About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper · Book chapter

Linear Cryptanalysis of DES with Asymmetries

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Cyber Security, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Linear cryptanalysis of DES, proposed by Matsui in 1993, has had a seminal impact on symmetric-key cryptography, having seen massive research efforts over the past two decades. It has spawned many variants, including multidimensional and zero-correlation linear cryptanalysis. These variants can claim best attacks on several ciphers, including present, Serpent, and CLEFIA.

For DES, none of these variants have improved upon Matsui's original linear cryptanalysis, which has been the best known-plaintext key-recovery attack on the cipher ever since. In a revisit, Junod concluded that when using 2 43 known plain-texts, this attack has a complexity of 2 41 DES evaluations.

His analysis relies on the standard assumptions of right-key equivalence and wrong-key randomisation.In this paper, we first investigate the validity of these fundamental assumptions when applied to DES. For the right key, we observe that strong linear approximations of DES have more than just one dominant trail and, thus, that the right keys are in fact inequivalent with respect to linear correlation.

We therefore develop a new right-key model using Gaussian mixtures for approximations with several dominant trails. For the wrong key, we observe that the correlation of a strong approximation after the partial decryption with a wrong key still shows much non-randomness. To remedy this, we propose a novel wrong-key model that expresses the wrong-key linear correlation using a version of DES with more rounds.

We extend the two models to the general case of multiple approximations, propose a likelihood-ratio classifier based on this generalisation, and show that it performs better than the classical Bayesian classifier.On the practical side, we find that the distributions of right-key correlations for multiple linear approximations of DES exhibit exploitable asymmetries.

In particular, not all sign combinations in the correlation values are possible. This results in our improved multiple linear attack on DES using 4 linear approximations at a time. The lowest computational complexity of 2(38.86) DES evaluations is achieved when using 2(42.78) known plaintexts. Alternatively, using 2(41) plaintexts results in a computational complexity of 2(49.75) DES evaluations.

We perform practical experiments to confirm our model. To our knowledge, this is the best attack on DES.

Language: English
Publisher: Springer
Year: 2017
Pages: 187-216
Proceedings: 23rd International Conference on the Theory and Applications of Cryptology and Information Security
Series: Lecture Notes in Computer Science
Journal subtitle: 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I
ISBN: 3319706934 , 3319706942 , 9783319706931 and 9783319706948
ISSN: 03029743 and 16113349
Types: Conference paper and Book chapter
DOI: 10.1007/978-3-319-70694-8_7
ORCIDs: Bogdanov, Andrey

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis