
For FullText PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.

Linear Attack Using Multiple Linear Approximations
Jun CHOI Deukjo HONG Seokhie HONG Sangjin LEE
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E88A
No.1
pp.28 Publication Date: 2005/01/01
Online ISSN:
DOI: 10.1093/ietfec/e88a.1.2
Print ISSN: 09168508 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Symmetric Key Cryptography Keyword: block cipher, linear cryptanalysis, multiple linear cryptanalsis,
Full Text: PDF(183.3KB)>>
Summary:
One of Kaliski and Robshaw's algorithms, which is used for the linear attack on block ciphers with multiple linear approximations and introduced as Algorithm 2M in this paper, looks efficient but lacks any theoretical and mathematical description. It means there exists no way to estimate the data complexity required for the attack by the algorithm except experiments of the reduced variants. In this paper we propose a new algorithm using multiple linear approximation. We achieve the theoretical and mathematical analysis of its success probability. The new algorithm needs about 2^{40.6} plaintexts to find 12 bits of secret key of 16round DES with a success probability of about 86%.

