Abstract
This work considers statistical analysis of attacks on block cyphers using several linear approximations. A general and unified approach is adopted. To this end, the general key randomisation hypotheses for multidimensional and multiple linear cryptanalysis are introduced. Expressions for the success probability in terms of the data complexity and the advantage are obtained using the general key randomisation hypotheses for both multidimensional and multiple linear cryptanalysis and under the settings where the plaintexts are sampled with or without replacement. Particularising to standard/adjusted key randomisation hypotheses gives rise to success probabilities in 16 different cases out of which in only five cases expressions for success probabilities have been previously reported. Even in these five cases, the expressions for success probabilities that we obtain are more general than what was previously obtained. A crucial step in the analysis is the derivation of the distributions of the underlying test statistics. Whilst we carry out the analysis formally to the extent possible, there are certain inherently heuristic assumptions that need to be made. In contrast to previous works which have implicitly made such assumptions, we carefully highlight these and discuss why they are unavoidable. Finally, we provide a complete characterisation of the dependence of the success probability on the data complexity.
Similar content being viewed by others
References
Ashur, T., Beyne, T., Rijmen, V.: Revisiting the wrong-key-randomization hypothesis. IACR Cryptology ePrint Archive 2016, 990 (2016)
Baignères, T., Junod, P., Vaudenay, S.: How far can we go beyond linear cryptanalysis? In: Advances in Cryptology–ASIACRYPT 2004, pp. 432–450. Springer (2004)
Baignères, T., Sepehrdad, P., Vaudenay, S.: Distinguishing distributions using Chernoff information. In: Provable Security, pp. 144–165. Springer (2010)
Biryukov, A., De Cannière, C., Quisquater, M.: On multiple linear approximations. In: Advances in Cryptology–CRYPTO 2004, pp. 1–22. Springer (2004)
Blondeau, C., Gérard, B., Nyberg, K.: Multiple differential cryptanalysis using LLR and χ 2 statistics. In: Security and Cryptography for Networks, pp. 343–360. Springer (2012)
Blondeau, C., Nyberg, K.: Joint data and key distribution of the linear cryptanalysis test statistic and its impact to data complexity estimates of multiple/multidimensional linear and truncated differential attacks, version dated 24 September, 2015. IACR Cryptology ePrint Archive 2015, 935 (2015) http://eprint.iacr.org/2015/935
Blondeau, C., Nyberg, K.: Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. Des. Codes Cryptography 82(1-2), 319–349 (2017)
Bogdanov, A., Geng, H., Wang, M., Wen, L., Collard, B.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards camellia and CLEFIA. In: Lange, T., Lauter, K. E., Lisonek, P. (eds.) Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14–16, 2013, Revised Selected Papers, vol. 8282 of Lecture Notes in Computer Science, pp. 306–323. Springer (2013)
Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds.) Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2–6, 2012. Proceedings, vol. 7658 of Lecture Notes in Computer Science, pp. 244–261. Springer (2012)
Bogdanov, A., Rijmen, V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptography 70(3), 369–383 (2014)
Bogdanov, A., Tischhauser, E.: On the wrong key randomisation and key equivalence hypotheses in Matsui’s algorithm 2. In: Fast Software Encryption, pp. 19–38. Springer (2014)
Bogdanov, A., Wang, M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Fast Software Encryption, pp. 29–48. Springer (2012)
Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. IACR Cryptology ePrint Archive 2005, 212 (2005) http://eprint.iacr.org/2005/212
Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. Journal of Mathematical Cryptology JMC 1(3), 221–242 (2007)
Harpes, C., Kramer, G.G., Massey, J.L.: A generalization of linear cryptanalysis and the applicability of Matsui’s piling-up lemma. In: Advances in Cryptology - EUROCRYPT ’95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21–25, 1995, Proceeding, pp. 24–38 (1995). http://link.springer.de/link/service/series/0558/bibs/0921/09210024.htm
Hermelin, M., Cho, J. Y., Nyberg, K.: Multidimensional extension of Matsui’s algorithm 2. In: Fast Software Encryption, pp. 209–227. Springer (2009)
Huang, J., Vaudenay, S., Lai, X., Nyberg, K.: Capacity and data complexity in multidimensional linear attack. In: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16–20, 2015, Proceedings, Part I. https://doi.org/10.1007/978-3-662-47989-6_7, pp. 141–160 (2015)
Johnson, N.L., Kotz, S., Balakrishnan, N.: Continuous Univariate Distributions, vol. 2, 2nd edn. Wiley Series in Probability and Statistics. Wiley (1995)
Junod, P.: On the optimality of linear, differential, and sequential distinguishers. In: Advances in Cryptology–EUROCRYPT 2003, pp. 17–32. Springer (2003)
Kaliski Jr., B.S., Robshaw, M.J.B.: Linear cryptanalysis using multiple approximations. In: Advances in Cryptology–Crypto’94, pp. 26–39. Springer (1994)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Advances in Cryptology–EUROCRYPT’93, pp. 386–397. Springer (1993)
Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt, Y. G. (ed.) Advances in Cryptology–Crypto’94, pp. 1–11. Springer (1994)
Murphy, S.: The independence of linear approximations in symmetric cryptanalysis. IEEE Trans. Inf. Theory 52(12), 5510–5518 (2006)
Samajder, S., Sarkar, P.: Rigorous upper bounds on data complexities of block cipher cryptanalysis. IACR Cryptology ePrint Archive 2015, 916 (2015)
Samajder, S., Sarkar, P.: Another look at normal approximations in cryptanalysis. J. Mathematical Cryptology 10(2), 69–99 (2016)
Samajder, S., Sarkar, P.: A new test statistic for key recovery attacks using multiple linear approximations. In: Mycrypt 2016, vol. 10311 of LNCS, pp 277–293. Springer (2016)
Samajder, S., Sarkar, P.: Another look at success probability in linear cryptanalysis. Cryptology ePrint Archive Report 2017/391 (2017). http://eprint.iacr.org/2017/391
Selçuk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131–147 (2008)
Serfling, R.J.: Approximation Theorems of Mathematical Statistics, vol. 162. Wiley (2009)
Tardy-Corfdir, A., Gilbert, H.: A known plaintext attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) Advances in Cryptology - CRYPTO ’91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11–15, 1991, Proceedings, vol. 576 of Lecture Notes in Computer Science, pp. 172–181. Springer (1991)
Walker, A.M.: A note on the asymptotic distribution of sample quantiles. J. R. Stat. Soc. Ser. B (Methodol.) 30(3), 570–575 (1968)
Author information
Authors and Affiliations
Corresponding author
Additional information
Subhabrata Samajder received financial support from the R. C. Bose Center for Cryptology and Security, Indian Statistical Institute, Kolkata, India.
This article is part of the Topical Collection on Special Issue on Statistics in Design and Analysis of Symmetric Ciphers
Appendix A: Some results on statistics
Appendix A: Some results on statistics
1.1 A.1 Multivariate normal to chi-square
This section looks at certain conditions under which \(XX^{t}\) follows a (possibly non-central) chi-square distribution, where X follows a multivariate normal distribution with singular variance-covariance matrix. The result can be found in [29, Chapter 3.5].
Theorem 6
Let \(X = (X_{1}, {\ldots } , X_{\tau })\) be \(\mathcal {N}(\mu , {\Sigma })\) , and let \(B_{\tau \times \tau }\) be a symmetric matrix. Assume that, for \(\eta = (\eta _{1}, {\ldots } , \eta _{\tau })\) ,
where the superscript t denotes the transpose of a matrix. The \(XBX^{t}\) has a (possiblynon-central) chi-square distribution if and only if
in which case the degrees offreedom if trace (BΣ) and thenon-centrality parameter is \(\mu B \mu ^{t}\).
From the above theorem we can now lists the following assumptions under which \(XX^{t}\) follows a (possibly non-central) chi-square distribution with \((\tau - 1)\) degrees of freedom, where X follows a multivariate normal distribution with singular variance-covariance matrix.
-
1.
There exists an \(\eta \) such that
$$\eta {\Sigma} = 0 \, \Rightarrow \, \eta \mu^{t} = 0.$$ -
2.
Here \(B = I_{\tau }\).
-
3.
\({\Sigma }^{2} = {\Sigma }\) and the trace of \({\Sigma } = \tau - 1\).
1.2 A.2 Approximating non-central chi-squared distribution by normal
The following result can be found in [18, Chapter 29.10].
Theorem 7
Let X be a random variable following a non-central chi-square distribution with \(\nu \) degrees of freedom and non-centrality parameter \(\delta \) , i.e., \(X \sim \chi ^{2}_{\nu }(\delta )\) . Then the standarized random variable
approximately follows a standard normal distribution if either
-
1.
\(\nu \rightarrow \infty \),\(\delta \) remaining constant, or
-
2.
\(\delta \rightarrow \infty \),\(\nu \) remaining constant.
Rights and permissions
About this article
Cite this article
Samajder, S., Sarkar, P. Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses. Cryptogr. Commun. 10, 835–879 (2018). https://doi.org/10.1007/s12095-017-0257-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-017-0257-2
Keywords
- Multidimensional linear cryptanalysis
- Multiple linear cryptanalysis
- Chi-squared distribution
- Success probability
- Data complexity
- Advantage