• Keine Ergebnisse gefunden

The Independence of Linear Approximations in Symmetric Cryptology

N/A
N/A
Protected

Academic year: 2022

Aktie "The Independence of Linear Approximations in Symmetric Cryptology"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

The Independence of Linear Approximations in Symmetric Cryptology

Sean Murphy Royal Holloway

Abstract

The basic form of the technique of linear cryptanalysis considers a block cipher which encrypts a binary plaintext vectorpito ciphertext vectorciunder a keyk. A linear approximation of this block cipher is an expression of the form

aT pi

ci

=bTkwith probability p= 1 2+,

where a and bare known as the data mask and key mask respectively, and is known as thebias. The simplest form of linear cryptanalysis uses this single linear approximation with many plaintext–ciphertext pairs to find the key bit bTk. This talk considers the use of many such linear approximations with data masksa0,a1, . . .to find the key bitbTk. Issues discussed include:

• whether using a third linearly dependent maska0+a1can give more key information than using just the two masksa0 anda1;

• whether a maska with bias= 0 can give any key information.

1

Referenzen

ÄHNLICHE DOKUMENTE

We improve a lower bound of Heden, in a subcase, on the number of elements of the smallest occurring dimension in a vector space partition.. By geometric arguments we

Bereanu, The continuity of the optimum in parametric programming and applications to stochastic programming, J.Optim.Theory Applic. Robinson, A characterization of stability

The second information, the sequence of the royal tombs visited, has played an important role, too, as a supporting evidence in the attempts to identify king

In the present thesis, we consider the possibility of a reconstruction of the coronal magnetic field by tomographic technique based on possible coronagraph observations of the Hanle

The first subsection shows that the estimate based on the inclusion algorithm, namely the matricial matrix cube algorithm of Subsection 4.5, is essentially identical to that obtained

Then by Theorem 4.1.14 there exists a basis N of neighbourhoods of the origin in X consisting of absorbing absolutely convex sets s.t.. We know from the first part of the proof how

The same statistics are reported for the benchmark portfolios based on composite forecasts (i.e., the single assets of which the portfolios are constructed and the equally

This paper reviews several duality results in the theory of linear vector optimization using an extended reformulation with general cone ordering.. This generalization gives some