Skip to main content

Advertisement

Springer Nature Link
Log in
Menu
Find a journal Publish with us Track your research
Search
Cart
  1. Home
  2. Fast Software Encryption
  3. Conference paper

The interpolation attack on block ciphers

  • Conference paper
  • First Online: 01 January 2006
  • pp 28–40
  • Cite this conference paper
Fast Software Encryption (FSE 1997)
The interpolation attack on block ciphers
  • Thomas Jakobsen1 &
  • Lars R. Knudsen2 

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1267))

Included in the following conference series:

  • International Workshop on Fast Software Encryption
  • 3222 Accesses

  • 5 Altmetric

Abstract

In this paper we introduce a new method of attacks on block ciphers, the interpolation attack. This new method is useful for attacking ciphers using simple algebraic functions (in particular quadratic functions) as S-boxes. Also, ciphers of low non-linear order are vulnerable to attacks based on higher order differentials. Recently, Knudsen and Nyberg presented a 6-round prototype cipher which is provably secure against ordinary differential cryptanalysis. We show how to attack the cipher by using higher order differentials and a variant of the cipher by the interpolation attack. It is possible to successfully cryptanalyse up to 32 rounds of the variant using about 232 chosen plaintexts with a running time less than 264. Using higher order differentials, a new design concept for block ciphers by Kiefer is also shown to be insecure. Rijmen et al presented a design strategy for block ciphers and the cipher SHARK. We show that there exist ciphers constructed according to this design strategy which can be broken faster than claimed. In particular, we cryptanalyse 5 rounds of a variant of SHARK, which deviates only slightly from the proposed SHARK.

The work in this paper was initiated while the authors were visiting the Isaac Newton Institute, Cambridge, U.K., February 1996.

Download to read the full chapter text

Chapter PDF

References

  1. E. Biham and A. Shamir. Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag, 1993.

    Google Scholar 

  2. P.M. Cohn. Algebra, Volume 1. John Wiley & Sons, 1982.

    Google Scholar 

  3. K. Kiefer. A New Design Concept for Building Secure Block Ciphers. In J. Pribyl, editor, Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT’96, Prague, Czech Republic, pages 30–41. CTU Publishing House, 1996.

    Google Scholar 

  4. L.R. Knudsen. Block Ciphers — Analysis, Design and Applications. PhD thesis, Aarhus University, Denmark, 1994.

    Google Scholar 

  5. L.R. Knudsen. Truncated and higher order differentials. In B. Preneel, editor, Fast Software Encryption — Second International Workshop, Leuven, Belgium, LNCS 1008, pages 196–211. Springer Verlag, 1995.

    Google Scholar 

  6. X. Lai. Higher order derivatives and differential cryptanalysis. In Proc. ≓Symposium on Communication, Coding and Cryptography≓, in honor of James L. Massey on the occasion of his 60’th birthday, Feb. 10–13, 1994, Monte-Verita, Ascona, Switzerland, 1994.

    Google Scholar 

  7. M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology — Proc. Eurocrypt’93, LNCS 765, pages 386–397. Springer Verlag, 1993.

    Google Scholar 

  8. K. Nyberg. Differentially uniform mappings for cryptography. In T. Helleseth, editor, Advances in Cryptology — Proc. Eurocrypt’93, LNCS 765, pages 55–64. Springer Verlag, 1993.

    Google Scholar 

  9. K. Nyberg. Linear approximations of block ciphers. In A. De Santis, editor, Advances in Cryptology — Proc. Eurocrypt’94, LNCS 950, pages 439–444. Springer Verlag, 1994.

    Google Scholar 

  10. K. Nyberg and L.R. Knudsen. Provable security against a differential attack. The Journal of Cryptology, 8(1):27–38, 1995.

    Article  MathSciNet  MATH  Google Scholar 

  11. V. Rijmen, J. Daemen, B. Preneel, A. Bosselaers, and E. De Win. The cipher SHARK. In Gollmann D., editor, Fast Software Encryption, Third International Workshop, Cambridge, U.K., February 1996, LNCS 1039, pages 99–112. Springer Verlag, 1996.

    Google Scholar 

Download references

Author information

Authors and Affiliations

  1. Department of Mathematics, Building 303, Technical University of Denmark, DK-2800, Lyngby, Denmark

    Thomas Jakobsen

  2. Dept. Electrical Engineering-ESAT, Katholieke Universiteit Leuven, Kardinaal Mercierlaan 94, B-3001, Heverlee, Belgium

    Lars R. Knudsen

Authors
  1. Thomas Jakobsen
    View author publications

    You can also search for this author in PubMed Google Scholar

  2. Lars R. Knudsen
    View author publications

    You can also search for this author in PubMed Google Scholar

Editor information

Eli Biham

Rights and permissions

Reprints and permissions

Copyright information

© 1997 Springer-Verlag

About this paper

Cite this paper

Jakobsen, T., Knudsen, L.R. (1997). The interpolation attack on block ciphers. In: Biham, E. (eds) Fast Software Encryption. FSE 1997. Lecture Notes in Computer Science, vol 1267. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052332

Download citation

  • .RIS
  • .ENW
  • .BIB
  • DOI: https://doi.org/10.1007/BFb0052332

  • Published: 17 May 2006

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-63247-4

  • Online ISBN: 978-3-540-69243-0

  • eBook Packages: Springer Book Archive

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Publish with us

Policies and ethics

Search

Navigation

  • Find a journal
  • Publish with us
  • Track your research

Discover content

  • Journals A-Z
  • Books A-Z

Publish with us

  • Journal finder
  • Publish your research
  • Open access publishing

Products and services

  • Our products
  • Librarians
  • Societies
  • Partners and advertisers

Our brands

  • Springer
  • Nature Portfolio
  • BMC
  • Palgrave Macmillan
  • Apress
  • Discover
  • Your US state privacy rights
  • Accessibility statement
  • Terms and conditions
  • Privacy policy
  • Help and support
  • Legal notice
  • Cancel contracts here

18.224.23.12

Not affiliated

Springer Nature

© 2025 Springer Nature