Skip to main content

Lund University Publications

LUND UNIVERSITY LIBRARIES

On The Distribution of Linear Biases: Three Instructive Examples

Abdelraheem, Mohamed Ahmed ; Ågren, Martin LU ; Beelen, Peter and Leander, Gregor (2012) CRYPTO In Lecture Notes in Computer Science 7417. p.50-67
Abstract
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the cases we have to make (clearly wrong) assumptions, e.g., assume independent round-keys. Besides being unsatisfactory from a scientific perspective, the lack of fundamental understanding might have an impact on the performance of the ciphers we use. As we do not understand the security sufficiently enough, we often tend to embed a security margin -- from an efficiency perspective nothing else than wasted performance. The aim of this paper is to... (More)
Despite the fact that we evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the cases we have to make (clearly wrong) assumptions, e.g., assume independent round-keys. Besides being unsatisfactory from a scientific perspective, the lack of fundamental understanding might have an impact on the performance of the ciphers we use. As we do not understand the security sufficiently enough, we often tend to embed a security margin -- from an efficiency perspective nothing else than wasted performance. The aim of this paper is to stimulate research on these foundations of block ciphers. We do this by presenting three examples of ciphers that behave differently to what is normally assumed. Thus, on the one hand these examples serve as counter examples to common beliefs and on the other hand serve as a guideline for future work. (Less)
Please use this url to cite or link to this publication:
author
; ; and
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
Invariant subspaces, Block ciphers, Linear hull, Linear cryptanalysis, Security margin
host publication
Lecture Notes in Computer Science : Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings - Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings
series title
Lecture Notes in Computer Science
volume
7417
pages
18 pages
publisher
Springer
conference name
CRYPTO
conference dates
2012-08-19 - 2012-08-23
external identifiers
  • scopus:84865477905
ISSN
0302-9743
1611-3349
ISBN
978-3-642-32009-5
978-3-642-32008-8
DOI
10.1007/978-3-642-32009-5_4
project
EIT_HSWC:Coding Coding, modulation, security and their implementation
language
English
LU publication?
yes
id
0faf56be-96c6-485d-9b96-fec65596204a (old id 2733961)
date added to LUP
2016-04-04 11:40:12
date last changed
2024-02-28 20:54:05
@inproceedings{0faf56be-96c6-485d-9b96-fec65596204a,
  abstract     = {{Despite the fact that we evidently have very good block ciphers at hand today, some fundamental questions on their security are still unsolved. One such fundamental problem is to precisely assess the security of a given block cipher with respect to linear cryptanalysis. In by far most of the cases we have to make (clearly wrong) assumptions, e.g., assume independent round-keys. Besides being unsatisfactory from a scientific perspective, the lack of fundamental understanding might have an impact on the performance of the ciphers we use. As we do not understand the security sufficiently enough, we often tend to embed a security margin -- from an efficiency perspective nothing else than wasted performance. The aim of this paper is to stimulate research on these foundations of block ciphers. We do this by presenting three examples of ciphers that behave differently to what is normally assumed. Thus, on the one hand these examples serve as counter examples to common beliefs and on the other hand serve as a guideline for future work.}},
  author       = {{Abdelraheem, Mohamed Ahmed and Ågren, Martin and Beelen, Peter and Leander, Gregor}},
  booktitle    = {{Lecture Notes in Computer Science : Advances in Cryptology – CRYPTO 2012 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}},
  isbn         = {{978-3-642-32009-5}},
  issn         = {{0302-9743}},
  keywords     = {{Invariant subspaces; Block ciphers; Linear hull; Linear cryptanalysis; Security margin}},
  language     = {{eng}},
  pages        = {{50--67}},
  publisher    = {{Springer}},
  series       = {{Lecture Notes in Computer Science}},
  title        = {{On The Distribution of Linear Biases: Three Instructive Examples}},
  url          = {{http://dx.doi.org/10.1007/978-3-642-32009-5_4}},
  doi          = {{10.1007/978-3-642-32009-5_4}},
  volume       = {{7417}},
  year         = {{2012}},
}