Skip to main content

Linear cryptanalysis of LOKI and s 2DES

  • Conference paper
  • First Online:
Advances in Cryptology — ASIACRYPT'94 (ASIACRYPT 1994)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 917))

Included in the following conference series:

Abstract

This paper discusses linear cryptanalysis of LOKI89, LOKI91 and s 2DES. Our computer program based on Matsui's search algorithm has completely determined their best linear approximate equations, which tell us applicability of linear cryptanalysis to each cryptosystem. As a result, LOKI89 and LOKI91 are resistant to linear cryptanalysis from the viewpoint of the best linear approximate probability, whereas s2DES is breakable by a known-plaintext attack faster than an exhaustive key search. Moreover, our search program, which is also applicable to differential cryptanalysis, has derived their best differential characteristics as well. These values give a complete proof that characteristics found by Knudsen are actually best.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Biham,E.,Shamir,A.: Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag (1993)

    Google Scholar 

  2. Matsui,M.: Linear Cryptanalysis Method for DES cipher. Advances in Cryptology — Eurocrypt'93, Lecture Notes in Computer Science, Springer-Verlag 765 (1993) 386–397

    Google Scholar 

  3. Matsui,M.: On correlation between the order of S-boxes and the strength of DES. Pre-proceedings of Eurocrypt'94 (1994) 375–387

    Google Scholar 

  4. Matsui,M.: The First Experimental Cryptanalysis of the Data Encryption Standard. Advances in Cryptology — Crypto'94, Lecture Notes in Computer Science, Springer-Verlag 839 (1994) 1–11

    Google Scholar 

  5. Brown,L.,Pieprzyk,J.,Seberry,J.: LOKI-A Cryptographic Primitive for Authentication and Secrecy Applications. Advances in Cryptology — Auscrypt'90, Lecture Notes in Computer Science, Springer-Verlag 453 (1990) 229–236

    Google Scholar 

  6. Brown,L.,Kwan,M.,Pieprzyk,J.,Seberry,J.: Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. Advances in Cryptology — Asiacrypt'91, Lecture Notes in Computer Science, Springer-Verlag 739 (1993) 36–50

    Google Scholar 

  7. Kim,K.: Construction of DES-like S-boxes Based on Boolean Functions Satisfying the SAC. Advances in Cryptology — Asiacrypt'91, Lecture Notes in Computer Science, Springer-Verlag 739 (1993) 59–72

    Google Scholar 

  8. Biham,E.,Shamir,A.: Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Advances in Cryptology — Crypto'91, Lecture Notes in Computer Science, Springer-Verlag 576 (1992) 156–171

    Google Scholar 

  9. Knudsen,L.: Cryptanalysis of LOKI. Advances in Cryptology — Asiacrypt'91, Lecture Notes in Computer Science, Springer-Verlag 739 (1993) 22–35

    Google Scholar 

  10. Knudsen,L.: Cryptanalysis of LOKI91. Advances in Cryptology — Auscrypt'92, Lecture Notes in Computer Science, Springer-Verlag 718 (1993) 196–208

    Google Scholar 

  11. Knudsen,L.: Iterative Characteristics of DES and s2-DES. Advances in Cryptology — Crypto'92, Lecture Notes in Computer Science, Springer-Verlag 740 (1993) 497–511

    Google Scholar 

  12. Lai,X.,Massey,J.,Murphy,S.: Markov ciphers and differential cryptanalysis. Advances in Cryptology — Eurocrypt'91, Lecture Notes in Computer Science, Springer-Verlag 547 (1991) 17–38

    Google Scholar 

  13. Nyberg,K.: Linear Approximation of Block Ciphers. Presented at Rump Session in Eurocrypt'94

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Reihanah Safavi-Naini

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Tokita, T., Sorimachi, T., Matsui, M. (1995). Linear cryptanalysis of LOKI and s 2DES. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000442

Download citation

  • DOI: https://doi.org/10.1007/BFb0000442

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-59339-3

  • Online ISBN: 978-3-540-49236-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics