryptanalysis of DES, Advanced in cryptology-CRYPTO’94, pp. 1–11, Springer-Verlag, 1994.
M. Matsui, New Block Encryption Algorithm MISTY, Proceedings of the fourth international workshop of Fast Software Encryption, Springer-Verlag, pp. 53–67, 1997.
K. Nyberg and L. R. Knudsen, Provable security against a differential attack, Advanced in cryptology-CRYPTO’92, pp. 566–574, Springer-Verlag, 1992.
K. Nyberg, Differentially uniform mappings for cryptography, Advanced in cryptology-EUROCRYPT’93, pp. 55–64, Springer-Verlag, 1993.
K. Nyberg, Linear Approximation of block ciphers, Advanced in cryptology-EUROCRYPT’94, pp. 439–444, Springer-Verlag, 1994.
V. Rijmen, J. Daemen et al, The cipher SHARK, Proceedings of the fourth international workshop of Fast Software Encryption, pp. 137–151, Springer-Verlag, 1997.
J. Daemen and V. Rijmen, The Rijdael block cipher, AES proposal, 1998.
J. Kang, C. Park, S. Lee and J. Lim, On the optimal diffusion layer with practical security against Differential and Linear Cryptanalysis, Preproceedings of ICISC’99, pp. 13–20, 1999.
X. Lai, J. L. Massey and S. Murphy Markov Ciphers and Differential Cryptanalysis, Advances in Cryptology-EUROCRYPT’91, pp 17–38, Springer-Verlag, 1992.
J. Daemen, Cipher and hash function design strategies based on linear and differential cryptanalysis, Doctoral Dissertation, March 1995, K.U. Leuven.
K. Aoki and K. Ohta, Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability, IEICE Transactions Fundamentals of Electronics, Communications and Computer Science, Vol. E80A,No. 1, pp. 2–8, 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hong, S., Lee, S., Lim, J., Sung, J., Cheon, D., Cho, I. (2001). Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds) Fast Software Encryption. FSE 2000. Lecture Notes in Computer Science, vol 1978. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44706-7_19
Download citation
DOI: https://doi.org/10.1007/3-540-44706-7_19
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-41728-6
Online ISBN: 978-3-540-44706-1
eBook Packages: Springer Book Archive