Skip to main content
Log in

Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

This work considers statistical analysis of attacks on block cyphers using several linear approximations. A general and unified approach is adopted. To this end, the general key randomisation hypotheses for multidimensional and multiple linear cryptanalysis are introduced. Expressions for the success probability in terms of the data complexity and the advantage are obtained using the general key randomisation hypotheses for both multidimensional and multiple linear cryptanalysis and under the settings where the plaintexts are sampled with or without replacement. Particularising to standard/adjusted key randomisation hypotheses gives rise to success probabilities in 16 different cases out of which in only five cases expressions for success probabilities have been previously reported. Even in these five cases, the expressions for success probabilities that we obtain are more general than what was previously obtained. A crucial step in the analysis is the derivation of the distributions of the underlying test statistics. Whilst we carry out the analysis formally to the extent possible, there are certain inherently heuristic assumptions that need to be made. In contrast to previous works which have implicitly made such assumptions, we carefully highlight these and discuss why they are unavoidable. Finally, we provide a complete characterisation of the dependence of the success probability on the data complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Ashur, T., Beyne, T., Rijmen, V.: Revisiting the wrong-key-randomization hypothesis. IACR Cryptology ePrint Archive 2016, 990 (2016)

    Google Scholar 

  2. Baignères, T., Junod, P., Vaudenay, S.: How far can we go beyond linear cryptanalysis? In: Advances in Cryptology–ASIACRYPT 2004, pp. 432–450. Springer (2004)

  3. Baignères, T., Sepehrdad, P., Vaudenay, S.: Distinguishing distributions using Chernoff information. In: Provable Security, pp. 144–165. Springer (2010)

  4. Biryukov, A., De Cannière, C., Quisquater, M.: On multiple linear approximations. In: Advances in Cryptology–CRYPTO 2004, pp. 1–22. Springer (2004)

  5. Blondeau, C., Gérard, B., Nyberg, K.: Multiple differential cryptanalysis using LLR and χ 2 statistics. In: Security and Cryptography for Networks, pp. 343–360. Springer (2012)

  6. Blondeau, C., Nyberg, K.: Joint data and key distribution of the linear cryptanalysis test statistic and its impact to data complexity estimates of multiple/multidimensional linear and truncated differential attacks, version dated 24 September, 2015. IACR Cryptology ePrint Archive 2015, 935 (2015) http://eprint.iacr.org/2015/935

    Google Scholar 

  7. Blondeau, C., Nyberg, K.: Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. Des. Codes Cryptography 82(1-2), 319–349 (2017)

    Article  MathSciNet  MATH  Google Scholar 

  8. Bogdanov, A., Geng, H., Wang, M., Wen, L., Collard, B.: Zero-correlation linear cryptanalysis with FFT and improved attacks on ISO standards camellia and CLEFIA. In: Lange, T., Lauter, K. E., Lisonek, P. (eds.) Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14–16, 2013, Revised Selected Papers, vol. 8282 of Lecture Notes in Computer Science, pp. 306–323. Springer (2013)

  9. Bogdanov, A., Leander, G., Nyberg, K., Wang, M.: Integral and multidimensional linear distinguishers with correlation zero. In: Wang, X., Sako, K. (eds.) Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2–6, 2012. Proceedings, vol. 7658 of Lecture Notes in Computer Science, pp. 244–261. Springer (2012)

  10. Bogdanov, A., Rijmen, V.: Linear hulls with correlation zero and linear cryptanalysis of block ciphers. Des. Codes Cryptography 70(3), 369–383 (2014)

    Article  MathSciNet  MATH  Google Scholar 

  11. Bogdanov, A., Tischhauser, E.: On the wrong key randomisation and key equivalence hypotheses in Matsui’s algorithm 2. In: Fast Software Encryption, pp. 19–38. Springer (2014)

  12. Bogdanov, A., Wang, M.: Zero correlation linear cryptanalysis with reduced data complexity. In: Fast Software Encryption, pp. 29–48. Springer (2012)

  13. Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. IACR Cryptology ePrint Archive 2005, 212 (2005) http://eprint.iacr.org/2005/212

    MATH  Google Scholar 

  14. Daemen, J., Rijmen, V.: Probability distributions of correlation and differentials in block ciphers. Journal of Mathematical Cryptology JMC 1(3), 221–242 (2007)

    MathSciNet  MATH  Google Scholar 

  15. Harpes, C., Kramer, G.G., Massey, J.L.: A generalization of linear cryptanalysis and the applicability of Matsui’s piling-up lemma. In: Advances in Cryptology - EUROCRYPT ’95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21–25, 1995, Proceeding, pp. 24–38 (1995). http://link.springer.de/link/service/series/0558/bibs/0921/09210024.htm

  16. Hermelin, M., Cho, J. Y., Nyberg, K.: Multidimensional extension of Matsui’s algorithm 2. In: Fast Software Encryption, pp. 209–227. Springer (2009)

  17. Huang, J., Vaudenay, S., Lai, X., Nyberg, K.: Capacity and data complexity in multidimensional linear attack. In: Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16–20, 2015, Proceedings, Part I. https://doi.org/10.1007/978-3-662-47989-6_7, pp. 141–160 (2015)

  18. Johnson, N.L., Kotz, S., Balakrishnan, N.: Continuous Univariate Distributions, vol. 2, 2nd edn. Wiley Series in Probability and Statistics. Wiley (1995)

  19. Junod, P.: On the optimality of linear, differential, and sequential distinguishers. In: Advances in Cryptology–EUROCRYPT 2003, pp. 17–32. Springer (2003)

  20. Kaliski Jr., B.S., Robshaw, M.J.B.: Linear cryptanalysis using multiple approximations. In: Advances in Cryptology–Crypto’94, pp. 26–39. Springer (1994)

  21. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Advances in Cryptology–EUROCRYPT’93, pp. 386–397. Springer (1993)

  22. Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Desmedt, Y. G. (ed.) Advances in Cryptology–Crypto’94, pp. 1–11. Springer (1994)

  23. Murphy, S.: The independence of linear approximations in symmetric cryptanalysis. IEEE Trans. Inf. Theory 52(12), 5510–5518 (2006)

    Article  MathSciNet  MATH  Google Scholar 

  24. Samajder, S., Sarkar, P.: Rigorous upper bounds on data complexities of block cipher cryptanalysis. IACR Cryptology ePrint Archive 2015, 916 (2015)

    MATH  Google Scholar 

  25. Samajder, S., Sarkar, P.: Another look at normal approximations in cryptanalysis. J. Mathematical Cryptology 10(2), 69–99 (2016)

    Article  MathSciNet  MATH  Google Scholar 

  26. Samajder, S., Sarkar, P.: A new test statistic for key recovery attacks using multiple linear approximations. In: Mycrypt 2016, vol. 10311 of LNCS, pp 277–293. Springer (2016)

  27. Samajder, S., Sarkar, P.: Another look at success probability in linear cryptanalysis. Cryptology ePrint Archive Report 2017/391 (2017). http://eprint.iacr.org/2017/391

  28. Selçuk, A.A.: On probability of success in linear and differential cryptanalysis. J. Cryptol. 21(1), 131–147 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  29. Serfling, R.J.: Approximation Theorems of Mathematical Statistics, vol. 162. Wiley (2009)

  30. Tardy-Corfdir, A., Gilbert, H.: A known plaintext attack of FEAL-4 and FEAL-6. In: Feigenbaum, J. (ed.) Advances in Cryptology - CRYPTO ’91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11–15, 1991, Proceedings, vol. 576 of Lecture Notes in Computer Science, pp. 172–181. Springer (1991)

  31. Walker, A.M.: A note on the asymptotic distribution of sample quantiles. J. R. Stat. Soc. Ser. B (Methodol.) 30(3), 570–575 (1968)

    MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhabrata Samajder.

Additional information

Subhabrata Samajder received financial support from the R. C. Bose Center for Cryptology and Security, Indian Statistical Institute, Kolkata, India.

This article is part of the Topical Collection on Special Issue on Statistics in Design and Analysis of Symmetric Ciphers

Appendix A: Some results on statistics

Appendix A: Some results on statistics

1.1 A.1 Multivariate normal to chi-square

This section looks at certain conditions under which \(XX^{t}\) follows a (possibly non-central) chi-square distribution, where X follows a multivariate normal distribution with singular variance-covariance matrix. The result can be found in [29, Chapter 3.5].

Theorem 6

Let \(X = (X_{1}, {\ldots } , X_{\tau })\) be \(\mathcal {N}(\mu , {\Sigma })\) , and let \(B_{\tau \times \tau }\) be a symmetric matrix. Assume that, for \(\eta = (\eta _{1}, {\ldots } , \eta _{\tau })\) ,

$$\eta {\Sigma} = 0 \, \Rightarrow \, \eta \mu^{t} = 0,$$

where the superscript t denotes the transpose of a matrix. The \(XBX^{t}\) has a (possiblynon-central) chi-square distribution if and only if

$${\Sigma} B {\Sigma} B {\Sigma} = {\Sigma} B {\Sigma},$$

in which case the degrees offreedom if trace (BΣ) and thenon-centrality parameter is \(\mu B \mu ^{t}\).

From the above theorem we can now lists the following assumptions under which \(XX^{t}\) follows a (possibly non-central) chi-square distribution with \((\tau - 1)\) degrees of freedom, where X follows a multivariate normal distribution with singular variance-covariance matrix.

  1. 1.

    There exists an \(\eta \) such that

    $$\eta {\Sigma} = 0 \, \Rightarrow \, \eta \mu^{t} = 0.$$
  2. 2.

    Here \(B = I_{\tau }\).

  3. 3.

    \({\Sigma }^{2} = {\Sigma }\) and the trace of \({\Sigma } = \tau - 1\).

1.2 A.2 Approximating non-central chi-squared distribution by normal

The following result can be found in [18, Chapter 29.10].

Theorem 7

Let X be a random variable following a non-central chi-square distribution with \(\nu \) degrees of freedom and non-centrality parameter \(\delta \) , i.e., \(X \sim \chi ^{2}_{\nu }(\delta )\) . Then the standarized random variable

$$\frac{X - (\nu + \delta)}{\sqrt{2(\nu + 2\delta)}}$$

approximately follows a standard normal distribution if either

  1. 1.

    \(\nu \rightarrow \infty \),\(\delta \) remaining constant, or

  2. 2.

    \(\delta \rightarrow \infty \),\(\nu \) remaining constant.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Samajder, S., Sarkar, P. Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses. Cryptogr. Commun. 10, 835–879 (2018). https://doi.org/10.1007/s12095-017-0257-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-017-0257-2

Keywords

Mathematics Subject Classification (2010)