Skip to main content
Log in

Linear cryptanalysis of NUSH block cipher

  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

NUSH is a block cipher as a candidate for NESSIE. NUSH is analyzed by linear crypt-analysis. The complexity δ=(ε, η) of the attack consists of data complexity ε and time complexity η. Three linear approximations are used to analyze NUSH with 64-bit block. When |K|=128 bits, the complexities of three attacks are (258, 2124), (260, 278) and (262, 255) respectively. When |K|=192 bits, the complexities of three attacks are (258, 2157) (260, 296) and (262, 258) respectively. When |K| =256 bits, the complexities of three attacks are (258, 2125), (260, 278) and (262, 253) respectively. Three linear approximations are used to analyze NUSH with 128-bit block. When |K|=128 bits, the complexities of three attacks are (2122, 295), (2124, 257) and (2126, 252) respectively. When |K|=192 bits, the complexities of three attacks are (2122, 2142), (2124, 275) and (2126, 258) respectively. When |K|=256 bits, the complexities of three attacks are (2122, 2168), (2124, 281) and (2126, 264) respectively. Two linear approximations are used to analyze NUSH with 256-bit block. When |K|=128 bits, the complexities of two attacks are (2252, 2122) and (2254, 2119) respectively. When |K|=192 bits, the complexities of two attacks are (2252, 2181) and (2254, 2177) respectively. When |K|=256 bits, the complexities of two attacks are (2252, 2240) and (2254, 2219) respectively. These results show that NUSH is not immune to linear cryptanalysis, and longer key cannot enhance the security of NUSH.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lebedev, A. N., Volchkov, A. A., NUSH, http://www.cryptonessie.org.

  2. Mitsuru Matsui, Linear cryptanalysis method for DES cipher, Advances in Cryptology-Eurocrypt '93, Berlin: Springer-Verlag, 1993, 386–397.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wenling Wu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Wu, W., Feng, D. Linear cryptanalysis of NUSH block cipher. Sci China Ser F 45, 59–67 (2002). https://doi.org/10.1360/02yf9005

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1360/02yf9005

Keywords

Navigation